Follow

Articles from 2020

PDF

Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks, Maryam Jalalitabar, Marco Valero, and Anu G. Bourgeois

PDF

Attacking and securing beacon-enabled 802.15.4 networks, Sang Shin Jung, Marco Valero, Anu Bourgeois, and Raheem Beyah

PDF

Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature, David Maimon

Articles from 2019

PDF

Digital First: The Ontological Reversal and New Challenges for IS Research, Richard L. Baskerville, Michael D. Myers, and Youngjin Yoo

PDF

Website Defacement and Routine Activities: Considering the Importance of Hackers’ Valuations of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, and Shradha Sahani

Link

Cyber-Dependent Crimes: An Interdisciplinary Review, David Maimon and Eric L. Louderback

PDF

Online Deception and Situations Conducive to the Progression of Non-Payment Fraud, David Maimon, Mateus Santos, and Youngsam Park

Articles from 2018

PDF

Continuous Restricted Boltzmann Machines, Robert W. Harrison

Articles from 2017

Link

Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors, Alexander Testa, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2016

PDF

Learning from the Offenders' Perspective on Crime Prevention, Scott Jacques and Elizabeth Bonomo

Articles from 2015

Link

On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, David Maimon, Theodore Wilson, Wuling Ren, and Tamar Berenblaum

Link

The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace, Theodore Wilson, David = Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2013

Link

Daily Trends and Origin of Computer-Focused Crimes against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective, David Maimon, Amy Kamerdze, Michel Cukier, and Bertrand Sobesto

Link

Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2012

PDF

The Offenders’ Perspective on Prevention: Guarding Against Victimization and Law Enforcement, Scott Jacques and Danielle Reynald