Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Asier Moneva"'
Publikováno v:
Computers in Human Behavior Reports, Vol 14, Iss , Pp 100410- (2024)
Objectives: This study investigates the effect of advertised rewards in credential leaks on the likelihood and speed of account hijacking. Methods: In an online field experiment, we created 176 honey Gmail accounts and randomly assigned them to eight
Externí odkaz:
https://doaj.org/article/23fe69ab9a95492791c103b77eadbf38
Autor:
Steve G.A. van de Weijer, Asier Moneva
Publikováno v:
Computers in Human Behavior Reports, Vol 8, Iss , Pp 100249- (2022)
A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce. To address this gap in the liter
Externí odkaz:
https://doaj.org/article/23cebc9757434d9694dec709502f89f5
Autor:
Fernando Miró-Llinares, Asier Moneva
Publikováno v:
Crime Science, Vol 8, Iss 1, Pp 1-5 (2019)
Abstract In this paper we question Farrell and Birks’ assertion of the emergence of cybercrime as an invalid explanation for the crime drop. Alternatively to the “cybercrime hypothesis”, we propose two non-exclusive hypotheses that highlight th
Externí odkaz:
https://doaj.org/article/4081ae547c5e4ac3aa09d9651d8b9f4e
Publikováno v:
Crime Science, Vol 7, Iss 1, Pp 1-12 (2018)
Abstract With the objective of facilitating and reducing analysis tasks undergone by law enforcement agencies and service providers, and using a sample of digital messages (i.e., tweets) sent via Twitter following the June 2017 London Bridge terror a
Externí odkaz:
https://doaj.org/article/5cc83ee789404f74adf8d89ced179b91
Autor:
Asier MONEVA PARDO
Publikováno v:
Ars Iuris Salmanticensis, Vol 4, Iss 2, Pp 273-275 (2017)
Externí odkaz:
https://doaj.org/article/b7ba2337f3574924bc4e04c81896f1f7
Autor:
Timothy C. Hart, Asier Moneva
Publikováno v:
Revista Española de Investigación Criminológica, Vol 16 (2018)
El presente artículo constituye la primera guía paso a paso en castellano para llevar a cabo un Análisis Conjunto de Configuraciones de Caso (Miethe, Troshynski, & Hart, 2008). Este se define como una técnica exploratoria para el análisis multiv
Externí odkaz:
https://doaj.org/article/98a01922fc5d4c96b8dff8f7e3ddcc7d
Financial-economic cyber-enabled crime (hereinafter: financial cybercrime) has increased dramatically over the past years. However, research on financial cybercrime is still underdeveloped and highly heterogeneous, especially regarding the processes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f9520f13198a540279426d80c58ebcc4
https://doi.org/10.31219/osf.io/ztfdw
https://doi.org/10.31219/osf.io/ztfdw
Understanding cybercrime involvement is critical to tackle the growing global threat it represents. However, research is heterogeneous and scattered across different disciplines. Following the PRISMA-ScR guidelines, this systematic narrative review s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ea09cdb1d7d52a9029d5cfd540afad0
https://doi.org/10.31219/osf.io/kpfrb
https://doi.org/10.31219/osf.io/kpfrb
Cybercriminals are an elusive population to study. This makes social research with cybercriminals as valuable as it is scarce. To stimulate research on cybercriminals, it is important that researchers share their insights on successful and unsuccessf
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2a7900ca7a3686e6b8980ba0140325c4
https://doi.org/10.31219/osf.io/czpnw
https://doi.org/10.31219/osf.io/czpnw
Publikováno v:
Journal of Experimental Criminology.