Sifting through the Net: Monitoring of Online Offenders by Researchers
暂无分享,去创建一个
[1] K. Durkin,et al. propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles , 1999 .
[2] Brian Krebs,et al. Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door , 2014 .
[3] Christian Platzer,et al. Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.
[4] Charlotte Brownlow,et al. Ethical Issues for Qualitative Research in On-line Communities , 2002 .
[5] A. Sergi,et al. Types of organised crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of Internet technologies , 2014 .
[6] Elizabeth Reid,et al. Informed Consent in the Study of On-Line Communities: A Reflection on the Effects of Computer-Mediated Social Research , 1996, Inf. Soc..
[7] Storm A. King,et al. Researching Internet Communities: Proposed Ethical Guidelines for the Reporting of Results , 1996, Inf. Soc..
[8] B. Berg. Qualitative Research Methods for the Social Sciences , 1989 .
[9] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[10] Carlo Morselli,et al. Inside Criminal Networks , 2008 .
[11] D. Bell. An Introduction to Cybercultures , 2001 .
[12] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[13] Elizabeth B.-N. Sanders,et al. Tools and techniques , 2012 .
[14] Jennifer L. Marill,et al. Tools and techniques for harvesting the World Wide Web , 2004, Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries, 2004..
[15] Diana S. Dolliver. Evaluating drug trafficking on the Tor Network: Silk Road 2, the sequel. , 2015, The International journal on drug policy.
[16] Monica J. Barratt,et al. Discussing illicit drugs in public internet forums: visibility, stigma, and pseudonymity , 2011, C&T.
[17] Angela Cora Garcia,et al. Ethnographic Approaches to the Internet and Computer-Mediated Communication , 2009 .
[18] Åsa Rosenberg,et al. Virtual World Research Ethics and the Private/Public Distinction , 2010 .
[19] T. Holt. Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On‐Line Data , 2010 .
[20] D. Mann,et al. NETCRIME More Change in the Organization of Thieving , 1998 .
[21] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[22] Monica J Barratt,et al. The efficacy of interviewing young drug users through online chat. , 2012, Drug and alcohol review.
[23] J Sixsmith,et al. Ethical Issues in the Documentary Data Analysis of Internet Posts and Archives , 2001, Qualitative health research.
[24] David Décary-Hétu,et al. Policing the Hackers by Hacking Them: Studying Online Deviants in IRC Chat Rooms , 2014 .
[25] David Calvey. Covert Ethnography in Criminology: A Submerged yet Creative Tradition , 2013 .
[26] Nir Kshetri,et al. Cybercrime and Cybersecurity in the Global South , 2013 .
[27] Fabrizio Schifano,et al. e-Psychonauts: Conducting research in online drug forum communities , 2012, Journal of mental health.
[28] Derek Manky,et al. Cybercrime as a service: a very modern business , 2013 .
[29] Caroline Haythornthwaite,et al. Studying Online Social Networks , 2006, J. Comput. Mediat. Commun..
[30] Anita Lavorgna,et al. Organised crime goes online: realities and challenges , 2015 .
[31] B. Wellman,et al. The Cambridge Handbook of Personal Relationships: Personal Relationships: On and Off the Internet , 2006 .
[32] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[33] John Horswell,et al. Associative evidence – the Locard exchange principle , 2004 .
[34] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[35] Mike Thelwall,et al. Web crawling ethics revisited: Cost, privacy, and denial of service , 2006 .
[36] Heith Copes,et al. "How Edge Are You?" Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum , 2005 .
[37] C. Hine. Virtual Ethnography: Modes, Varieties, Affordances , 2008 .
[38] Ramzi A. Haraty,et al. I2P Data Communication System , 2011, ICON 2011.
[39] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[40] Sara Kiesler,et al. Ethical issues in conducting sex research on the internet , 1999 .
[41] Elijah Anderson. Code of the Street: Decency, Violence, and the Moral Life of the Inner City , 1999 .
[42] Barry Wellman,et al. Designing the Internet for a networked society , 2002, CACM.
[43] Peter Reuter. Disorganized crime : the economics of the visible hand , 1983 .
[44] D. Décary-Hétu. Le capital virtuel : entre compétition, survie et réputation , 2013 .
[45] Marc Najork,et al. Web Crawling , 2010, Found. Trends Inf. Retr..
[46] Thomas J. Holt,et al. Characterizing malware writers and computer attackers in their own words , 2008 .
[47] Jerry Finn,et al. Computer-Based Self-Help Groups for Sexual Abuse Survivors , 1994 .
[48] Ronald V. Clarke,et al. Become a Problem-Solving Crime Analyst , 2003 .
[49] Carlo Morselli,et al. Welcome to the Scene , 2012 .