{"title":"Critical Criminology and Cybercrime","authors":"Adrienne L. McCarthy, Kevin F. Steinmetz","doi":"10.1007/978-3-319-90307-1_27-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_27-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime","authors":"Jordana N. Navarro, Catherine D. Marcum","doi":"10.1007/978-3-319-90307-1_18-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_18-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberstalking","authors":"Bradford W. Reyns, Erica R. Fissel","doi":"10.1007/978-3-319-90307-1_57-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_57-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spam-Based Scams","authors":"Alex Kigerl","doi":"10.1007/978-3-319-90307-1_42-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_42-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberwarfare as Realized Conflict","authors":"R. Elder","doi":"10.1007/978-3-319-90307-1_64-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_64-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. R. Leukfeldt, E. Kruisbergen, E. Kleemans, R. Roks
{"title":"Organized Financial Cybercrime: Criminal Cooperation, Logistic Bottlenecks, and Money Flows","authors":"E. R. Leukfeldt, E. Kruisbergen, E. Kleemans, R. Roks","doi":"10.1007/978-3-319-90307-1_65-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_65-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"466 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime","authors":"Kyung-shick Choi, C. S. Lee, Eric R. Louderback","doi":"10.1007/978-3-319-90307-1_2-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_2-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Breaches and GDPR","authors":"Elif Kiesow Cortez","doi":"10.1007/978-3-319-78440-3_39","DOIUrl":"https://doi.org/10.1007/978-3-319-78440-3_39","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legislative Frameworks: The United Kingdom","authors":"P. Bishop","doi":"10.1007/978-3-319-90307-1_4-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_4-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"82 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Timothy R. Lauger, James A. Densley, Richard K. Moule
{"title":"Social Media, Strain, and Technologically Facilitated Gang Violence","authors":"Timothy R. Lauger, James A. Densley, Richard K. Moule","doi":"10.1007/978-3-319-90307-1_59-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_59-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}