[图书][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses

T Holt, A Bossler - 2015 - taylorfrancis.com
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …

Beyond Bitcoin: What blockchain and distributed ledger technologies mean for firms

A Hughes, A Park, J Kietzmann, C Archer-Brown - Business Horizons, 2019 - Elsevier
Blockchain technologies are benefiting from significant interest in both societal and business
contexts. Cryptocurrencies like Bitcoin have grown rapidly in user adoption over the past 8 …

Content or community? A digital business strategy for content providers in the social age

G Oestreicher-Singer, L Zalmanson - MIS quarterly, 2013 - JSTOR
The content industry has been undergoing a tremendous transformation in the last two
decades. We focus in this paper on recent changes in the form of social computing. Although …

[图书][B] Cybercrime and digital forensics: An introduction

TJ Holt, AM Bossler, KC Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

[图书][B] The social and applied psychology of music

A North, D Hargreaves - 2008 - books.google.com
Music is so ubiquitous that it can be easy to overlook the powerful influence it exerts in so
many areas of our lives-from birth, through childhood, to old age. The Social and Applied …

What drives purchase intention in the context of online content services? The moderating role of ethical self-efficacy for online piracy

YS Wang, CH Yeh, YW Liao - International journal of information …, 2013 - Elsevier
With the proliferation of online content service industry, understanding the factors affecting
consumer intention to purchase online content services has become an important issue for …

[PDF][PDF] On-line activities, guardianship, and malware infection: An examination of routine activities theory.

AM Bossler, TJ Holt - International Journal of Cyber Criminology, 2009 - academia.edu
Malicious software, such as viruses and Trojan horse programs, can automate a variety of
attacks for criminals and is partially responsible for the global increase in cybercrime …

Low self-control, deviant peer associations, and juvenile cyberdeviance

TJ Holt, AM Bossler, DC May - American journal of criminal justice, 2012 - Springer
Abstract Gottfredson and Hirschi's (1990) general theory of crime and Akers'(1998) social
learning theory have received strong empirical support for explaining crime in both the …

Consumer file sharing of motion pictures

T Hennig-Thurau, V Henning… - Journal of …, 2007 - journals.sagepub.com
Illegal consumer file sharing of motion pictures is considered a major threat to the movie
industry. Whereas industry advocates and some scholars postulate a cannibalistic effect on …

Digital music and online sharing: software piracy 2.0?

S Bhattacharjee, RD Gopal, GL Sanders - Communications of the ACM, 2003 - dl.acm.org
Digital music and online sharing Page 1 COMMUNICATIONS OF THE ACM July 2003/Vol.
46, No. 7 107 The effect of such sharing—induced by technology—is inconclusive …