[图书][B] Cybercrime and digital forensics: An introduction

T Holt, A Bossler, K Seigfried-Spellar - 2022 - taylorfrancis.com
This book offers a comprehensive and integrative introduction to cybercrime. It provides an
authoritative synthesis of the disparate literature on the various types of cybercrime, the …

Phishing evolves: Analyzing the enduring cybercrime

AK Ghazi-Tehrani, HN Pontell - The New Technology of Financial …, 2022 - taylorfrancis.com
Phishing, the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity via electronic communication, has quickly evolved beyond low-skill …

Risk avoidance behavior on darknet marketplaces

CJ Howell, D Maimon, RC Perkins… - Crime & …, 2024 - journals.sagepub.com
The current study employs a quasi-experimental design to test the efficacy of situational
crime prevention (SCP) in understanding risk avoidance behavior in a darknet environment …

[HTML][HTML] Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective

A Moneva, ER Leukfeldt, SGA Van De Weijer… - Computers in Human …, 2022 - Elsevier
Repeat victimization has been widely studied from the perspective of environmental
criminology for several decades. During this period, criminologists have identified a set of …

Predicting new hackers' criminal careers: A group-based trajectory approach

CJ Hoffman, CJ Howell, RC Perkins, D Maimon… - Computers & …, 2024 - Elsevier
The current study employs group-based trajectory modeling to assess the longitudinal attack
patterns of new hackers involved in website defacement. Specifically, we track the activity of …

[HTML][HTML] Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements

SGA van de Weijer, TJ Holt, ER Leukfeldt - Computers in Human Behavior …, 2021 - Elsevier
Longitudinal criminological studies greatly improved our understanding of the longitudinal
patterns of criminality. These studies, however, focused almost exclusively on traditional …

Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials

D Maimon, CJ Howell, GW Burruss - Computers in Human Behavior, 2021 - Elsevier
Extensive criminological research has investigated the effectiveness of law enforcement
efforts to prevent offenders' reoffending and effect changes in criminal behavior patterns …

Malicious spam distribution: A routine activities approach

RC Perkins, CJ Howell, CE Dodge, GW Burruss… - Deviant …, 2022 - Taylor & Francis
The distribution of malicious spam occurs in substantial numbers around the globe and can
function as a precursor to serious forms of cybercrime. Yet to date, no known study has …

The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups

RC Perkins, M Ouellet, CJ Howell… - Social Science …, 2023 - journals.sagepub.com
Over the past four decades, research on hackers has widely propagated within the social
sciences. Although this area of scholarship yields rich insight into the interpersonal …

An overview of cybercrime law in South Africa

S Snail ka Mtuze, M Musoni - International Cybersecurity Law Review, 2023 - Springer
The COVID-19 pandemic has accelerated the uptake and use of information communication
technologies and led to the digital transformation of different sectors of the economy. For …