S. Samtani, Maggie Abate, Victor A. Benjamin, Weifeng Li
{"title":"Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective","authors":"S. Samtani, Maggie Abate, Victor A. Benjamin, Weifeng Li","doi":"10.1007/978-3-319-90307-1_8-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_8-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercrime and Legislation in an African Context","authors":"Philip N. Ndubueze","doi":"10.1007/978-3-319-90307-1_74-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_74-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131339273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fawn T. Ngo, Anurag Agarwal, R. Govindu, Calen MacDonald
{"title":"Malicious Software Threats","authors":"Fawn T. Ngo, Anurag Agarwal, R. Govindu, Calen MacDonald","doi":"10.1007/978-3-319-90307-1_35-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_35-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130958767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms","authors":"Sesha Kethineni","doi":"10.1007/978-3-319-90307-1_7-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_7-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk and Protective Factors for Cyberbullying Perpetration and Victimization","authors":"Denise Wilson, Kirsten L. Witherup, A. Payne","doi":"10.1007/978-3-319-78440-3_56","DOIUrl":"https://doi.org/10.1007/978-3-319-78440-3_56","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126637417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Rise of Online Vigilantism","authors":"J. Smallridge, Philip Wagner","doi":"10.1007/978-3-319-90307-1_68-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_68-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sexual Subcultures and Online Spaces","authors":"T. Deshotels, C. Forsyth","doi":"10.1007/978-3-319-78440-3_48","DOIUrl":"https://doi.org/10.1007/978-3-319-78440-3_48","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"19 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercrime Legislation in the United States","authors":"A. Bossler","doi":"10.1007/978-3-319-90307-1_3-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_3-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"220 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Romance Fraud","authors":"Cassandra Cross","doi":"10.1007/978-3-319-90307-1_41-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_41-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Child Sexual Exploitation: Introduction to a Global Problem","authors":"Kathryn C. Seigfried-Spellar, V. Soldino","doi":"10.1007/978-3-319-90307-1_53-1","DOIUrl":"https://doi.org/10.1007/978-3-319-90307-1_53-1","url":null,"abstract":"","PeriodicalId":443036,"journal":{"name":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125839498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}