NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 796
1.
  • A CRIME SCRIPT ANALYSIS OF ... A CRIME SCRIPT ANALYSIS OF THE ONLINE STOLEN DATA MARKET
    Hutchings, Alice; Holt, Thomas J. British journal of criminology, 05/2015, Volume: 55, Issue: 3
    Journal Article
    Peer reviewed

    The purpose of this study is to better understand the online black market economy, specifically relating to stolen data, using crime script analysis. Content analysis of 13 English-and ...
Full text
2.
  • An Exploration of the Invol... An Exploration of the Involuntary Celibate (Incel) Subculture Online
    O’Malley, Roberta Liggett; Holt, Karen; Holt, Thomas J. Journal of interpersonal violence, 04/2022, Volume: 37, Issue: 7-8
    Journal Article
    Peer reviewed

    Incels, a portmanteau of the term involuntary celibates, operate in online communities to discuss difficulties in attaining sexual relationships. Past reports have found that multiple elements of the ...
Full text
3.
  • Cybercrime on the menu? Exa... Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals
    Leukfeldt, Eric Rutger; Holt, Thomas J. Computers in human behavior, January 2022, 2022-01-00, 20220101, Volume: 126
    Journal Article
    Peer reviewed
    Open access

    Criminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on ...
Full text

PDF
4.
  • Examining the Forces Shapin... Examining the Forces Shaping Cybercrime Markets Online
    Holt, Thomas J. Social science computer review, 04/2013, Volume: 31, Issue: 2
    Journal Article
    Peer reviewed

    Malicious software is increasingly used by hackers and attackers in order to acquire sensitive information and compromise various systems. The sophistication of these tools has increased to such a ...
Full text
5.
  • Use of a Multitheoretic Mod... Use of a Multitheoretic Model to Understand and Classify Juvenile Computer Hacking Behavior
    Fox, Bryanna; Holt, Thomas J. Criminal justice and behavior, 07/2021, Volume: 48, Issue: 7
    Journal Article
    Peer reviewed

    Criminological inquiry has identified a range of risk factors associated with juvenile delinquency. However, little research has assessed juvenile computer hacking, despite the substantial harm and ...
Full text
6.
  • Assessing the Practices and... Assessing the Practices and Products of Darkweb Firearm Vendors
    Copeland, Christopher; Wallin, Mikaela; Holt, Thomas J. Deviant behavior, 08/2020, Volume: 41, Issue: 8
    Journal Article
    Peer reviewed

    The development of the Darknet as a parallel network to the Web in the 21st century has facilitated illegal trafficking in small arms, as defined by the United Nations. The authors have used ...
Full text
7.
  • The heritability of metabol... The heritability of metabolite concentrations in stored human red blood cells
    van 't Erve, Thomas J.; Wagner, Brett A.; Martin, Sean M. ... Transfusion (Philadelphia, Pa.), August 2014, Volume: 54, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Background The degeneration of red blood cells (RBCs) during storage is a major issue in transfusion medicine. Family studies in the 1960s established the heritability of the RBC storage lesion based ...
Full text

PDF
8.
  • The heritability of hemolys... The heritability of hemolysis in stored human red blood cells
    Van 't Erve, Thomas J.; Wagner, Brett A.; Martin, Sean M. ... Transfusion (Philadelphia, Pa.), June 2015, Volume: 55, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    BACKGROUND The transfusion of red blood cells (RBCs) with maximum therapeutic efficacy is a major goal in transfusion medicine. One of the criteria used in determining stored RBC quality is ...
Full text

PDF
9.
  • Regulating Cybercrime throu... Regulating Cybercrime through Law Enforcement and Industry Mechanisms
    HOLT, THOMAS J. The Annals of the American Academy of Political and Social Science, 09/2018, Volume: 679, Issue: 1
    Journal Article
    Peer reviewed

    Cybercrimes, or offenses enabled by technology, affect computer systems and people and prove difficult to pursue through traditional criminal justice strategies due to jurisdictional challenges and ...
Full text
10.
  • The Human Factor of Cybercr... The Human Factor of Cybercrime (Edition 1)
    Rutger Leukfeldt, Thomas J. Holt 10/2019
    eBook
    Open access

    Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by ...
Full text

PDF
1 2 3 4 5
hits: 796

Load filters