top of page

Publications - 2013

  • B. Dupont (2013), “Skills and trust: A tour inside the hard drives of computer hackers”, in C. Morselli (ed.), Illicit networks, Routledge, Oxford, 195-217.

  • Burruss, G.W., Holt T.J., & Bossler, A.M. (2013). “Exploring the Utility of Open Source Data to Predict Malicious Software Creation.” In Cyber Infrastructure Protection, Volume 2. Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau, eds. Carlisle Barracks, PA: U.S. Army War College Press.

  • Cerezo, A. (2013). CCTV and crime displacement: A quasi-experimental evaluation. European Journal of Criminology, 10(2), 222-236.‏

  • Davidson, J., & Martellozzo, E. (2013). Exploring young people's use of social networking sites and digital media in the internet safety context: A comparison of the UK and Bahrain. Information, Communication & Society, 16(9), 1456-1476.‏

  • Décary-Hétu, David. (2013). “Le piratage informatique.“ IN Fortin, Francis. (ed.). Cybercriminalité - Entre inconduite et crime organisé. Montreal, Canada : Presses internationales Polytechnique.

  • Décary-Hétu, David. (2013). “Information Exchange Paths In IRC Hacking Chat Rooms.” IN Morselli, Carlo. (ed.). Crime And Networks. London, UK: Routledge.

  • Décary-Hétu, David & Anna Leppänen. (2013). “Criminals And Signals: Assessment Of Criminal Performance In The Carding Underworld.” Security Journal. 29(3): 442-460.

  • D. Décary-Hétu & B. Dupont (2013), “Reputation in a dark network of online criminals”, Global Crime, 14 (2-3): 175-196.

  • Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (eds), Global Criminology: Crime and Victimization in the Globalized Era (pp. 93-114). Boca Raton: CRC Press.

  • Hutchings, A., Smith, R. G. & James, L. (2013). Cloud computing for small business: Criminal and security threats and prevention measures. Trends & Issues in Crime & Criminal Justice Series No. 456. Canberra: Australian Institute of Criminology.

  • Jansen, J., E.R. Leukfeldt, J. Kerstens, S. Veenstra, J. van Wilsem, W.P. Stol (2013) Victimization in a digitized society and chances for prevention. In: W.P. Stol & J. Jansen (ed.) Cybercrime and the Police. The Hague: Eleven International Publishing.

  • Jansen, J., E.R. Leukfeldt, J.A. van Wilsem & W.P, Stol (2013) Online gedragingen: Een risico voor hacken en persoonsgerichte cyberdelicten? Tijdschrift voor Criminologie 55(4) 394-408.

  •  Leukfeldt, E.R. (2013) Crime in a digitalized society. In: W. Ph. Stol & J. Jansen ed.) Cybercrime and the Police. The Hague: Eleven International Publishing.

  • Leukfeldt, E.R., S. Veenstra & W.P. Stol (2013) High Volume Cyber Crime and the Organization of the Police. The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology 7(1) 1-17.

  • Levi D. M., Innes, M., Reuter, P., & Gundur, R. (2013). The Economic, Financial & Social Impacts of Organised Crime in the EU. Brussels: European Union. http://www. europarl. europa. eu/RegData/etudes/etudes/join/2013/493018/IPOL-JOIN_ET (2013) 493018_EN. pdf.Maimon David. 2013. “Quantitative Methods used by Criminologists in the 19th Century.” Encyclopedia of Criminology and Criminal Justice, edited by David Weisburd and Gerben Bruinsma. New York: Springer

  • Maimon David, ^Amy Sariti, Michel Cukier, and ^Bertrand Sobesto. 2013. “Daily Trends and Origin of Computer Focused Crimes Against a Large University Computer Network: An Application of the Routine Activities and Life Style Perspective.” British Journal of Criminology

  • Miró-Llinares, F. (2013). La victimización por cibercriminalidad social. Un estudio a partir de la Teoría de las Actividades Cotidianas en el ciberespacio. Revista Española de Investigación Criminológica, 5, 1-35.

  • Stol, W.P., E.R. Leukfeldt & H. Klap (2013) Policing a digital society. The state of affairs in the Netherlands in 2013. In: W.P. Stol & J. Jansen (ed.) Cybercrime and the Police.. The Hague: Eleven International Publishing.

bottom of page