Taisiia Garkava, Asier Moneva & E. Rutger Leukfeldt. (2024) Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures. Trends in Organized Crime.
Crossref
Renushka Madarie, Christianne de Poot & Marleen Weulen Kranenbarg. (2023) Criminal clickbait: a panel data analysis on the attractiveness of online advertisements offering stolen data. Frontiers in Big Data 6.
Crossref
Jin R. Lee. (2023) Understanding markers of trust within the online stolen data market: An examination of vendors’ signaling behaviors relative to product price point. Criminology & Public Policy 22:4, pages 665-693.
Crossref
Vincent Lennard Kraus. 2023. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
1
32
.
Jordan Brinck, Brooke Nodeland & Scott Belshaw. (2023) The “Yelp-Ification” of the Dark Web: An Exploration of the Use of Consumer Feedback in Dark Web Markets. Journal of Contemporary Criminal Justice 39:2, pages 185-200.
Crossref
Thomas J. Holt & Jin Ree Lee. (2022) A crime script model of Dark web Firearms Purchasing. American Journal of Criminal Justice 48:2, pages 509-529.
Crossref
Thomas J. Holt. (2023) Understanding the state of criminological scholarship on cybercrimes. Computers in Human Behavior 139, pages 107493.
Crossref
Masarah Paquet-Clouston & Sebastián García. (2022) On the motivations and challenges of affiliates involved in cybercrime. Trends in Organized Crime.
Crossref
Le Van Hoang, Nguyen Xuan Nhu, To Trong Nghia, Nguyen Huu Quyen, Van-Hau Pham & Phan The Duy. (2022) Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase. Leveraging Deep Reinforcement Learning for Automating Penetration Testing in Reconnaissance and Exploitation Phase.
Thomas J. Holt, Jin R. Lee & Elizabeth O’Dell. (2022) Assessing the Practices of Online Counterfeit Currency Vendors. Crime & Delinquency, pages 001112872211340.
Crossref
Benoît Dupont & Jonathan Lusthaus. (2021) Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals. Social Science Computer Review 40:4, pages 892-913.
Crossref
Marleen Weulen Kranenbarg. (2022) When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses. Computers in Human Behavior 130, pages 107186.
Crossref
Eric Rutger Leukfeldt & Thomas J. Holt. (2022) Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior 126, pages 106979.
Crossref
Julia Busch-Casler & Marija Radic. 2022. Research Challenges in Information Science. Research Challenges in Information Science
3
19
.
Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk & Mark de Reuver. (2021) Business Data Sharing through Data Marketplaces: A Systematic Literature Review. Journal of Theoretical and Applied Electronic Commerce Research 16:7, pages 3321-3339.
Crossref
Vit Sembera, Masarah Paquet-Clouston, Sebastian Garcia & Maria Jose Erquiaga. (2021) Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service. Cybercrime Specialization: An Exposé of a Malicious Android Obfuscation-as-a-Service.
Peter Kieseberg, Sebastian Schrittwieser & Edgar Weippl. (2021) Secure Internal Data Markets. Future Internet 13:8, pages 208.
Crossref
Ben R. Lane, Paul M. Salmon, Dennis Desmond, Adrian Cherney, Adam Carley, Adam Hulme & Neville A. Stanton. (2020) Out of control? Using STAMP to model the control and feedback mechanisms surrounding identity crime in darknet marketplaces. Applied Ergonomics 89, pages 103223.
Crossref
Saiba Nazah, Shamsul Huda, Jemal Abawajy & Mohammad Mehedi Hassan. (2020) Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access 8, pages 171796-171819.
Crossref
Felipe Thomaz, Carolina Salge, Elena Karahanna & John Hulland. (2019) Learning from the Dark Web: leveraging conversational agents in the era of hyper-privacy to enhance marketing. Journal of the Academy of Marketing Science 48:1, pages 43-63.
Crossref
E. R. (Rutger) Leukfeldt, E. W. (Edwin) Kruisbergen, E. R. (Edward) Kleemans & R. A. (Robert) Roks. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
961
980
.
Ramakrishna Ayyagari. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
939
959
.
Thomas S. Hyslip. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
815
846
.
Marleen Weulen Kranenbarg. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
771
792
.
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
27
43
.
Sergio Pastrana, Alice Hutchings, Daniel Thomas & Juan Tapiador. (2019) Measuring eWhoring. Measuring eWhoring.
Bradford W. Reyns, Bonnie S. Fisher, Adam M. Bossler & Thomas J. Holt. (2018) Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?. American Journal of Criminal Justice 44:1, pages 63-82.
Crossref
E. R. (Rutger) Leukfeldt, E. W. (Edwin) Kruisbergen, E. R. (Edward) Kleemans & R. A. (Robert) Roks. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
20
.
Ramakrishna Ayyagari. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
21
.
Thomas S. Hyslip. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
33
.
Marleen Weulen Kranenbarg. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
22
.
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
17
.
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David MaimonRussell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon. 2019. Cybercrime Prevention. Cybercrime Prevention
1
14
.
Tarmo Kalvet, Marek Tiits & Pille Ubakivi-Hadachi. 2019. Electronic Governance and Open Society: Challenges in Eurasia. Electronic Governance and Open Society: Challenges in Eurasia
67
81
.
Olga Smirnova & Thomas J. Holt. (2017) Examining the Geographic Distribution of Victim Nations in Stolen Data Markets. American Behavioral Scientist 61:11, pages 1403-1426.
Crossref
Benoît Dupont, Anne-Marie Côté, Jean-Ian Boutin & José Fernandez. (2017) Darkode: Recruitment Patterns and Transactional Features of “the Most Dangerous Cybercrime Forum in the World”. American Behavioral Scientist 61:11, pages 1219-1243.
Crossref
Mitch Macdonald & Richard Frank. (2017) Shuffle Up and Deal: Use of a Capture–Recapture Method to Estimate the Size of Stolen Data Markets. American Behavioral Scientist 61:11, pages 1313-1340.
Crossref
Laviniu Bojor. (2017) Security and Privacy in Smart Devices Era. International conference KNOWLEDGE-BASED ORGANIZATION 23:1, pages 44-52.
Crossref
Cameron H. Malin, Terry Gudaitis, Thomas J. Holt & Max Kilger. 2017. Deception in the Digital Age. Deception in the Digital Age
125
148
.