Otwarty dostęp

Quantitatively examining the interaction between cybercrime and physical crime


Zacytuj

Back, S. (2019). The cybercrime triangle: An empirical assessment of offender, victim, and place. Miami, FL: Florida International University. Search in Google Scholar

Beeler, A. (2022). Inmate seminaries: How they have positively impacted corrections. Corrections Today, 2022, 34-42. Search in Google Scholar

Brenner, S. (2009). Cyberthreats: The emerging fault lines of the nation state. New York, NY: Oxford University Press. Search in Google Scholar

Bryant, R. & Bryant, S. (2014). Policing digital crime. New York, NY: Routledge. Search in Google Scholar

Bossler, A. M., & Holt, T. J. (2007, November 14). Examining the utility of routine activities theory for cybercrime. Paper presented at the annual meeting of the American Society of Criminology, Atlanta Marriott. Search in Google Scholar

Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2, 308-333. Search in Google Scholar

Collins, S. & McCombie, S. (2012). Stuxnet: The emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence, and Counter Terrorism 7(1), 80-91. Search in Google Scholar

Computer Fraud and Abuse Act of 1986, 100 Stat. 1213. Search in Google Scholar

Curtis, J. & Oxburgh, G. (2022). Understanding cybercrime in ‘real world’ policing and law enforcement. The Police Journal: Theory, Practice, and Principles, 0(0). https://doi.org/10.1177/0032258X221107584 Search in Google Scholar

Cveticanin, N. (2023). Hacking statistics to give you nightmares. Retrieved from https://dataprot.net/statistics/hacking-statistics/ Search in Google Scholar

Cybersecurity and Infrastructure Security Agency. (2018). Combating Cyber Crime. Retrieved from https://www.cisa.gov/combating-cyber-crime Search in Google Scholar

De Cremer, D., Nguyen, B., & Simkin, L. (2017). The integrity challenge of the Internet-of-Things (IoT): On understanding its dark side. Journal of Marketing Management, 33, 1-2. Search in Google Scholar

De Padirac, B. (2018). International dimensions of cyberspace law. New York, NY: Rout-ledge. Search in Google Scholar

Department of Justice. (n.d.). Computer crime and intellectual property section (CCIPS). Retrieved from: https://www.justice.gov/criminal-ccips Search in Google Scholar

Department of Justice. (n.d.). Prosecuting computer crimes. Retrieved from https://www.justice.gov/criminal/file/442156/download Search in Google Scholar

Dixon, V.K. (2009). Understanding the implications of a global village. Inquiries, 1(11), 1-2. Search in Google Scholar

Doss, D.A., Etter, G., Rials, W., McElreath, D., Gokaraju, B., & Standish, H. (2022). Examining the effects of the Federal Information Sharing Modernization Act of 2014 and the Cybersecurity Information Sharing Act of 2015: What were the impacts toward reducing cybercrime incidents. Journal of Gang Research, 29(3), 1-23. Search in Google Scholar

Encyclopedia Britannica. (n.d.) Cybercrime. Retrieved from https://www.britannica.com/topic/cybercrime Search in Google Scholar

European Union Agency for Law Enforcement Cooperation. (2021). Internet Organised Crime Threat Assessment 2021. Retrieved from https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf Search in Google Scholar

Federal Bureau of Investigation. (n.d.). What We Investigate: Cyber. Retrieved from https://www.fbi.gov/investigate/cyber Search in Google Scholar

Federal Bureau of Investigation. (2022). Internet Crime Report: 2021. Retrieved from https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf Search in Google Scholar

Felson, M. & Cohen, L. (1980). Human ecology and crime: A routine activity approach. Human Ecology, 8(4), 389-406. Search in Google Scholar

Henderson, H. (2014). A to Z of computer scientists. New York, NY: Facts on File. Search in Google Scholar

Hoffman, D.E. (2004). CIA slipped bugs to Soviets. Retrieved from https://www.nbc-news.com/id/wbna4394002 Search in Google Scholar

Holt, T. J. & Bossler, A. M. (2009). Examining the applicability of lifestyle-routine activities theory for cybercrime victimization. Deviant Behavior, 30, 1-25. Search in Google Scholar

Ilbiz, E. & Kaunert, C. (2023). The sharing economy for tackling cybercrime. New York, NY: Springer. Search in Google Scholar

International Telecommunications Union (2022). ITU Datahub: Individuals using the Internet. Retrieved from https://datahub.itu.int/data/?e=USA&c=701&i=11624 Search in Google Scholar

Internet World Stats. (2022). Internet Growth Statistics: Todays road to e-Commerce and Global Trade. Retrieved from https://www.internetworldstats.com/emarketing.htm Search in Google Scholar

Kennedy, J. (1926, January 30). An Interview with Nikola Tesla. Collier’s Magazine. Search in Google Scholar

Kigerl, A. (2021). Routine activity theory and malware, fraud, and spam at the national level. Crime Law and Social Change, 76(4). Search in Google Scholar

Koch, C. (2007). You plan to fight cyber crime. CIO, 2007, 34-40. Search in Google Scholar

Kritzinger, E. & Von Solms, S. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847. Search in Google Scholar

Kshetri, N. (2010). The global cybercrime industry. New York, NY: Springer. Search in Google Scholar

Klosowski, T. (2021). We asked appliance manufacturers how long theyll keep connected devices secure. Many couldnt tell us. Retrieved from https://www.nytimes.com/wirecutter/blog/how-long-connected-devices-secure/ Search in Google Scholar

Launiainen, P. (2018). A brief history of everything wireless: How invisible waves have changed the world. Cham, Switzerland: Springer. Search in Google Scholar

Leider, R. (2021). The modern common law of crime. Journal of Criminal Law and Criminology, 111(2), 407-499. Search in Google Scholar

Leukfeldt, E. & Yar, M. (2016) Applying Routine Activity Theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280. Search in Google Scholar

Levin, A. (2013). 9 Household Products That May Be Spying on You: Could you coffee machine be spying on you? Retrieved from https://abcnews.go.com/Business/household-products-spying/story?id=19974898 Search in Google Scholar

McElreath, D., DioGuardi, S., & Doss, D. (2022). Pre-crime prediction: Does it have value? Is it inherently racist? International Journal of Service Science, Management, Engineering, and Technology, 13(1), 1-17. Search in Google Scholar

McElreath, D., Doss, D., Russo, B., Etter, G., Van Slyke, J., Skinner, J., Corey, M., Jensen, C., Wigginton, M., & Nations, R. (2021). Introduction homeland security. (3rd ed.). Boca Raton, FL: CRC Press. Search in Google Scholar

Naik, K. & Patel, S. (2023). An open source smart home management system based on IOT. Wireless Networks, 29, 989-995. Search in Google Scholar

Nir, S. (2022). How a cyberattack plunged a long island county into the 1990s. Retrieved from https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html Search in Google Scholar

Office of the Attorney General. (2014). Intake and Charging Policy for Computer Crime Matters. Retrieved from https://www.justice.gov/criminal-ccips/file/904941/download Search in Google Scholar

Oosterman, N. & Yates D. (2021). Crime and art sociological and criminological perspectives of crimes in the art world. Cham, Switzerland: Springer. Search in Google Scholar

Pesch-Cronin, K. & Marion, N. (2016). Critical infrastructure protection, risk management, and resilience: A policy perspective. Boca Raton, FL: CRC Press. Search in Google Scholar

Rawat, D. & Ghafoor, K. (2019). Smart cities cybersecurity and privacy. Cambridge, MA: Elsevier. Search in Google Scholar

Reed, J. (2032). More school closings coast-to-coast due to ransomware. Retrieved from https://securityintelligence.com/news/schools-closing-due-to-ransomware/ Search in Google Scholar

Sanger, D., Krauss, C., & Perlroth, N. (2021). Cyberattack Forces a Shutdown of a Top U.S. Pipeline. Retrieved from https://www.nytimes.com/2021/05/08/us/politics/cyberattack-colonial-pipeline.html Search in Google Scholar

United States Census Bureau. (2022a). E-Commerce Sales Surged During the Pandemic. Retrieved from https://www.census.gov/library/stories/2022/04/ecommerce-sales-surged-during-pandemic.html Search in Google Scholar

United States Census Bureau. (2022b). Quarterly Retail E-Commerce Sales: 3d Quarter 2022. Retrieved from https://www.census.gov/retail/mrts/www/data/pdf/ec_current.pdf Search in Google Scholar

Waldron, R., Quarles, C., McElreath, D., Walron, M., & Milstein, D. (2009). The criminal justice system. (5th ed.). Tulsa, OK: K&M Publishers. Search in Google Scholar

Whalley, J., Stocker, V., & Lehr, W. (2023). Beyond the pandemic. Bingley, UK: Emerald Publishing. Search in Google Scholar

World Bank. (2022). Databank: Population estimates and projections. Retrieved from: https://databank.worldbank.org/source/population-estimates-and-projections Search in Google Scholar

Visger, M. (2022). The international law sovereignty debate and development of international norms on peacetime cyber operations. Retrieved from https://www.lawfareblog.com/international-law-sovereignty-debate-and-development-international-norms-peacetime-cyber-operations Search in Google Scholar

Vojinovic, I. (2022). More than 70 cybercrime statisticsA $6 trillion problem. Retrieved from https://dataprot.net/statistics/cybercrime-statistics/ Search in Google Scholar

eISSN:
2544-5502
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Social Sciences, Sociology, other, Political Science, Psychology, Education, Education Systems