Thomas J. Holt, Jin R. Lee & Olga Smirnova. (2022) Exploring Risk Avoidance Practices Among On-Demand Cybercrime-as-Service Operations. Crime & Delinquency 69:2, pages 415-438.
Crossref
Zarina I. Vakhitova, Alisa Go & Clair L. Alston-Knox. (2021) Guardians Against Cyber Abuse: Who are They and Why do They Intervene?. American Journal of Criminal Justice 48:1, pages 96-122.
Crossref
L. M. J. Bekkers, E. R. Leukfeldt & T. J. Holt. (2023) Online Communities for Child-Attracted Persons as Informal Mental Health Care: Exploring Self-Reported Wellbeing Outcomes. Sexual Abuse, pages 107906322311548.
Crossref
Benoît Dupont & Jonathan Lusthaus. (2021) Countering Distrust in Illicit Online Networks: The Dispute Resolution Strategies of Cybercriminals. Social Science Computer Review 40:4, pages 892-913.
Crossref
Rajeev V. Gundur, Mark Berry & Dean Taodang. 2021. Researching Cybercrimes. Researching Cybercrimes
145
167
.
Lisa Sugiura. 2021. Researching Cybercrimes. Researching Cybercrimes
473
492
.
Maria Bada, Yi Ting Chua, Ben Collier & Ildiko Pete. 2021. Cybercrime in Context. Cybercrime in Context
237
257
.
Amy Farrell & Ieke de Vries. 2020. The Palgrave International Handbook of Human Trafficking. The Palgrave International Handbook of Human Trafficking
147
162
.
Thomas J. Holt & Jay P. Kennedy. 2019. The Handbook of White‐Collar Crime. The Handbook of White‐Collar Crime
449
468
.
Giorgia Macilotti. (2019) Violence et humiliation à l’ère numérique : une étude en milieu scolaire. Déviance et Société Vol. 43:3, pages 299-328.
Crossref
Thomas J. Holt & Benoit Dupont. (2018) Exploring the Factors Associated With Rejection From a Closed Cybercrime Community. International Journal of Offender Therapy and Comparative Criminology 63:8, pages 1127-1147.
Crossref
Amy Farrell & Ieke de Vries. 2019. The Palgrave International Handbook of Human Trafficking. The Palgrave International Handbook of Human Trafficking
1
16
.
Shuki J. CohenThomas J. HoltSteven M. ChermakJoshua D. Freilich. (2018) Invisible Empire of Hate: Gender Differences in the Ku Klux Klan's Online Justifications for Violence. Violence and Gender 5:4, pages 209-225.
Crossref
Zarina Vakhitova, Julianne Webster, Clair Alston-Knox, Danielle Reynald & Michael Townsley. (2018) Offender–victim relationship and offender motivation in the context of indirect cyber abuse. International Review of Victimology 24:3, pages 347-366.
Crossref
Olga Smirnova & Thomas J. Holt. (2017) Examining the Geographic Distribution of Victim Nations in Stolen Data Markets. American Behavioral Scientist 61:11, pages 1403-1426.
Crossref
Meltem Odabaş, Thomas J. Holt & Ronald L. Breiger. (2017) Markets as Governance Environments for Organizations at the Edge of Illegality: Insights From Social Network Analysis. American Behavioral Scientist 61:11, pages 1267-1288.
Crossref
Thomas J. Holt, Olga Smirnova & Alice Hutchings. (2016) Examining signals of trust in criminal markets online. Journal of Cybersecurity, pages tyw007.
Crossref
Bilel Benbouzid & Daniel Ventre. (2016) Pour une sociologie du crime en ligne. Réseaux n° 197-198:3, pages 9-30.
Crossref
Thomas J. Holt. 2016. The Handbook of Measurement Issues in Criminology and Criminal Justice. The Handbook of Measurement Issues in Criminology and Criminal Justice
29
48
.
Alejandro R. Diaz, Jongeun Choi, Thomas J. Holt, Steven Chermak & Joshua D. Freilich. (2016) Data-driven system identification of the social network dynamics in online postings of an extremist group. Data-driven system identification of the social network dynamics in online postings of an extremist group.
Xiong Zhang, Alex Tsang, Wei T. Yue & Michael Chau. (2015) The classification of hackers by knowledge exchange behaviors. Information Systems Frontiers 17:6, pages 1239-1251.
Crossref
Alice Hutchings & Thomas J. Holt. (2015) A Crime Script Analysis of the Online Stolen Data Market: Table 1. British Journal of Criminology 55:3, pages 596-614.
Crossref
David Décary-Hétu, Benoit Dupont & Francis Fortin. 2014. Networks and Network Analysis for Defence and Security. Networks and Network Analysis for Defence and Security
63
82
.
Thomas J. Holt, Yi-Ting Chua & Olga Smirnova. (2013) An exploration of the factors affecting the advertised price for stolen data. An exploration of the factors affecting the advertised price for stolen data.
Kathleen J. Hanrahan, Mathew T. Smith & Judith E. Sturges. 2012. Online Research Methods in Urban and Planning Studies. Online Research Methods in Urban and Planning Studies
53
69
.