Author:
Lukings Melissa,Habibi Lashkari Arash
Publisher
Springer International Publishing
Reference46 articles.
1. Clough, J., & Einstein, A. (2015). Principles of cybercrime.
2. Ram, C. (2016). Jonathan Clough, Principles of Cybercrime, (Cambridge: Cambridge University Press, 2015). Canadian Journal of Law and Technology, 14(1).
3. Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381–395.
4. Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.
5. Urbas, G. (2015). Cybercrime legislation, cases and commentary. LexisNexis Butterworths.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献