383
Bearbeitungen
Tiao (Diskussion | Beiträge) |
K (→Literatur) |
||
Zeile 126: | Zeile 126: | ||
==Literatur== | ==Literatur== | ||
* Choi, K. (2008). Computer Crime Victimization and Integrated Theory: An Empirical Assessment. International Journal of Cyber Criminology, 2(1). | |||
* Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441] | * Hoofnagle, Chris Jay (2007): ''Identity Theft: Making The Known Unknowns Known.'' In: ''Harvard Journal of Law & Technology'', Volume 21, Number 1, Fall 2007. Im Internet abrufbar unter:[http://ssrn.com/abstract=969441] | ||
:Recherche: 19.07.2008 Letztes Update: unbekannt | :Recherche: 19.07.2008 Letztes Update: unbekannt | ||
* Jaishankar, K. (2008). Identity related Crime in the Cyberspace: Examining Phishing and its impact. International Journal of Cyber Criminology, 2(1). | |||
*McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press. | *McNally, Megan M., Graeme R. Newman (2008) Perspectives on Identity Theft. The Criminal Justice Press. |
Bearbeitungen