The Locator -- [(title = "Trespassers ")]

35 records matched your query       


Record 7 | Previous Record | Long Display | Next Record
03261aam a2200385 i 4500
001 0D8B135EF5D511E7B33F7C0497128E48
003 SILO
005 20180110010212
008 160915s2017    enk      b    001 0 eng  
010    $a 2016029587
020    $a 1138668834
020    $a 9781138668836
035    $a (OCoLC)958962647
040    $a DLC $b eng $e rda $c DLC $d YDXCP $d BTCTA $d OCLCF $d YDX $d UCX $d WAU $d UtOrBLW $d SILO
042    $a pcc
050 00 $a HV6773 $b .H6486 2017
100 1  $a Holt, Thomas J., $d 1978- $e author. $0 http://id.loc.gov/authorities/names/n2010024696
245 10 $a Cybercrime through an interdisciplinary lens / $c edited by Thomas J. Holt.
264  1 $a London ; $b Routledge, Taylor & Francis Group, $c 2017.
300    $a xiv, 251 pages ; $c 25 cm.
490 1  $a Routledge studies in crime and society ; $v 26
504    $a Includes bibliographical references and index.
505 00 $t Adaptation strategies of cybercriminals to interventions from public and private sectors / $r Jarmo Van Lenthe. $t The evolution of cybercrime, 2006-2016 / $r Peter Grabosky -- $t Cybercrime research at the crossroads : where the field currently stands and innovative strategies to move forward / $r Adam M. Bossler -- $t Conducting large-scale analyses of underground hacker communities / $r Victor Benjamin, $r Sagar Samtani, $r Hsinchun Chen -- $t The evolving nature of nation state malicious online actor relationships / $r Max Kilger -- $t Exploring the possibility of 'moral hazard' among victims of identity fraud : the relation between reimbursement for unauthorized cash withdrawals and risky online behavior / $r Johan Van Wilsem -- $t Ransomware and cryptocurrency : partners in crime / $r Gail-Joon Ahn, $r Adam Doupe, $r Ziming Zhao, $r Kevin Liao -- $t Organizational cybervictimization : data breach prevention using a victimological approach / $r Mark Stockman, $r Joseph Nedelec, $r William Mackey -- $t Sanction threat and friendly persuasion effects on system trespassers' behaviors during a system trespassing event / $r Hattie Jones, $r David Maimon, $r Wuling Ren -- $t Gendering cybercrime / $r Alice Hutchings, $r Yi Ting Chua -- $t Seeing the forest through the trees : identifying key players in the online distribution of child sexual exploitation material / $r Bryce G. Westlake, $r Richard Frank -- $t Adaptation strategies of cybercriminals to interventions from public and private sectors / $r Floor Jansen, $r Jarmo Van Lenthe.
650  0 $a Computer crimes. $0 http://id.loc.gov/authorities/subjects/sh85029492
650  0 $a Computer crimes $x Prevention. $0 http://id.loc.gov/authorities/subjects/sh2008117723
650  0 $a Computer crimes $x Investigation. $0 http://id.loc.gov/authorities/subjects/sh85029493
650  0 $a Cyberterrorism. $0 http://id.loc.gov/authorities/subjects/sh00001974
650  7 $a Computer crimes. $2 fast $0 (OCoLC)fst00872063
650  7 $a Computer crimes $x Investigation. $2 fast $0 (OCoLC)fst00872065
650  7 $a Computer crimes $x Prevention. $2 fast $0 (OCoLC)fst00872068
650  7 $a Cyberterrorism. $2 fast $0 (OCoLC)fst00885802
830  0 $a Routledge studies in crime and society ; $v 26. $0 http://id.loc.gov/authorities/names/no2012155322
941    $a 1
952    $l OVUX522 $d 20191211025410.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=0D8B135EF5D511E7B33F7C0497128E48

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.