Your selections:
The seven scam types: Mapping the terrain of cybercrime
- Stabek, Amber, Watters, Paul, Layton, Robert
Authorship attribution for Twitter in 140 characters or less
- Layton, Robert, Watters, Paul, Dazeley, Richard
China's domestic migration and crime: A case study of Shanghai
Understanding victims of identity theft: Preliminary insights
- Turville, Kylie, Yearwood, John, Miller, Charlynn
Identity crime : The challenges in the regulation of identity crime
The importance of mandatory data breach notification to identity crime
- Holm, Eric, Mackenzie, Geraldine
Malicious Spam Emails Developments and Authorship Attribution
- Alazab, Mamoun, Layton, Robert, Broadhurst, Roderic, Bouhours, Brigitte
Identifying Faked Hotel Reviews Using Authorship Analysis
- Layton, Robert, Watters, Paul, Ureche, Oana
Policing of protest in rural and regional contexts
Farm crime: The forgotten frontier
Can the severity of dependence scale be usefully applied to 'ecstasy'?
- Bruno, Raimondo, Matthews, Allison, Topp, Libby, Degenhardt, Louisa, Gomez, Rapson, Dunn, Matthew
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
- Kopp, Christian, Layton, Robert, Sillitoe, Jim, Gondal, Iqbal
Introduction: Locating regional, rural and remote crime in theoretical and contemporary context
- Harris, Bridget, Harkness, Alistair
Mining malware to detect variants
- Azab, Ahmad, Layton, Robert, Alazab, Mamoun, Oliver, Jonathan
Behaviour tracking : using geospatial and behaviour sequence analysis to map crime
- Keatley, David, Arntfield, Michael, Gill, Paul, Clare, Joe, Oatley, Giles, Bouhana, Noemie, Clarke, David
- Ul Haq, Ikram, Gondal, Iqbal, Vamplew, Peter, Brown, Simon
Morally excused but socially excluded: Denying agency through the defense of mental impairment
- de Vel-Palumbo, Melissa, Schein, Chelsea, Ferguson, Rose, Chang, Melissa Xue-Ling, Bastian, Brock
Are you sure you would like to clear your session, including search history and login status?