Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo. Zombies and botnets , 2007 .
[2] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[3] T. Jordan,et al. A Sociology of Hackers , 1998 .
[4] Russell G. Smith,et al. Cyber Criminals on Trial: List of figures and tables , 2004 .
[5] R. Atkinson. The Life Story Interview , 1998 .
[6] Gordon R Meyer,et al. The Social Organization of the Computer Underground , 1989 .
[7] B. Berg. Qualitative Research Methods for the Social Sciences , 1989 .
[8] S. Brenner. Cybercrime: re-thinking crime control strategies , 2013 .
[9] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[10] R. Broadhurst,et al. Social Engineering and Crime Prevention in Cyberspace , 2008 .
[11] Crime,et al. United Nations convention against transnational organized crime and the protocols thereto , 2004 .
[12] M. Bagaric,et al. Australian Sentencing: Principles and Practice , 2007 .
[13] Richard Barber. Hackers Profiled — Who Are They and What Are Their Motivations? , 2001 .
[14] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[15] M. Yar,et al. Book Review: Cybercrime and Society , 2006 .
[16] Russell G. Smith. Cross border economic crime : the agenda for reform , 2001 .
[17] Scott H. Decker,et al. A Snowball's Chance in Hell: Doing Fieldwork with Active Residential Burglars , 1992 .
[18] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[19] Steven Furnell,et al. Cybercrime: Vandalizing the Information Society , 2003, ICWE.
[20] Catherine A. Theohary,et al. Terrorist Use of the Internet: Information Operations in Cyberspace , 2011 .
[21] Peter Grabosky,et al. Requirements of prosecution services to deal with cyber crime , 2007 .
[22] Yuguang F. Ipsen,et al. Trends & issues in crime and criminal justice , 2014 .
[23] Audrey Guinchard,et al. Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge: Polity (Outline of update) , 2007, SSRN Electronic Journal.
[24] Stefan Savage,et al. An inquiry into the nature and causes of the wealth of internet miscreants , 2007, CCS '07.
[25] M. Felson,et al. Crime and Everyday Life , 1998 .
[26] D P Farrington,et al. Early Predictors of Adolescent Aggression and Adult Violence , 1989, Violence and Victims.
[27] Rob McCusker,et al. Financing of terrorism: risks for Australia , 2010 .
[28] Jonathan Lusthaus. How organised is organised cybercrime? , 2013 .
[29] Sigi Goode,et al. What Motivates Software Crackers? , 2006 .
[30] Emily Finch. The problem of stolen identity and the Internet , 2013 .
[31] Keven G. Ruby,et al. The Insider Threat to Information Systems , 2022 .
[32] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[33] Mark Israel,et al. Strictly Confidential?Integrity and the Disclosure of Criminological and Socio–Legal Research , 2004 .
[34] Graham R. Gibbs,et al. Analyzing Biographies and Narratives , 2014 .
[35] T. Bennett,et al. Exploring the Offender’s Perspective: Observing and Interviewing Criminals , 1990 .