Open Access
Issue |
SHS Web Conf.
Volume 68, 2019
7th International Interdisciplinary Scientific Conference SOCIETY. HEALTH. WELFARE
|
|
---|---|---|
Article Number | 01009 | |
Number of page(s) | 15 | |
Section | Society: Justice and Security | |
DOI | https://doi.org/10.1051/shsconf/20196801009 | |
Published online | 25 November 2019 |
- K. Jaishankar (2011) Cyber Criminology: Exploring Internet Crimes and Criminal Behavior (Boca Raton, FL, USA: CRC Press, Taylor and Francis Group, 2011) [CrossRef] [Google Scholar]
- V. Tumalavičius, J. Ivančiks, O. Karpishchenko (2016) Issues of society security: public safety under globalization conditions in Lithuania, Journal of Security and Sustainability Issues 4(9): 545–573. https://doi.org/10.9770/jssi.2016.5.4(9) [CrossRef] [Google Scholar]
- Global Cyber Risk Perception Survey 2018. By the Numbers: Global Cyber Risk Perception Survey. Available on: https://www.marshmma.com/blog/2018-cyber-and-data-security-risk-survey-report [Google Scholar]
- Special Eurobarometr 390 Cyber Security. Report. 2012. Available on: http://ec.europa.eu/commfrontoffice/publicopinion/archives/ebs/ebs_390_en.pdf [Google Scholar]
- D. Halder & K. Jaishankar (2011) Cybercrime and the victimization of women: laws, rights and regulations. Information Science Reference [Google Scholar]
- Criminal Profiling: International Theory, Research, and Practice (2007), edited by Richard N. Kocsis (Human Press Inc, Totowa, New Jersey) [Google Scholar]
- S.A. Bonn, Criminal Profiling: The Original Mind Hunters. Available on: https://www.psychologytoday.com/intl/blog/wicked-deeds/201712/criminal-profiling-the-original-mind-hunters [Google Scholar]
- B.E. Turney (2012) Criminal Profiling: An Introduction to Behavior Evidence Analysis. Fourth Edition (Elsevier, Oxford) [Google Scholar]
- Forensic Criminology (2010) / edited by Wayne Petherick, Brent E. Turvey, Claire E. Ferguson (Elsver Academic Press) [Google Scholar]
- M. Scheinin, Report of the Special Rapporteur on the promotion and protection of human rights while countering terrorism', UN Doc. A/HRC/4/26, 29 January 2007. Available on: https://unispal.un.org/DPA/DPR/unispal.nsf/1ce874ab1832a53e852570bb006dfaf6/813e9af0b820e2e58525730800513beb?OpenDocument [Google Scholar]
- C.R. Bartol, A.M. Bartol (2011) Introduction to Forensic Psychology: Research and Application (SAGE Publications) [Google Scholar]
- R.J. Lilly, F.T. Cullen, R.A. Ball (2015) Criminological Theory. Context and Consequences. Sage Publication, Inc., 2015 [Google Scholar]
- D. Canter (1994) Criminal Shadows: Inside the mind of the serial killer (Endeavour Media) [Google Scholar]
- P.B. Ainsworth (2001) Offender Profiling and Crime Analysis 7 (2001) [Google Scholar]
- A. Davies (2002) Rapists Behaviour: A three Aspect Model as a Basis for Analysis and Identification of a Serial Crime, Forensic Science International, 173 [Google Scholar]
- V.J. Geberth (1996) Practical Homicide Investigations: Tactics, Procedures, and Forensic Techniques, 4th edition [Google Scholar]
- E. Strika. Kriminālā profilēšana (2015) / Psiholoìija 3. Lietišiās jomas. Zvaigzne ABC (In Latvian) [Google Scholar]
- R. Saroha (2014) Profiling a Cyber Criminal. Int. J. Inf. Comput. Technol. 4(3), 253–258 [Google Scholar]
- J.-M. Dinant, C. Lazaro, Y. Poullet, N. Lefever and A. Rouvroy (2008) Application of Convention 108 to the Profiling Mechanism – Some ideas for the future work of the consultative committee. Available on: http://www.coe.int/t/e/legal_aff airs/legal_co-operation/data_protection/ documents/ [Google Scholar]
- Uz pamattiesıbām balstıta policijas darbinieku apmācıba. Rokasgrāmata policijas darbinieku apmācıtājiem (2018) Eiropas Savienıbas Publikāciju birojs (In Latvian) [Google Scholar]
- D.A. Andrews, J. Bonta (1998) The Psychology of Criminal Conduct (New York: Matthew Bender & Company, Inc.) [Google Scholar]
- I. Vedins (2008) Zinātne un patiesıba. Rıga: Avots (In Latvian) [Google Scholar]
- K. Rossmo (2000) Geographic profiling (CRS Press LLC) [Google Scholar]
- D.A. Muller (2000) Criminal profiling: Real science or just wishful thinking? Homicide Studies 4(3), 234–264 [CrossRef] [Google Scholar]
- D. Kahneman, P. Slovic, A. Tversky (1982) Judgment under uncertainty: Heuristics and biases (New York: Cambridge University Press) [CrossRef] [Google Scholar]
- R. Bull, C. Cooke, R. Hatcher, J. Woodhams, C. Bilby, T. Grant (2006) Criminal psychology: A Beginner's Guide (Oneworld Publications, Oxford, England) [Google Scholar]
- D. Canter, D. Youngs (2008) Principles of Geographical Offender Profiling (New York: Toylor & Francis Group) [Google Scholar]
- R.N. Kocsis (2006) Criminal Profiling: Principles and Practice (Totowa NJ: Humana Press Inc.) [Google Scholar]
- Kriminālprocesa likums: Latvijas Republikas likums. Latvijas Vēstnesis Nr. 74 (3232), 11.05.2005 (In Latvian) [Google Scholar]
- I. Jakimov (2003) Kriminalistika. Rukovodstvo po ugolovnoj tehnike i taktike. Novoje izdanije perepechatonoe s izdanii 1925, Moskva: LeksEst(Якимов, и. Н. (2003) Криминалистика. Руковощство по уголовнои технике и тактике. Новое изщание, перепечатанное с изщания 1925 г. Москва: ЛексЭст) (In Rusian) [Google Scholar]
- L.J. Alison (2005) The forensic psychologist's casebook: Psychological profiling and criminal investigation (Cullompton, UK: Willan) [Google Scholar]
- R. Knight, J. Warren, R. Reboussin, B. Soley (1998) Predicting rapist type from crime scene variables. Criminal Justice and Behavior 25, 46 [CrossRef] [Google Scholar]
- J. Lieckiewicz (2011) Cybercrime psychology – propsal of an ofender psychological profil. Problems of Forensic Sciences, Vol. LXXXVII: 239–252. Avalable on: http://www.forensicscience.pl/pfs/87_Lickiewicz.pdf [Google Scholar]
- B. Snook, J. Eastwodd, P. Gebdreau, C. Coggin, R.M. Cullen (2007) Taking stock of criminal profiling: A narative review and meta-analysis. Criminal Justice and Behavior 34, 437–453 [CrossRef] [Google Scholar]
- S. Omārova, (2002) Cilvēks runā ar cilvēku. Rıga: Kamene (In Latvian) [Google Scholar]
- V.V. Tulegenov (2014) Kiberprestupnost kak forma virazheniia kriminalnogo professionalizma. Kriminologiia: vchera, segodnia, zavtra. 2(33) (Тулегенов В. В. (2014) Киберпреступность как форма вюражения криминального профессионализма. Криминология: вчера, сегощня, завтра № 2 (33) (In Russian) [Google Scholar]
- Comprehensive Study on Cybercrime (2013) New York: United Nations. Available on: https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIMESTUDY_210213.pdf [Google Scholar]
- N. Ksheti (2010) The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives (New York: Springer) [CrossRef] [Google Scholar]
- X. Li (2017) A Review of Motivations of Illegal Cyber Activities. Criminology & Social Integration Journal 25(1), 110–126 [Google Scholar]
- F.A. Zuhri, The Profile of a Cybercriminal. Digital Forensic Magazine. Available on: http://digitalforensicsmagazine.com/blogs/wp-content/uploads/2017/05/The-Profile-of-Cybercriminal.pdf [Google Scholar]
- T. Hirschi (2004). Self-control and crime. In R.F. Baumeister & K.D. Vohs (Eds.), Handbook of self-regulation: Research, theory and applications (New York: Guilford Press), pp. 537–555 [Google Scholar]
- F.T. Ngo, R. Paternoster (2011) Cybercrime Victimization: An examination of Individual and Situational level factors. International Journal of Cyber Criminology 5(1) (January – July), 773 [Google Scholar]
- Global Report “The State of Industrial Cybersecurity 2017”. Available on: https://go.kaspersky.com/rs/802-IJN-240/images/ICS%20WHITE%20PAPER.pdf [Google Scholar]
- S. Simkin, L. Ponemon, (2016) Flipping the Economics of Attacks. No: Ponemon Institute. Available on: http://www.polyscope.ch/site/assets/files/42688/06_16_53.pdf [Google Scholar]
- Crime Investigation (Investigation features of the most frequently encountered crimes) (2003) /edited by professor Anrijs Kavalieris. Riga: The Police Academy of Latvia [Google Scholar]
- D. Shinder (2010) Profiling and categorizing cybercriminals. Available on: http://www.techrepublic.com/blog/it-security/profiling-and-categorizing-cybercriminals/ [Google Scholar]
- Aptauja “Mobilo telefonu un interneta izmantošanas paradumi bērnu un jauniešu vidū” (2012). Available on: http://www.drossinternets.lv/upload/materiali/petijumi/mob-tel_interneta_izmantosana_2012.pdf (In Latvian) [Google Scholar]
- H. Tennakoon, The need for a comprehensive methodology for profiling cyber-criminals. Available on: http://www.newsecuritylearning.com/index.php/archive/150-the-need-for-a-comprehensive-methodology-for-profiling-cyber-criminals [Google Scholar]
- C.M. Steel, Idiographic digital profiling: behavioral analysus based in digital forensics. Journal of Digital Forensics, Security and Law 9(1), 7–18 [Google Scholar]
- Scene of the Cybercrime: Computer Forensics Handbook (2002) 1st Edition (Syngress Publishing, Inc.) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.