117 records matched your query
03261aam a2200385 i 4500 001 0D8B135EF5D511E7B33F7C0497128E48 003 SILO 005 20180110010212 008 160915s2017 enk b 001 0 eng 010 $a 2016029587 020 $a 1138668834 020 $a 9781138668836 035 $a (OCoLC)958962647 040 $a DLC $b eng $e rda $c DLC $d YDXCP $d BTCTA $d OCLCF $d YDX $d UCX $d WAU $d UtOrBLW $d SILO 042 $a pcc 050 00 $a HV6773 $b .H6486 2017 100 1 $a Holt, Thomas J., $d 1978- $e author. $0 http://id.loc.gov/authorities/names/n2010024696 245 10 $a Cybercrime through an interdisciplinary lens / $c edited by Thomas J. Holt. 264 1 $a London ; $b Routledge, Taylor & Francis Group, $c 2017. 300 $a xiv, 251 pages ; $c 25 cm. 490 1 $a Routledge studies in crime and society ; $v 26 504 $a Includes bibliographical references and index. 505 00 $t Adaptation strategies of cybercriminals to interventions from public and private sectors / $r Jarmo Van Lenthe. $t The evolution of cybercrime, 2006-2016 / $r Peter Grabosky -- $t Cybercrime research at the crossroads : where the field currently stands and innovative strategies to move forward / $r Adam M. Bossler -- $t Conducting large-scale analyses of underground hacker communities / $r Victor Benjamin, $r Sagar Samtani, $r Hsinchun Chen -- $t The evolving nature of nation state malicious online actor relationships / $r Max Kilger -- $t Exploring the possibility of 'moral hazard' among victims of identity fraud : the relation between reimbursement for unauthorized cash withdrawals and risky online behavior / $r Johan Van Wilsem -- $t Ransomware and cryptocurrency : partners in crime / $r Gail-Joon Ahn, $r Adam Doupe, $r Ziming Zhao, $r Kevin Liao -- $t Organizational cybervictimization : data breach prevention using a victimological approach / $r Mark Stockman, $r Joseph Nedelec, $r William Mackey -- $t Sanction threat and friendly persuasion effects on system trespassers' behaviors during a system trespassing event / $r Hattie Jones, $r David Maimon, $r Wuling Ren -- $t Gendering cybercrime / $r Alice Hutchings, $r Yi Ting Chua -- $t Seeing the forest through the trees : identifying key players in the online distribution of child sexual exploitation material / $r Bryce G. Westlake, $r Richard Frank -- $t Adaptation strategies of cybercriminals to interventions from public and private sectors / $r Floor Jansen, $r Jarmo Van Lenthe. 650 0 $a Computer crimes. $0 http://id.loc.gov/authorities/subjects/sh85029492 650 0 $a Computer crimes $x Prevention. $0 http://id.loc.gov/authorities/subjects/sh2008117723 650 0 $a Computer crimes $x Investigation. $0 http://id.loc.gov/authorities/subjects/sh85029493 650 0 $a Cyberterrorism. $0 http://id.loc.gov/authorities/subjects/sh00001974 650 7 $a Computer crimes. $2 fast $0 (OCoLC)fst00872063 650 7 $a Computer crimes $x Investigation. $2 fast $0 (OCoLC)fst00872065 650 7 $a Computer crimes $x Prevention. $2 fast $0 (OCoLC)fst00872068 650 7 $a Cyberterrorism. $2 fast $0 (OCoLC)fst00885802 830 0 $a Routledge studies in crime and society ; $v 26. $0 http://id.loc.gov/authorities/names/no2012155322 941 $a 1 952 $l OVUX522 $d 20191211025410.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=0D8B135EF5D511E7B33F7C0497128E48Initiate Another SILO Locator Search