These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 31880178)

  • 1. Examining the Social Organization Practices of Cybercriminals in the Netherlands Online and Offline.
    Leukfeldt ER; Holt TJ
    Int J Offender Ther Comp Criminol; 2020 Apr; 64(5):522-538. PubMed ID: 31880178
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Exploring the Factors Associated With Rejection From a Closed Cybercrime Community.
    Holt TJ; Dupont B
    Int J Offender Ther Comp Criminol; 2019 Jun; 63(8):1127-1147. PubMed ID: 30403151
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking.
    Wang SK; Hsieh ML; Chang CK; Jiang PS; Dallier DJ
    Int J Offender Ther Comp Criminol; 2021 Mar; 65(4):390-408. PubMed ID: 32865052
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Pharmaceutical digital marketing and governance: illicit actors and challenges to global patient safety and public health.
    Mackey TK; Liang BA
    Global Health; 2013 Oct; 9():45. PubMed ID: 24131576
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Disrupting drive-by download networks on Twitter.
    Javed A; Ikwu R; Burnap P; Giommoni L; Williams ML
    Soc Netw Anal Min; 2022; 12(1):117. PubMed ID: 36035378
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Are crimes by online predators different from crimes by sex offenders who know youth in-person?
    Wolak J; Finkelhor D
    J Adolesc Health; 2013 Dec; 53(6):736-41. PubMed ID: 23890773
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Mapping the global geography of cybercrime with the World Cybercrime Index.
    Bruce M; Lusthaus J; Kashyap R; Phair N; Varese F
    PLoS One; 2024; 19(4):e0297312. PubMed ID: 38598553
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Phishing for suitable targets in the Netherlands: routine activity theory and phishing victimization.
    Leukfeldt ER
    Cyberpsychol Behav Soc Netw; 2014 Aug; 17(8):551-5. PubMed ID: 25080013
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
    Djenna A; Barka E; Benchikh A; Khadir K
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Predictors of patrol officer interest in cybercrime training and investigation in selected United States police departments.
    Holt TJ; Bossler AM
    Cyberpsychol Behav Soc Netw; 2012 Sep; 15(9):464-72. PubMed ID: 22817769
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Advantageous comparison: using Twitter responses to understand similarities between cybercriminals ("Yahoo Boys") and politicians ("Yahoo men").
    Lazarus S; Button M; Adogame A
    Heliyon; 2022 Nov; 8(11):e11142. PubMed ID: 36339761
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Internet-facilitated commercial sexual exploitation of children: findings from a nationally representative sample of law enforcement agencies in the United States.
    Mitchell KJ; Jones LM; Finkelhor D; Wolak J
    Sex Abuse; 2011 Mar; 23(1):43-71. PubMed ID: 20852011
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Exploring the role of the internet in juvenile prostitution cases coming to the attention of law enforcement.
    Wells M; Mitchell KJ; Ji K
    J Child Sex Abus; 2012; 21(3):327-42. PubMed ID: 22574847
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.
    Holt TJ; Burruss GW; Bossler AM
    Int J Offender Ther Comp Criminol; 2018 May; 62(6):1720-1741. PubMed ID: 27913717
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Crime seriousness and participation in restorative justice: The role of time elapsed since the offense.
    Zebel S; Schreurs W; Ufkes EG
    Law Hum Behav; 2017 Aug; 41(4):385-397. PubMed ID: 28459265
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism?
    Payne KL; Russell A; Mills R; Maras K; Rai D; Brosnan M
    J Autism Dev Disord; 2019 Oct; 49(10):4159-4169. PubMed ID: 31267290
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults.
    Kaakinen M; Keipi T; Räsänen P; Oksanen A
    Cyberpsychol Behav Soc Netw; 2018 Feb; 21(2):129-137. PubMed ID: 29048938
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Tweets and Reactions: Revealing the Geographies of Cybercrime Perpetrators and the North-South Divide.
    Lazarus S; Button M
    Cyberpsychol Behav Soc Netw; 2022 Aug; 25(8):504-511. PubMed ID: 35759381
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyber-Dependent Crime Victimization: The Same Risk for Everyone?
    Bergmann MC; Dreißigacker A; von Skarczinski B; Wollinger GR
    Cyberpsychol Behav Soc Netw; 2018 Feb; 21(2):84-90. PubMed ID: 28657785
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.