These are the sources and citations used to research Organised Crime; Cybercrime; Hacking; Mafias. This bibliography was generated on Cite This For Me on
In-text: (Becker, 1968)
Your Bibliography: Becker, G., 1968. Crime and Punishment: An Economic Approach. Journal of Political Economy, 76(2), p.169.
In-text: (Bentham, Atkinson and Dumont, 1914)
Your Bibliography: Bentham, J., Atkinson, C. and Dumont, E., 1914. Bentham's Theory of legislation. London: H. Milford.
In-text: (Bradbury, 2014)
Your Bibliography: Bradbury, D., 2014. Unveiling the dark web. Network Security, 2014(4), pp.14-17.
In-text: (Catino, 2014)
Your Bibliography: Catino, M., 2014. How Do Mafias Organize?. Arch. eur. sociol., 55(02), pp.177-220.
In-text: (Coleman, 2014)
Your Bibliography: Coleman, E., 2014. Hacker, hoaxer, whistleblower, spy. London: Verso.
In-text: (Daragahi, 2014)
Your Bibliography: Daragahi, B., 2014. Biggest bank robbery that 'never happened' - $400m Isis heist. The Financial Times, [online] Available at: <http://www.ft.com/cms/s/0/0378d4f4-0c28-11e4-9080-00144feabdc0.html> [Accessed 20 March 2015].
In-text: (Dick, 1995)
Your Bibliography: Dick, A., 1995. When does organized crime pay? A transaction cost analysis. International Review of Law and Economics, 15(1), pp.25-45.
In-text: (Dills, Miron and Summers, 2010)
Your Bibliography: Dills, A., Miron, J. and Summers, G., 2010. What Do Economists Know About Crime?. In: S. Edwards, E. Schargrodsky and R. Di Tella, ed., The Economics of Crime, 1st ed. [online] University of Chicago Press, pp.269-302. Available at: <http://www.nber.org/chapters/c11845.pdf> [Accessed 12 March 2015].
In-text: (Filkins, 2003)
Your Bibliography: Filkins, D., 2003. Hussein's Son Took $1 Billion Just Before War, Bank Aide Says. The New York Times, [online] Available at: <http://www.nytimes.com/2003/05/06/international/worldspecial/06BANK.html> [Accessed 23 March 2015].
In-text: (Fiorentini and Peltzman, 1995)
Your Bibliography: Fiorentini, G. and Peltzman, S., 1995. The economics of organised crime. Cambridge: Cambridge University Press.
In-text: (Fox-Brewster, 2015)
Your Bibliography: Fox-Brewster, T., 2015. Staples Hackers Made Up To $1 Billion In Bank Raids, Kaspersky Claims. Forbes, [online] Available at: <http://www.forbes.com/sites/thomasbrewster/2015/02/16/staples-hackers-made-one-billion-dollars/> [Accessed 23 March 2015].
In-text: (Frye, 2002)
Your Bibliography: Frye, T., 2002. Private Protection in Russia and Poland. American Journal of Political Science, 46(3), p.572.
In-text: (Gambetta, 1993)
Your Bibliography: Gambetta, D., 1993. The Sicilian Mafia. Cambridge, Mass.: Harvard University Press.
In-text: (Gira Grant, 2015)
Your Bibliography: Gira Grant, M., 2015. Why There's No Uber For Sex Workers. VICE, [online] Available at: <http://www.vice.com/en_uk/read/why-theres-no-uber-for-sex-work-304> [Accessed 1 April 2015].
In-text: (Open Bazaar: Contracts and Listings, 2014)
Your Bibliography: GitHub. 2014. Open Bazaar: Contracts and Listings. [online] Available at: <https://github.com/OpenBazaar/OpenBazaar/wiki/Contracts-and-Listings> [Accessed 24 March 2015].
In-text: (Grossman, 1995)
Your Bibliography: Grossman, H., 1995. Rival kleptocrats: the mafia versus the state. In: G. Fiorentini and S. Peltzman, ed., The economics of organised crime, 1st ed. Cambridge University Press, pp.143-160.
In-text: (Hill, 2003)
Your Bibliography: Hill, P., 2003. The Japanese mafia. Oxford: Oxford University Press.
In-text: (Hout and Bingham, 2013)
Your Bibliography: Hout, M. and Bingham, T., 2013. ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), pp.385-391.
In-text: (Kaspersky Lab, 2015)
Your Bibliography: Kaspersky Lab, 2015. Carbanak APT: The Great Bank Robbery. [online] Available at: <https://securelist.com/files/2015/02/Carbanak_APT_eng.pdf> [Accessed 19 March 2015].
In-text: (Leeson and Rogers, 2012)
Your Bibliography: Leeson, P. and Rogers, D., 2012. Organizing Crime. Supreme Court Economic Review, 20(1), pp.89-123.
In-text: (Levitt and Venkatesh, 2000)
Your Bibliography: Levitt, S. and Venkatesh, S., 2000. An Economic Analysis of a Drug-Selling Gang's Finances*. Quarterly Journal of Economics, 115(3), pp.755-789.
In-text: (McKinsey Global Institute, 2011)
Your Bibliography: McKinsey Global Institute, 2011. Internet matters: The Net's sweeping impact on growth, jobs, and prosperity. [online] Available at: <http://www.mckinsey.com/features/sizing_the_internet_economy> [Accessed 28 March 2015].
In-text: (Milhaupt and West, 2000)
Your Bibliography: Milhaupt, C. and West, M., 2000. The Dark Side of Private Ordering: An Institutional and Empirical Analysis of Organized Crime. The University of Chicago Law Review, 67(1), p.41.
In-text: (MPA, 2013)
Your Bibliography: MPA, 2013. The cost of movie piracy. [online] Available at: <http://austg.com/include/downloads/PirateProfile.pdf> [Accessed 20 March 2015].
In-text: (Murphy, Shleifer and Vishny, 1991)
Your Bibliography: Murphy, K., Shleifer, A. and Vishny, R., 1991. The Allocation of Talent: Implications for Growth. The Quarterly Journal of Economics, 106(2), p.503.
In-text: (Olson, 2000)
Your Bibliography: Olson, M., 2000. Power and prosperity. New York: Basic Books.
In-text: (Pearson, 2015)
Your Bibliography: Pearson, J., 2015. Tor Wants to Know How to Make the Darknet Mainstream. Motherboard, [online] Available at: <http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream?utm_source=mbtwitter> [Accessed 3 April 2015].
In-text: (Perlroth, 2015)
Your Bibliography: Perlroth, N., 2015. Hackers Use an Android App for Sex Extortion. The New York Times, [online] Available at: <http://bits.blogs.nytimes.com/2015/03/24/hackers-use-an-android-app-for-sex-extortion/?src=recg> [Accessed 26 March 2015].
In-text: (PWC, 2014)
Your Bibliography: PWC, 2014. US cybercrime: Rising risks, reduced readiness. [online] Available at: <http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf> [Accessed 17 March 2015].
In-text: (Samani and Paget, 2013)
Your Bibliography: Samani, R. and Paget, F., 2013. Cybercrime Exposed: Cybercrime as a service. McAfee.
In-text: (Schmitz, 2013)
Your Bibliography: Schmitz, S., 2013. The US SOPA and PIPA − a European perspective. International Review of Law, Computers & Technology, 27(1-2), pp.213-229.
In-text: (Skarbek, n.d.)
Your Bibliography: Skarbek, D., n.d. The social order of the underworld.
In-text: (Stevens, 2006)
Your Bibliography: Stevens, T., 2006. Series of Tubes. [video] Available at: <https://www.youtube.com/watch?v=f99PcP0aFNE> [Accessed 1 April 2015].
In-text: (Stokes, 2012)
Your Bibliography: Stokes, R., 2012. Virtual money laundering: the case of Bitcoin and the Linden dollar. Information & Communications Technology Law, 21(3), pp.221-236.
In-text: (Van Hout and Bingham, 2014)
Your Bibliography: Van Hout, M. and Bingham, T., 2014. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), pp.183-189.
In-text: (Varese, 1994)
Your Bibliography: Varese, F., 1994. Is Sicily the future of Russia? Private protection and the rise of the Russian Mafia. Eur J Soc, 35(02), p.224.
In-text: (Varese, 2011)
Your Bibliography: Varese, F., 2011. Mafias on the move. Princeton, N.J.: Princeton University Press.
In-text: (VARGAS, 2014)
Your Bibliography: VARGAS, R., 2014. CRIMINAL GROUP EMBEDDEDNESS AND THE ADVERSE EFFECTS OF ARRESTING A GANG'S LEADER: A COMPARATIVE CASE STUDY. Criminology, 52(2), pp.143-168.
10,587 students joined last month!