426
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

HIDING CRIMES IN CYBERSPACE

Pages 251-276 | Published online: 02 Dec 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Dale Ballucci & Molly-Gloria Patel. (2022) Digital media ‘changes the game’: investigating digital affordances impacts on sex crime and policing in the 21st century. Information, Communication & Society 0:0, pages 1-18.
Read now

Articles from other publishers (15)

Sachil Kumar & Geetika Saxena. 2022. Research Anthology on Child and Domestic Abuse and Its Prevention. Research Anthology on Child and Domestic Abuse and Its Prevention 639 660 .
Sachil Kumar & Geetika Saxena. 2021. Combating the Exploitation of Children in Cyberspace. Combating the Exploitation of Children in Cyberspace 117 145 .
Brian Nussbaum & Emmanuel Sebastian Udoh. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 155 182 .
Brian Nussbaum & Emmanuel Sebastian Udoh. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance 1 28 .
Alexander Testa, David Maimon, Bertrand Sobesto & Michel Cukier. (2017) Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy 16:3, pages 689-726.
Crossref
Anjney Pandey & Subhranil Som. (2016) Applications and usage of visual cryptography: A review. Applications and usage of visual cryptography: A review.
Sue Conger, Joanne H. Pratt & Karen D. Loch. (2013) Personal information privacy and emerging technologies. Information Systems Journal 23:5, pages 401-417.
Crossref
Hendi Yogi Prabowo. (2011) Building our defence against credit card fraud: a strategic view. Journal of Money Laundering Control 14:4, pages 371-386.
Crossref
. 2011. Sphères de surveillance. Sphères de surveillance 197 215 .
Sue Conger. 2009. Handbook of Research on Technoethics. Handbook of Research on Technoethics 767 793 .
Christine Harrison. (2016) Cyberspace and Child Abuse Images. Affilia 21:4, pages 365-379.
Crossref
Nagaraja Thanthry, Christopher Goodrich & Ravi Pendse. (2006) Calea Compliant Secure Voice Over IP System. Calea Compliant Secure Voice Over IP System.
Ronald Leenes & Bert-Jaap Koops. 2006. Coding Regulation. Coding Regulation 141 203 .
. 2002. Encyclopedia of Software Engineering. Encyclopedia of Software Engineering.
Blaise Cronin. (2001) Information warfare: peering inside Pandora’s postmodern box. Library Review 50:6, pages 279-295.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.