{"title":"Applying the Techniques of Neutralization to the Study of Cybercrime","authors":"Russell Brewer, S. Fox, C. Miller","doi":"10.1007/978-3-319-90307-1_22-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_22-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114230215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology Use, Abuse, and Public Perceptions of Cybercrime","authors":"S. Furnell","doi":"10.1007/978-3-319-90307-1_9-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_9-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hate Speech in Online Spaces","authors":"Matthew Costello, J. Hawdon","doi":"10.1007/978-3-319-90307-1_60-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_60-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routine Activities","authors":"Billy Henson","doi":"10.1007/978-3-319-90307-1_23-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_23-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Hacking and the Hacker Subculture","authors":"T. Holt","doi":"10.1007/978-3-319-90307-1_31-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_31-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Liggett, J. R. Lee, Ariel L. Roddy, Mikaela A. Wallin
{"title":"The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets","authors":"R. Liggett, J. R. Lee, Ariel L. Roddy, Mikaela A. Wallin","doi":"10.1007/978-3-319-90307-1_17-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_17-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surveillance, Surveillance Studies, and Cyber Criminality","authors":"Brian Nussbaum, E. Udoh","doi":"10.1007/978-3-319-90307-1_16-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_16-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global Voices in Hacking (Multinational Views)","authors":"M. Kranenbarg","doi":"10.1007/978-3-319-78440-3_33","DOIUrl":"https://doi.org/10.1007/978-3-319-78440-3_33","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127531837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counterfeit Products Online","authors":"Jay P. Kennedy","doi":"10.1007/978-3-319-90307-1_46-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_46-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116857445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image-Based Sexual Abuse: A Feminist Criminological Approach","authors":"N. Henry, A. Flynn","doi":"10.1007/978-3-319-90307-1_47-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_47-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}