[Arli, D., Tjiptono, F., Porto, R. (2015). The impact of moral equity, relativism and attitude on individuals’ digital piracy behaviour in a developing country. Marketing Intelligence & Planning, 33 (3), 348-365.10.1108/MIP-09-2013-0149]Search in Google Scholar
[Bossler, A. M., Holt, T. H. (2012). Patrol officers' perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management, 35 (1), 165-181. http://dx.doi.org/10.1108/1363951121121550410.1108/13639511211215504]Search in Google Scholar
[Brenner, S. W. (2008). Cyberthreats: The Emerging Fault Lines of the Nation State, Oxford University Press, New York, NY.10.1093/acprof:oso/9780195385014.001.0001]Search in Google Scholar
[Camarero, C., Anton, C., Rodriguez, J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case. The Electronic Library, 32 (4), 542-566. http://dx.doi.org/10.1108/EL-11-2012-014910.1108/EL-11-2012-0149]Search in Google Scholar
[Duncan, D. F., White, J. B. and Nicholson, T. (2003). Using internet based surveys to reach hidden populations: case of non-abusive illicit drug users. American Journal of Health Behaviour, 27 (3), 208-18.10.5993/AJHB.27.3.2]Search in Google Scholar
[Hinduja, S. (2007). Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International Journal of Cyber Criminology, (1), 1-26.]Search in Google Scholar
[Holt, T. J., Blevins, K. R. and Burkert, N. (2010). Considering the pedophile subculture on-line. Sexual Abuse: Journal of Research and Treatment, (22), 3-24.10.1177/1079063209344979]Search in Google Scholar
[Holz, T., Engelberth, M., Freiling, F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones. In ESORICS Proceedings, (9), 1-18.]Search in Google Scholar
[Kim, D. J., Steinfield, C. and Lai, Y. (2008). Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems, 44 (4), 1000-1015.10.1016/j.dss.2007.11.007]Search in Google Scholar
[Lithuanian Free Market Institute (2014). Lietuvos seseline ekonomika. [Accessed 12.01.2016]. Available from Internet: http://files.lrinka.lt/Seseline_ekonomika/LSE3.pdf]Search in Google Scholar
[Manolas, G., Rontos, K., Sfakianakis, G., Vavouras, I. (2013). The Determinants of the Shadow Economy: The Case of Greece. International Journal of Criminology and Sociological Theory, 6 (1), 1036-1047.]Search in Google Scholar
[Mayayise, T., Osunmakinde, I. O. (2014). E-commerce assurance models and trustworthiness issues: an empirical study. Information Management & Computer Security, 22 (1), 76-96. http://dx.doi.org/10.1108/IMCS-01-2013-000110.1108/IMCS-01-2013-0001]Search in Google Scholar
[McQuade, S. (2006). Technology-enabled crime, policing and security. Journal of Technology Studies, (32), 32-42.10.21061/jots.v32i1.a.5]Search in Google Scholar
[Mello, J. P. (2013). Cybercrime fueled by mature digital underground. [Accessed 10.10.2015]. Available from Internet: http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-by-mature-digitalunderground.html]Search in Google Scholar
[Morz, B. (2011). Migration into the Shadow: Unregistered Work in Poland. Journal of Management and Financial Sciences, 4 (6), 73-112.]Search in Google Scholar
[Russel, B. (2010). Revenue Administration - Managing the Shadow Economy. Technical Notes and Manual, IMF.10.5089/9781462355587.005]Search in Google Scholar
[Senjo, S. R. (2004). An analysis of computer-related crime: comparing police officer perceptions with empirical data. Security Journal, (17), 55-71.10.1057/palgrave.sj.8340168]Search in Google Scholar
[Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime, 22(1), 104-125.10.1108/JFC-09-2013-0051]Search in Google Scholar
[Swire, P. (2009). No cop on the beat: underenforcement in e-commerce and cybercrime. Journal of Telecommunications and High Technology Law, (7), 107-26.]Search in Google Scholar
[Taylor, R. W., Fritsch, E. J., Liederbach, J. and Holt, T. J. (2010). Digital Crime and Digital Terrorism, 2nd ed., Pearson Prentice Hall, Upper Saddle River.]Search in Google Scholar
[Taylor, S. A. (2012). Evaluating digital piracy intentions on behaviours. Journal of Services Marketing, 26 (7), 472-483.10.1108/08876041211266404]Search in Google Scholar
[Vershinina, N., Barrett, R. and Meyer, M. (2009). Polish immigrants in Leicester: forms of capital underpinning entrepreneurial activity, Leicester Business School Occasional Paper Series, N86 (August), Leicester Business School, Leicester.]Search in Google Scholar
[Vershinina, N.; Rodionova, Y. (2011). Methodological issues in studying hidden populations operating in informal economy, International Journal of Sociology and Social Policy, 31(11/12), 697-716.10.1108/01443331111177887]Search in Google Scholar
[Vida, I., Koklic, M. K., Kukar-Kinney, M., Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298-313.10.1108/17505931211282418]Search in Google Scholar
[Vlachos, V., Minou, M., Assimakopouos, V., Toska, A. (2011). The landscape of cybercrime in Greece. Information Management & Computer Security,19(2), 113-123.10.1108/09685221111143051]Search in Google Scholar
[Wall, D. S., Williams, M. (2007). Policing diversity in the digital age: maintaining order in virtual communities. Criminology and Criminal Justice, (7), 391-415.10.1177/1748895807082064]Search in Google Scholar
[Williams, P.; Nicholas, D.; Rowlands, I. (2010). The attitudes and behaviours of illegal downloaders. Aslib Proceedings, 62(3), 283-301.10.1108/00012531011046916]Search in Google Scholar
[Yip, M., Shadbolt, N., Tiropanis, N., Webber, C. (2012). The digital underground economy: A social network approach to understanding cybercrime: Digital Futures 2012. In the third Annual Digital Economy All Hands Conference. [Accessed 10.10.2015]. Available from Internet Available from Internet: http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdf]Search in Google Scholar