Carolina Roque, Maria Canudo, Samuel Moreira & Inês Sousa Guedes. 2023. Contemporary Challenges for Cyber Security and Data Privacy. Contemporary Challenges for Cyber Security and Data Privacy
83
107
.
. 2023. Cybercrime During the SARS‐CoV‐2 Pandemic (2019–2022). Cybercrime During the SARS‐CoV‐2 Pandemic (2019–2022)
81
108
.
Steven Kemp, David Buil-Gil, Fernando Miró-Llinares & Nicholas Lord. (2021) When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice 23:3, pages 468-489.
Crossref
Erica R Fissel & Jin R Lee. (2023) The cybercrime illusion: Examining the impact of cybercrime misbeliefs on perceptions of cybercrime seriousness. Journal of Criminology 56:2-3, pages 150-169.
Crossref
Shalini Nataraj-Hansen. (2023) ‘Should’ve known better’: Using Lerner’s Belief in a Just World to understand how the Fraud Justice Network observe victims of online romance and investment frauds. International Review of Victimology, pages 026975802311679.
Crossref
Shalini Nataraj-Hansen & Kelly Richards. (2022) Why do fraud victims get blamed? Lerner’s Belief in a Just World and its application to victims of online fraud. Journal of Financial Crime 30:3, pages 828-839.
Crossref
Ethem Ilbiz & Christian KaunertEthem Ilbiz & Christian Kaunert. 2023. The Sharing Economy for Tackling Cybercrime. The Sharing Economy for Tackling Cybercrime
29
42
.
Ethem Ilbiz & Christian KaunertEthem Ilbiz & Christian Kaunert. 2023. The Sharing Economy for Tackling Cybercrime. The Sharing Economy for Tackling Cybercrime
13
28
.
Alice Baraz & Reza Montasari. 2023. Digital Transformation in Policing: The Promise, Perils and Solutions. Digital Transformation in Policing: The Promise, Perils and Solutions
59
83
.
Michael Wilson, Cassandra Cross, Thomas Holt & Anastasia Powell. (2022) Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. Journal of Criminology 55:4, pages 468-494.
Crossref
Diarmaid Harkin & Chad Whelan. (2021) Perceptions of police training needs in cyber-crime. International Journal of Police Science & Management 24:1, pages 66-76.
Crossref
Josep-Maria Tamarit-Sumalla, Claudia Malpica-Lander & Victòria Fernández-Cruz. (2022) Co-Occurrence of Online and Offline Victimization: A Latent Class Analysis in University Students. Social Sciences 11:1, pages 16.
Crossref
Larissa S. Christensen, Susan Rayment-McHugh, Tim Prenzler, Yi-Ning Chiu & Julianne Webster. (2021) The theory and evidence behind law enforcement strategies that combat child sexual abuse material. International Journal of Police Science & Management 23:4, pages 392-405.
Crossref
Chad Whelan & Diarmaid Harkin. (2019) Civilianising specialist units: Reflections on the policing of cyber-crime. Criminology & Criminal Justice 21:4, pages 529-546.
Crossref
Julie Berg & Clifford Shearing. (2021) Criminology: Some lines of flight. Journal of Criminology 54:1, pages 21-33.
Crossref
Jin R. Lee, Thomas J. Holt, George W. Burruss & Adam M. Bossler. (2019) Examining English and Welsh Detectives’ Views of Online Crime. International Criminal Justice Review 31:1, pages 20-39.
Crossref
George Grispos. 2021. Encyclopedia of Security and Emergency Management. Encyclopedia of Security and Emergency Management
84
89
.
James F. Popham. 2021. Cybercrime in Context. Cybercrime in Context
103
122
.
Camille Faubert, David Décary-Hétu, Aili Malm, Jerry Ratcliffe & Benoît Dupont. 2021. Cybercrime in Context. Cybercrime in Context
351
370
.
Muktar Bello & Marie Griffiths. 2021. Rethinking Cybercrime. Rethinking Cybercrime
213
235
.
Steven Kemp, Fernando Miró-Llinares & Asier Moneva. (2020) The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain. European Journal on Criminal Policy and Research 26:3, pages 293-312.
Crossref
Mark Button. (2019) The “New” Private Security Industry, the Private Policing of Cyberspace and the Regulatory Questions. Journal of Contemporary Criminal Justice 36:1, pages 39-55.
Crossref
Fernando Miró-Llinares & Asier Moneva. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
491
511
.
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
27
43
.
Brian Nussbaum & Emmanuel Sebastian Udoh. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
155
182
.
Pierre-Luc Pomerleau & David L. LoweryPierre-Luc Pomerleau & David L. Lowery. 2020. Countering Cyber Threats to Financial Institutions. Countering Cyber Threats to Financial Institutions
47
85
.
Mark Manning & Stuart Agnew. 2020. Policing in the Era of AI and Smart Societies. Policing in the Era of AI and Smart Societies
59
82
.
Diarmaid Harkin & Chad Whelan. (2019) Exploring the implications of ‘low visibility’ specialist cyber-crime units. Australian & New Zealand Journal of Criminology 52:4, pages 578-594.
Crossref
Jeffrey Nowacki & Dale Willits. (2019) An organizational approach to understanding police response to cybercrime. Policing: An International Journal 43:1, pages 63-76.
Crossref
Morvareed Bidgoli, Bart P. Knijnenburg, Jens Grossklags & Brad Wardman. (2019) Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
Steve G.A. van de Weijer, Rutger Leukfeldt & Wim Bernasco. (2018) Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology 16:4, pages 486-508.
Crossref
Suleman Lazarus & Geoffrey U. Okolorie. (2019) The bifurcation of the Nigerian cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) agents. Telematics and Informatics 40, pages 14-26.
Crossref
Alice Hutchings & Sergio Pastrana. (2019) Understanding eWhoring. Understanding eWhoring.
Steven Furnell & Samantha Dowling. (2019) Cyber crime: a portrait of the landscape. Journal of Criminological Research, Policy and Practice 5:1, pages 13-26.
Crossref
David MaimonEric R. Louderback. (2019) Cyber-Dependent Crimes: An Interdisciplinary Review. Annual Review of Criminology 2:1, pages 191-216.
Crossref
Fernando Miró-Llinares & Asier Moneva. 2020. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
22
.
Kyung-Shick Choi, Claire S. Lee & Eric R. Louderback. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
17
.
Brian Nussbaum & Emmanuel Sebastian Udoh. 2019. The Palgrave Handbook of International Cybercrime and Cyberdeviance. The Palgrave Handbook of International Cybercrime and Cyberdeviance
1
28
.
George Grispos. 2019. Encyclopedia of Security and Emergency Management. Encyclopedia of Security and Emergency Management
1
7
.
Anthony Amicelle. (2017) Policing through misunderstanding: insights from the configuration of financial policing. Crime, Law and Social Change 69:2, pages 207-226.
Crossref
Marie Henshaw, James R. P. Ogloff & Jonathan A. Clough. (2015) Looking Beyond the Screen: A Critical Review of the Literature on the Online Child Pornography Offender. Sexual Abuse 29:5, pages 416-445.
Crossref
Morvareed Bidgoli & Jens Grossklags. (2017) “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing. “Hello. This is the IRS calling.”: A case study on scams, extortion, impersonation, and phone spoofing.
Benoit Dupont. (2016) Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law and Social Change 67:1, pages 97-116.
Crossref
Vanja Bajovic. 2017. Cybercrime, Organized Crime, and Societal Responses. Cybercrime, Organized Crime, and Societal Responses
87
101
.
S. Boes & E. R. Leukfeldt. 2017. Cyber-Physical Security. Cyber-Physical Security
185
203
.
Anna Leppänen, Timo Kiravuo & Sari Kajantie. (2016) Policing the cyber-physical space. The Police Journal: Theory, Practice and Principles 89:4, pages 290-310.
Crossref
Mariam Nouh, Jason R. C. Nurse & Michael Goldsmith. (2016) Towards Designing a Multipurpose Cybercrime Intelligence Framework. Towards Designing a Multipurpose Cybercrime Intelligence Framework.
Bilel Benbouzid & Daniel Ventre. (2016) Pour une sociologie du crime en ligne. Réseaux n° 197-198:3, pages 9-30.
Crossref
Ronald van Steden, Jennifer Wood, Clifford Shearing & Hans Boutellier. (2013) The many faces of nodal policing: Team play and improvisation in Dutch community safety. Security Journal 29:3, pages 327-339.
Crossref
Morvareed Bidgoli & Jens Grossklags. (2016) End user cybercrime reporting: what we know and what we can do to improve it. End user cybercrime reporting: what we know and what we can do to improve it.
Kimberly A. DeTardo-Bora & Dhruba J. Bora. 2016. Digital Forensics. Digital Forensics
119
132
.
Vaibhav Garg & L. Jean Camp. (2015) Spare the rod, spoil the network security? Economic analysis of sanctions online. Spare the rod, spoil the network security? Economic analysis of sanctions online.
Ronald van Steden, Zeger van der Wal & Karin Lasthuizen. (2013) Overlapping Values, Mutual Prejudices. Administration & Society 47:3, pages 220-243.
Crossref
Budi Arief, Mohd Azeem Bin Adzmi & Thomas Gross. (2015) Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers. IEEE Security & Privacy 13:1, pages 71-76.
Crossref
Monica Lagazio, Nazneen Sherif & Mike Cushman. (2014) A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security 45, pages 58-74.
Crossref
Benoît Dupont12. (2014) La régulation du cybercrime comme alternative à la judiciarisation. Criminologie 47:2, pages 179-201.
Crossref
David S. Wall. 2014. Organized Crime, Corruption and Crime Prevention. Organized Crime, Corruption and Crime Prevention
227
238
.
Michael Levi & Matthew Leighton Williams. (2013) Multi-agency partnerships in cybercrime reduction. Information Management & Computer Security 21:5, pages 420-443.
Crossref
Jessica Bregant & Robert BregantIIII. 2014. The Encyclopedia of Criminology and Criminal Justice. The Encyclopedia of Criminology and Criminal Justice
1
5
.
Jessica Bregant & Robert BregantIIII. 2014. The Encyclopedia of Criminology and Criminal Justice. The Encyclopedia of Criminology and Criminal Justice
1
5
.
Sadia Afroz, Vaibhav Garg, Damon McCoy & Rachel Greenstadt. (2013) Honor among thieves: A common's analysis of cybercrime economies. Honor among thieves: A common's analysis of cybercrime economies.
Vaibhav Garg & Shirin Nilizadeh. (2013) Craigslist Scams and Community Composition: Investigating Online Fraud Victimization. Craigslist Scams and Community Composition: Investigating Online Fraud Victimization.
Laura Huey, Johnny Nhan & Ryan Broll. (2012) ‘Uppity civilians’ and ‘cyber-vigilantes’: The role of the general public in policing cyber-crime. Criminology & Criminal Justice 13:1, pages 81-97.
Crossref
Roderic Broadhurst & Lennon Y. C. Chang. 2013. Handbook of Asian Criminology. Handbook of Asian Criminology
49
63
.
Tae Jin Chung & 양승돈. (2012) A Study on the introduction of Online/Offline ID card. The Police Science Journal 7:2, pages 333-359.
Crossref
David Barnard-Wills. (2012) E-safety education: Young people, surveillance and responsibility. Criminology & Criminal Justice 12:3, pages 239-255.
Crossref
Hans Boutellier & Ronald van Steden. 2011. International and Comparative Criminal Justice and Urban Governance. International and Comparative Criminal Justice and Urban Governance
461
482
.
Virginiah Sekgwathe & Mohammad Talib. 2011. e-Technologies and Networks for Development. e-Technologies and Networks for Development
171
181
.
Mark Taylor, John Haggerty, David Gresty & Paul Fergus. (2010) Forensic investigation of peer-to-peer networks. Network Security 2010:9, pages 12-15.
Crossref
Travis C. PrattKristy Holtfreter & Michael D. Reisig. (2010) Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory. Journal of Research in Crime and Delinquency 47:3, pages 267-296.
Crossref
Ronald J. Deibert & Rafal Rohozinski. (2010) Risking Security: Policies and Paradoxes of Cyberspace Security. International Political Sociology 4:1, pages 15-32.
Crossref
Nir KshetriNir Kshetri. 2010. The Global Cybercrime Industry. The Global Cybercrime Industry
35
55
.
Lynne D. Roberts. 2009. Handbook of Research on Technoethics. Handbook of Research on Technoethics
575
592
.
Maria Grazia Porcedda. (2014) Public-Private Partnerships: A Softt Approach to Cybersecurity? Views from the European Union. SSRN Electronic Journal.
Crossref
Natasha Tusikov. (2018) Internet Firms as Global Regulators. SSRN Electronic Journal.
Crossref
Vaibhav Garg & L. Jean Camp. (2013) Ex Ante vs. Ex Post: Economically Efficient Sanctioning Regimes for Online Risks. SSRN Electronic Journal.
Crossref
Roderic Broadhurst & Yao-Chung Chang. (2012) Cybercrime in Asia: Trends and Challenges. SSRN Electronic Journal.
Crossref