[图书][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses

T Holt, A Bossler - 2015 - taylorfrancis.com
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …

Assessing the trends, scale and nature of economic cybercrimes: overview and Issues: In Cybercrimes, cybercriminals and their policing, in crime, law and social …

M Levi - Crime, law and social change, 2017 - Springer
Trends in police-recorded and (where they exist) household survey-measured cybercrimes
for economic gain are reviewed in a range of developed countries–Australia, Canada …

Applying routine activity theory to cybercrime: A theoretical and empirical analysis

ER Leukfeldt, M Yar - Deviant Behavior, 2016 - Taylor & Francis
The central question of this article is whether routine activity theory (RAT) can be used as an
analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of …

Self‐control and victimization: A meta‐analysis

TC Pratt, JJ Turanovic, KA Fox, KA Wright - Criminology, 2014 - Wiley Online Library
A consequential development in victimization theory and research was the idea that
individuals with low self‐control self‐select into the various risky behaviors that may …

[图书][B] Cybercrime and digital forensics: An introduction

TJ Holt, AM Bossler, KC Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

Securing online privacy: An empirical test on Internet scam victimization, online privacy concerns, and privacy protection behaviors

H Chen, CE Beaudoin, T Hong - Computers in human behavior, 2017 - Elsevier
The current study identified the antecedents of being an Internet scam victim and how it
impacts online privacy concerns and privacy protection behaviors. Structural equation …

Financial literacy and fraud detection

C Engels, K Kumar, D Philip - Financial Literacy and Responsible …, 2021 - taylorfrancis.com
Who is better at detecting fraud? This paper finds that more financially knowledgeable
individuals have a higher propensity to detect fraud: a one standard deviation increase in …

Online routines and identity theft victimization: Further expanding routine activity theory beyond direct-contact offenses

BW Reyns - Journal of research in crime and delinquency, 2013 - journals.sagepub.com
Objectives: The purpose of the current study was to extend recent work aimed at applying
routine activity theory to crimes in which the victim and offender never come into physical …

Phishing evolves: Analyzing the enduring cybercrime

AK Ghazi-Tehrani, HN Pontell - The New Technology of Financial …, 2022 - taylorfrancis.com
Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity via electronic communication, has quickly evolved beyond low-skill …

Who views online extremism? Individual attributes leading to exposure

M Costello, J Hawdon, T Ratliff, T Grantham - Computers in human behavior, 2016 - Elsevier
Who is likely to view materials online maligning groups based on race, nationality, ethnicity,
sexual orientation, gender, political views, immigration status, or religion? We use an online …