This study provides empirical insight into how organised crime uses IT and how it affects criminal operations. The focus is not on cybercrime alone. Instead the use of IT and its consequences is explored in a broad range of types of organised crime, i.e. from ‘traditional ’types of organised crime such as offline drug smuggling to cybercrime. The following research question will be addressed: How do organised crime groups use IT and how does this use change the ways in which they operate? The research question is divided into three subthemes: - the use of IT in relation to the processes of origin and growth of organised crime groups; - the use of IT in relation to the logistics chain of criminal processes; - the use of IT in relation to han...
Every new technology brings new opportunity for crime, and information and communication technology ...
Purpose – The purpose of this article is to provide an empirically based description of how the Inte...
This paper is about the money mules used by cyber criminals. Although money mules are not part of th...
This article presents the results of empirical analyses of the use of information technology (IT) by...
This article presents the results of empirical analyses of the use of information technology (IT) by...
This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the cr...
This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the cr...
Which opportunities due to digitization are exploited by criminals? And how do criminals gather the ...
Criminological research over the last couple of decades has improved our understanding of cybercrime...
This essay considers how information and communications technologies (ICT) are used by organized cri...
In this explorative study we provide empirical insight into how organized crime offenders use IT to ...
This chapter reviews a few critical technological developments and reflects both on their trajectory...
Every new technology brings new opportunity for crime, and information and communication technology ...
Background:\ud How can one measure the prevalence of cybercrime? One option is to define cybercrime ...
Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as ...
Every new technology brings new opportunity for crime, and information and communication technology ...
Purpose – The purpose of this article is to provide an empirically based description of how the Inte...
This paper is about the money mules used by cyber criminals. Although money mules are not part of th...
This article presents the results of empirical analyses of the use of information technology (IT) by...
This article presents the results of empirical analyses of the use of information technology (IT) by...
This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the cr...
This study seeks to explore the characteristics of cyber-organised crime (OC), and focuses on the cr...
Which opportunities due to digitization are exploited by criminals? And how do criminals gather the ...
Criminological research over the last couple of decades has improved our understanding of cybercrime...
This essay considers how information and communications technologies (ICT) are used by organized cri...
In this explorative study we provide empirical insight into how organized crime offenders use IT to ...
This chapter reviews a few critical technological developments and reflects both on their trajectory...
Every new technology brings new opportunity for crime, and information and communication technology ...
Background:\ud How can one measure the prevalence of cybercrime? One option is to define cybercrime ...
Background: How can one measure the prevalence of cybercrime? One option is to define cybercrime as ...
Every new technology brings new opportunity for crime, and information and communication technology ...
Purpose – The purpose of this article is to provide an empirically based description of how the Inte...
This paper is about the money mules used by cyber criminals. Although money mules are not part of th...