Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime
暂无分享,去创建一个
[1] T. M. Tripp,et al. Managing social media crises with your customers: The good, the bad, and the ugly , 2015 .
[2] Kyung-shick Choi,et al. The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity , 2018, The International Journal of Cybersecurity Intelligence and Cybercrime.
[3] Budi Arief,et al. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and Victims , 2015, IEEE Security & Privacy.
[4] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[5] K. Schwab. The Fourth Industrial Revolution , 2013 .
[6] David Maimon,et al. Daily Trends and Origin of Computer-Focused Crimes Against a Large University Computer Network An Application of the Routine-Activities and Lifestyle Perspective , 2013 .
[7] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[8] J. Teicher,et al. Old wine in new bottles? Regulating employee social media use through termination of employment law: A comparative analysis , 2018, Common Law World Review.
[9] Dan Zureich,et al. Cybersecurity: The Continuing Evolution of Insurance and Ethics , 2015 .
[10] M. Yar. The Novelty of ‘Cybercrime’ , 2005 .
[11] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[12] Eoghan Casey,et al. Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .
[13] Robert Moore,et al. Cybercrime: Investigating High-Technology Computer Crime , 2006 .
[14] Mats Näslund,et al. Privacy in machine-to-machine communications A state-of-the-art survey , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).
[15] Susan J. Westrick. Nursing Students’ Use of Electronic and Social Media: Law, Ethics, and E-Professionalism , 2015, Nursing education perspectives.
[16] Claire Seungeun Lee,et al. Datafication, dataveillance, and the social credit system as China's new normal , 2019, Online Inf. Rev..
[17] Kyung-shick Choi. Computer Crime Victimization and Integrated Theory: An Empirical Assessment , 2008 .
[18] Monica Lagazio,et al. A multi-level approach to understanding the impact of cyber crime on the financial sector , 2014, Comput. Secur..
[19] A. Bossler. Need for Debate on the Implications of Honeypot Data for Restrictive Deterrence Policies in Cyberspace , 2017 .
[20] C. Peers. The scene of the classroom , 2017, Design, Education and Pedagogy.
[21] Benoît Dupont. Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime , 2016, Crime, Law and Social Change.
[22] John Gyang Chaka,et al. Curtailing the Threats to Cloud Computing in the Fourth Industrial Revolution , 2019, Cloud Security.
[23] Susan W. Brenner. Cybercrime: Criminal Threats from Cyberspace , 2010 .
[24] T. Holt,et al. Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets , 2016 .
[25] P. Stearns. The Industrial Revolution in World History , 1994 .
[26] T. Holt. Examining the Forces Shaping Cybercrime Markets Online , 2013 .
[27] Bryanna Hahn Fox,et al. Federal Bureau of Investigation (FBI) , 2015 .
[28] M. Peters. Technological unemployment: Educating for the fourth industrial revolution , 2017 .
[29] T. Holt,et al. An Assessment of the Current State of Cybercrime Scholarship , 2014 .
[30] Zaid Mohammad Obeidat,et al. Consumer Revenge Using the Internet and Social Media: An Examination of the Role of Service Failure Types and Cognitive Appraisal Processes , 2017 .
[31] S. Furnell,et al. The challenge of measuring cyber-dependent crimes , 2015 .
[32] D. Wall. Cybercrime: The Transformation of Crime in the Information Age , 2007 .
[33] T. Holt,et al. Cybercrime in Progress: Theory and prevention of technology-enabled offenses , 2015 .
[34] Rebecca M. Chory,et al. Organizational Surveillance of Computer-Mediated Workplace Communication: Employee Privacy Concerns and Responses , 2016 .
[35] J. West,et al. Electronic Surveillance at Work , 2016 .
[36] David Maimon,et al. Cyber-Dependent Crimes: An Interdisciplinary Review , 2019, Annual Review of Criminology.
[37] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[38] Sandro Gaycken,et al. Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0 , 2017 .
[39] Michael G. Turner,et al. Examining Risks and Protective Factors of On-Line Identity Theft , 2012 .
[40] Majid Yar,et al. Computer Hacking: Just Another Case of Juvenile Delinquency? , 2005 .
[41] Howard Rush,et al. The cybercrime ecosystem: Online innovation in the shadows? , 2013 .
[42] Michel Cukier,et al. RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM , 2014 .
[43] S. Greenstein. How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network , 2015 .
[44] Thomas J. Holt,et al. Examining signals of trust in criminal markets online , 2016, J. Cybersecur..
[45] Qinyu Liao,et al. Ransomware: A New Cyber Hijacking Threat to Enterprises , 2009 .
[46] David Mitch,et al. The Role of Education and Skill in the British Industrial Revolution , 2018 .
[47] T. Sorell. Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous , 2015 .
[48] T. Holt,et al. The online stolen data market: disruption and intervention approaches , 2017 .
[49] James Curran. The internet of history : Rethinking the internet’s past , 2016 .
[50] D. Wall. Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace , 2007 .
[51] Steve Mansfield-Devine,et al. : taking , 2016 .
[52] Eric R. Louderback,et al. The role of land use and walkability in predicting crime patterns: A spatiotemporal analysis of Miami-Dade County neighborhoods, 2007–2015 , 2019, Security Journal.
[54] Budi Arief,et al. Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.
[55] Sagar Samtani,et al. Conducting large-scale analyses of underground hacker communities , 2016 .
[56] S. Brenner. Cybercrime and the Law: Challenges, Issues, and Outcomes , 2012 .
[57] T. Holt. Exploring the social organisation and structure of stolen data markets , 2013 .