TY - STD TI - Addington, L. A. (2008). Current issues in victimization research and the NCVS’s ability to study them. Paper presented at the prepared for presentation at the Bureau of Justice Statistics Data User’s Workshop. Washington, DC. ID - ref1 ER - TY - STD TI - ADISP. (2015). Cadre de Vie et Sécurité—2015 (Living conditions and Safety—2015). Paris: Archives de Données Issues de la Statistique Publique. https://www.cmh.ens.fr/greco/enquetes/XML/lil.php?lil=lil-1003. UR - https://www.cmh.ens.fr/greco/enquetes/XML/lil.php%3flil%3dlil-1003 ID - ref2 ER - TY - JOUR AU - Aebi, M. F. AU - Killias, M. AU - Tavares, C. PY - 2002 DA - 2002// TI - Comparing crime rates: the international crime (Victim) survey, the European sourcebook of crime and criminal justice statistics, and interpol statistics JO - International Journal of Comparative Criminology VL - 2 ID - Aebi2002 ER - TY - STD TI - Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M. J., Levi, M., Moore, T., & Savage, S. (2013). Measuring the cost of cybercrime. In The economics of information security and privacy (pp. 265–300). Berlin: Springer. ID - ref4 ER - TY - STD TI - Armin, J., Thompson, B., Ariu, D., Giacinto, G., Roli, F., & Kijewski, P. (2015). 2020 Cybercrime economic costs: No measure no solution. In Paper presented at the availability, reliability and security (ares), 2015 10th international conference on. ID - ref5 ER - TY - STD TI - Armin, J., Thompson, B., & Kijewski, P. (2016). Cybercrime economic costs: No measure no solution. In Combatting cybercrime and cyberterrorism (pp. 135–155). Berlin: Springer. ID - ref6 ER - TY - STD TI - Aycock, J. (2006). Computer viruses and malware. In Advances in information security (Vol. 22). ID - ref7 ER - TY - JOUR AU - Bachmann, M. PY - 2010 DA - 2010// TI - The risk propensity and rationality of computer hackers JO - The International Journal of Cyber Criminology VL - 4 ID - Bachmann2010 ER - TY - STD TI - Birkel, C., Guzy, N., Hummelsheim, D., Oberwittler, D., & Pritsch, J. (2014). Der Deutsche Viktimisierungssurvey 2012. Erste Ergebnisse zu Opfererfahrungen, Einstellungen gegenüber der Polizei und Kriminalitätsfurcht. Wiesbaden, Germany: Bundeskriminalamt. https://www.bka.de/DE/UnsereAufgaben/Forschung/Dunkelfeldforschung/dunkelfeldforschung.html. UR - https://www.bka.de/DE/UnsereAufgaben/Forschung/Dunkelfeldforschung/dunkelfeldforschung.html ID - ref9 ER - TY - STD TI - Brå. (2016). The Swedish crime survey. Stockholm http://bra.se/bra/bra-in-english/home/crime-and-statistics/swedish-crime-survey.html. Retrieved from http://bra.se/bra/bra-in-english/home/crime-and-statistics/swedish-crime-survey.html. UR - http://bra.se/bra/bra-in-english/home/crime-and-statistics/swedish-crime-survey.html ID - ref10 ER - TY - STD TI - Bregant, J., & Bregant, R. (2014). Cybercrime and computer crime. In The encyclopedia of criminology and criminal justice. Hoboken: Blackwell Publishing Ltd. ID - ref11 ER - TY - JOUR AU - Brody, R. G. AU - Mulig, E. AU - Kimball, V. PY - 2007 DA - 2007// TI - Phishing, pharming and identity theft JO - Academy of Accounting and Financial Studies Journal VL - 11 ID - Brody2007 ER - TY - STD TI - Cantor, D., & Lynch, J. P. (2000). Self-report surveys as measures of crime and criminal victimization. ID - ref13 ER - TY - STD TI - CBS. (2017). Veiligheidsmonitor 2016. Retrieved from Voorburg/Heerlen: https://www.cbs.nl/nl-nl/publicatie/2017/09/veiligheidsmonitor-2016. UR - https://www.cbs.nl/nl-nl/publicatie/2017/09/veiligheidsmonitor-2016 ID - ref14 ER - TY - JOUR AU - Choi, K. -. S. PY - 2008 DA - 2008// TI - Computer crime victimization and integrated theory: An empirical assessment JO - International Journal of Cyber Criminology VL - 2 ID - Choi2008 ER - TY - JOUR AU - Cliff, G. AU - Desilets, C. PY - 2014 DA - 2014// TI - White collar crime: What it is and where it’s going JO - Notre Dame Journal of Law, Ethics & Public Policy VL - 28 ID - Cliff2014 ER - TY - JOUR AU - Cohen, L. E. AU - Felson, M. PY - 1979 DA - 1979// TI - Social-change and crime rate trends—routine activity approach JO - American Sociological Review VL - 44 UR - https://doi.org/10.2307/2094589 DO - 10.2307/2094589 ID - Cohen1979 ER - TY - JOUR AU - Conteh, N. Y. AU - Royer, M. D. PY - 2016 DA - 2016// TI - The rise in cybercrime and the dynamics of exploiting the human vulnerability factor JO - International Journal of Computer (IJC) VL - 20 ID - Conteh2016 ER - TY - CHAP AU - Dijk, J. V. ED - Hough, M. ED - Maxfield, M. PY - 2007 DA - 2007// TI - The international crime victims survey and complementary measures of corruption and organized crime BT - Surveying crime in the 21st century: Commemorating the 25th anniversary of the British crime survey PB - Criminal Justice Press CY - Monsey, NY ID - Dijk2007 ER - TY - STD TI - Dutch Banking Association (Producer). (2017). Fact Sheet Security and Fraud. ID - ref20 ER - TY - JOUR AU - Eckberg, D. PY - 2015 DA - 2015// TI - Trends in conflict: Uniform crime reports, the national crime victimization surveys, and the lethality of violent crime JO - Homicide Studies VL - 19 UR - https://doi.org/10.1177/1088767914557810 DO - 10.1177/1088767914557810 ID - Eckberg2015 ER - TY - STD TI - Enisa. (2010). How to shop safely online. Heraklion: ENISA—European Union Agency for Network and Information Security. ID - ref22 ER - TY - STD TI - Eurostat. (2016). Community survey on ICT usage in households and by individuals 2016 quality report. https://www.cbs.nl/-/media/_pdf/2017/03/ict-hh2016quality%20report%20final%20version%20netherlands.pdf. Luxembourg: European Commission. UR - https://www.cbs.nl/-/media/_pdf/2017/03/ict-hh2016quality%20report%20final%20version%20netherlands.pdf ID - ref23 ER - TY - STD TI - FFA. (2016). Fraud, the facts 2016. The definitive overview of payment industry fraud. London: Financial Fraud Action UK. Retrieved from https://www.financialfraudaction.org.uk/wp-content/uploads/2016/07/Fraud-the-Facts-A5-final.pdf. UR - https://www.financialfraudaction.org.uk/wp-content/uploads/2016/07/Fraud-the-Facts-A5-final.pdf ID - ref24 ER - TY - JOUR AU - Gartner, R. PY - 1993 DA - 1993// TI - Methodological issues in cross-cultural large-survey research on violence JO - Violence and Victims VL - 8 ID - Gartner1993 ER - TY - JOUR AU - Gordon, S. AU - Ford, R. PY - 2006 DA - 2006// TI - On the definition and classification of cybercrime JO - Journal in Computer Virology VL - 2 UR - https://doi.org/10.1007/s11416-006-0015-z DO - 10.1007/s11416-006-0015-z ID - Gordon2006 ER - TY - STD TI - Gottfredson, M. R. (1986). Substantive contributions of victimization surveys. In M. Tonry & N. Morris (Eds.), Crime and justice. An annual review (Vol. 7, pp. 251–288). Chicago, IL: The University of Chicago Press. ID - ref27 ER - TY - STD TI - Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012. Retrieved from Washington DC. ID - ref28 ER - TY - JOUR AU - Holt, T. J. AU - Bossler, A. M. PY - 2008 DA - 2008// TI - Examining the applicability of lifestyle-routine activities theory for cybercrime victimization JO - Deviant Behavior VL - 30 UR - https://doi.org/10.1080/01639620701876577 DO - 10.1080/01639620701876577 ID - Holt2008 ER - TY - JOUR AU - Holt, T. J. AU - Bossler, A. M. PY - 2013 DA - 2013// TI - Examining the relationship between routine activities and malware infection indicators JO - Journal of Contemporary Criminal Justice VL - 29 UR - https://doi.org/10.1177/1043986213507401 DO - 10.1177/1043986213507401 ID - Holt2013 ER - TY - BOOK AU - Hough, M. AU - Maxfield, M. PY - 2007 DA - 2007// TI - Surveying crime in the 21st century: Commemorating the 25th anniversary of the British crime survey PB - Criminal Justice Press CY - Monsey, NY ID - Hough2007 ER - TY - CHAP AU - Hough, M. AU - Maxfield, M. AU - Morris, B. AU - Simmons, J. ED - Hough, J. ED - Maxfield, M. PY - 2007 DA - 2007// TI - British crime survey after 25 years BT - Surveying crime in the 21st century: Commemorating the 25th anniversary of the British crime survey PB - Criminal Justice Press CY - Monsey, NY ID - Hough2007 ER - TY - STD TI - Internet World Stats. (2017). Internet World Stats. Retrieved from http://www.internetworldstats.com/. UR - http://www.internetworldstats.com/ ID - ref33 ER - TY - STD TI - ITRC. (2014). Identity theft: The aftermath 2013. ID - ref34 ER - TY - JOUR AU - Jang-Jaccard, J. AU - Nepal, S. PY - 2014 DA - 2014// TI - A survey of emerging threats in cybersecurity JO - Journal of Computer and System Sciences VL - 80 UR - https://doi.org/10.1016/j.jcss.2014.02.005 DO - 10.1016/j.jcss.2014.02.005 ID - Jang-Jaccard2014 ER - TY - BOOK PY - 2010 DA - 2010// TI - Handbook of internet crime PB - Willan Publishing CY - Cullompton, UK ID - ref36 ER - TY - JOUR AU - Jones, L. M. AU - Mitchell, K. J. AU - Finkelhor, D. PY - 2013 DA - 2013// TI - Online harassment in context: Trends from three Youth Internet Safety Surveys (2000, 2005, 2010) JO - Psychology of Violence VL - 3 UR - https://doi.org/10.1037/a0030309 DO - 10.1037/a0030309 ID - Jones2013 ER - TY - STD TI - Junger, M., Montoya, L., Hartel, P., & Heydari, M. (2017, June 19–20, 2017). Towards the normalization of crime victimization. A routine activities analysis of cybercrime in Europe. In Paper presented at the international conference on cyber situational awareness, data analytics and assessment (CyberSA 2017), London, UK. ID - ref38 ER - TY - STD TI - Kanich, C., Chachra, N., McCoy, D., Grier, C., Wang, D., Motoyama, M., Levchenko, K., Savage, S., & Voelker, G. M. (2011). No plan survives contact: Experience with cybercrime measurement. In Proc. of 4th USENIX CSET. ID - ref39 ER - TY - JOUR AU - Karstedt, S. PY - 2001 DA - 2001// TI - Comparing cultures, comparing crime: Challenges, prospects and problems for a global criminology JO - Crime, Law and Social Change VL - 36 UR - https://doi.org/10.1023/A:1012223323445 DO - 10.1023/A:1012223323445 ID - Karstedt2001 ER - TY - JOUR AU - Kerstens, J. AU - Veenstra, S. PY - 2015 DA - 2015// TI - Cyber bullying in the Netherlands: A criminological perspective JO - International Journal of Cyber Criminology VL - 9 ID - Kerstens2015 ER - TY - STD TI - Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. American Psychological Association. ID - ref42 ER - TY - BOOK PY - 2017 DA - 2017// TI - Research agenda the human factor in cybercrime and cybersecurity PB - Eleven International Publishing CY - The Hague ID - ref43 ER - TY - JOUR AU - Lynch, J. P. PY - 2006 DA - 2006// TI - Problems and promise of victimization surveys for cross-national research JO - Crime and Justice VL - 34 UR - https://doi.org/10.1086/502670 DO - 10.1086/502670 ID - Lynch2006 ER - TY - JOUR AU - Lynch, J. P. PY - 2014 DA - 2014// TI - The evolving role of self-report surveys of criminal victimization in a system of statistics on crime and the administration of justice JO - Statistical Journal of the IAOS VL - 30 ID - Lynch2014 ER - TY - CHAP AU - Maxfield, M. AU - Hough, M. AU - Mayhew, P. ED - Hough, J. ED - Maxfield, M. PY - 2007 DA - 2007// TI - Surveying crime in the 21st century: Summary and recommendations BT - Surveying crime in the 21st century: Commemorating the 25th anniversary of the British crime survey PB - Criminal Justice Press CY - Monsey, NY ID - Maxfield2007 ER - TY - STD TI - Messner, S. F., & Zimmerman, G. M. (2014). Understanding cross-national variation. In Encyclopedia of criminology and criminal justice (pp. 5345–55). Berlin: Springer. ID - ref47 ER - TY - STD TI - Milletary, J., & Center, C. C. (2005). Technical trends in phishing attacks. Retrieved December 1, 2007, 3.3. ID - ref48 ER - TY - STD TI - Moons, E. (2013). Three percent of online buyers and sellers victims of fraud. Web magazine. Retrieved from http://www.cbs.nl/en-GB/menu/themas/veiligheid-recht/publicaties/artikelen/archief/2013/2013-3921-wm.htm. UR - http://www.cbs.nl/en-GB/menu/themas/veiligheid-recht/publicaties/artikelen/archief/2013/2013-3921-wm.htm ID - ref49 ER - TY - JOUR AU - Nansel, T. R. AU - Overpeck, M. D. AU - Haynie, D. L. AU - Ruan, W. J. AU - Scheidt, P. C. PY - 2003 DA - 2003// TI - Relationships between bullying and violence among US youth JO - Archives of Pediatrics and Adolescent Medicine VL - 157 UR - https://doi.org/10.1001/archpedi.157.4.348 DO - 10.1001/archpedi.157.4.348 ID - Nansel2003 ER - TY - JOUR AU - Näsi, M. AU - Aaltonen, M. AU - Kivivuori, J. PY - 2016 DA - 2016// TI - Youth hate crime offending: the role of strain, social control and self-control theories JO - Journal of Scandinavian Studies in Criminology and Crime Prevention VL - 17 UR - https://doi.org/10.1080/14043858.2016.1260332 DO - 10.1080/14043858.2016.1260332 ID - Näsi2016 ER - TY - STD TI - National Fraud & Cyber Reporting Centre. (2016). Types of fraud. Retrieved from http://www.actionfraud.police.uk/fraud-az-online-fraud. UR - http://www.actionfraud.police.uk/fraud-az-online-fraud ID - ref52 ER - TY - STD TI - Newman, G. R. (2009). Cybercrime. Handbook on crime and deviance. In M. D. Krohn, A. J. Lizotte, & G. P. Hall (Eds.) (pp. 551–584). New York: Springer. ID - ref53 ER - TY - STD TI - Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5. Retrieved from http://www.cybercrimejournal.com/ngo2011ijcc.pdf. UR - http://www.cybercrimejournal.com/ngo2011ijcc.pdf ID - ref54 ER - TY - STD TI - Office for National Statistics (ONS). (2015). CSEW Fraud and cyber-crime development: Field trial. London. Retrieved from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/methodologies/crimeandjusticemethodology#methodological-notes. UR - https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/methodologies/crimeandjusticemethodology%23methodological-notes ID - ref55 ER - TY - STD TI - Office for National Statistics (ONS). (2017). Crime in England and Wales, year ending September 2016. London: https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingsept2016. Retrieved from http://www.ons.gov.uk/ons/rel/crime-stats/crime-statistics/period-ending-march-2013/stb-crime–period-ending-march-2013.html. UR - http://www.ons.gov.uk/ons/rel/crime-stats/crime-statistics/period-ending-march-2013/stb-crime%e2%80%93period-ending-march-2013.html ID - ref56 ER - TY - STD TI - Powers, R. A. (2015). National crime victimization survey. In The encyclopedia of crime and punishment. New York: Wiley. ID - ref57 ER - TY - JOUR AU - Pratt, T. C. AU - Holtfreter, K. AU - Reisig, M. D. PY - 2010 DA - 2010// TI - Routine online activity and internet fraud targeting: Extending the generality of routine activity theory JO - Journal of Research in Crime and Delinquency VL - 47 UR - https://doi.org/10.1177/0022427810365903 DO - 10.1177/0022427810365903 ID - Pratt2010 ER - TY - CHAP AU - Rand, M. R. ED - Hough, J. ED - Maxfield, M. PY - 2007 DA - 2007// TI - The national crime victimization survey at 34: looking back and looking ahead BT - Surveying crime in the 21st century: Commemorating the 25th anniversary of the British crime survey PB - Criminal Justice Press CY - Monsey, NY ID - Rand2007 ER - TY - STD TI - Reep, C. (2013a). Responsgedrag bij de Veiligheidsmonitor 2012. Onderzoek naar responsgedrag en selectiviteit bij inzet van internet en papier (Only available in Dutch). Retrieved from Heerlen, Nl: https://www.cbs.nl/-/media/_pdf/2016/46/slachtoffer-geweest.pdf. UR - https://www.cbs.nl/-/media/_pdf/2016/46/slachtoffer-geweest.pdf ID - ref60 ER - TY - STD TI - Reep, C. (2013b). Responsgedrag bij de Veiligheidsmonitor (in Dutch)(Response Behavior in the Safety Monitor). Retrieved from Heerlen, Nl: https://www.cbs.nl/nl-nl/achtergrond/2017/15/responsgedrag-bij-de-veiligheidsmonitor. UR - https://www.cbs.nl/nl-nl/achtergrond/2017/15/responsgedrag-bij-de-veiligheidsmonitor ID - ref61 ER - TY - STD TI - Reep, C. (2014). Slachtoffer geweest? Antwoorden uit de Veiligheidsmonitor vergeleken met politieregister (only available in Dutch). Retrieved from Heerlen, Nl: https://www.cbs.nl/-/media/_pdf/2016/46/slachtoffer-geweest.pdf. UR - https://www.cbs.nl/-/media/_pdf/2016/46/slachtoffer-geweest.pdf ID - ref62 ER - TY - STD TI - Reep, C. (2017). Fraude met online handel. Antwoorden uit de Veiligheidsmonitor vergeleken met het politieregister (Online trading fraud. Information from the Security Monitor compared with the Police Register). Retrieved from Den Haag, Nl. ID - ref63 ER - TY - STD TI - Reyns, B. W., & Henson, B. (2015). The thief with a thousand faces and the victim with none identifying determinants for online identity theft victimization with routine activity theory. International Journal of Offender Therapy and Comparative Criminology, 0306624X15572861. ID - ref64 ER - TY - STD TI - Reyns, B. W., Henson, B., & Fisher, B. S. (2014). Cybercrime. In The encyclopedia of theoretical criminology. New York: Wiley. ID - ref65 ER - TY - JOUR AU - Rieckmann, J. AU - Kraus, M. PY - 2015 DA - 2015// TI - Tatort Internet: Kriminalität verursacht Bürgern Schäden in Milliardenhöhe JO - DIW-Wochenbericht VL - 82 ID - Rieckmann2015 ER - TY - JOUR AU - Schneider, A. L. PY - 1981 DA - 1981// TI - Methodological problems in victim surveys and their implications for research in victimology JO - The Journal of Criminal Law and Criminology VL - 72 UR - https://doi.org/10.2307/1143017 DO - 10.2307/1143017 ID - Schneider1981 ER - TY - JOUR AU - Schouten, B. AU - Brakel, J. AU - Buelens, B. AU - Laan, J. AU - Klausch, T. PY - 2013 DA - 2013// TI - Disentangling mode-specific selection and measurement bias in social surveys JO - Social Science Research VL - 42 UR - https://doi.org/10.1016/j.ssresearch.2013.07.005 DO - 10.1016/j.ssresearch.2013.07.005 ID - Schouten2013 ER - TY - STD TI - Skogan, W. G. (1986). Methodological issues in the study of victimization. In From crime policy to victim policy (pp. 80–116). Berlin: Springer. ID - ref69 ER - TY - STD TI - Smith, A. (2006). Crime statistics: An independent review (carried out for the Secretary of State for the Home Department). London, UK. Retrieved from http://webarchive.nationalarchives.gov.uk/20110218135832/http:/rds.homeoffice.gov.uk/rds/pdfs06/crime-statistics-independent-review-06.pdf. UR - http://webarchive.nationalarchives.gov.uk/20110218135832/http:/rds.homeoffice.gov.uk/rds/pdfs06/crime-statistics-independent-review-06.pdf ID - ref70 ER - TY - STD TI - STATEC. (2015). Victimization and Safety in Luxembourg – Findings of the “Enquête sur la sécurité 2013”. Data were enriched with extra information provided by STATEC. Grand Duchy of Luxembourg: National Institute for statistics and economic studies. http://www.statistiques.public.lu/catalogue-publications/economie-statistiques/2015/85-2015.pdf. UR - http://www.statistiques.public.lu/catalogue-publications/economie-statistiques/2015/85-2015.pdf ID - ref71 ER - TY - STD TI - Statistics Netherlands. (2013). Veiligheidsmonitor 2012. Voorburg, Nl.: Centraal Bureau voor de Statistiek. http://www.cbs.nl/NR/rdonlyres/F27A063A-EBF9-4A08-A8D7-12BC79DB7B47/0/2013Veiligheidsmonitor2012pub.pdf. UR - http://www.cbs.nl/NR/rdonlyres/F27A063A-EBF9-4A08-A8D7-12BC79DB7B47/0/2013Veiligheidsmonitor2012pub.pdf ID - ref72 ER - TY - STD TI - Statistics Netherlands. (2017). Cyberbullying per age group. Retrieved from http://statline.cbs.nl/Statweb/publication/?DM=SLNL&PA=83096NED&D1=185&D2=7-14&D3=a&D4=a&HDR=T%2cG2&STB=G1%2cG3&VW=T. UR - http://statline.cbs.nl/Statweb/publication/%3fDM%3dSLNL%26PA%3d83096NED%26D1%3d185%26D2%3d7-14%26D3%3da%26D4%3da%26HDR%3dT%252cG2%26STB%3dG1%252cG3%26VW%3dT ID - ref73 ER - TY - CHAP AU - Stol, W. ED - Leukfeldt, R. ED - Stol, W. PY - 2012 DA - 2012// TI - Cyberspace and safety BT - Cyber safety: An introduction PB - Eleven CY - The Hague ID - Stol2012 ER - TY - STD TI - Stopbullying.gov. (2017). What is Cyberbullying. Retrieved from https://www.stopbullying.gov/cyberbullying/what-is-it/index.html. UR - https://www.stopbullying.gov/cyberbullying/what-is-it/index.html ID - ref75 ER - TY - STD TI - Tourangeau, R., & McNeeley, M. E. (2003). Measuring crime and crime victimization: Methodological issues. In Paper presented at the measurement problems in criminal research: Workshop summary, Washington, DC. ID - ref76 ER - TY - STD TI - Tuli, K., & Juneja, N. (2015). Evolution of identity thefts and online frauds on internet. International Journal of Advanced Research in Engineering and Applied Sciences. ID - ref77 ER - TY - STD TI - UNODC Intergovernmental expert group on cybercrime. (2013). Comprehensive study on cybercrime. Draft—February 2013. Retrieved from Vienna, Austria. Retrieved from: http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf. UR - http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf ID - ref78 ER - TY - JOUR AU - Wilsem, J. PY - 2013 DA - 2013// TI - ‘Bought it, but never got it’. Assessing risk factors for online consumer fraud victimization JO - European Sociological Review VL - 29 UR - https://doi.org/10.1093/esr/jcr053 DO - 10.1093/esr/jcr053 ID - Wilsem2013 ER - TY - STD TI - van Wilsem, J. (2013b). Hacking and harassment—do they have something in common? Comparing risk factors for online victimization. Journal of Contemporary Criminal Justice. https://doi.org/10.1177/1043986213507402. ID - ref80 ER - TY - STD TI - Wachs, S., Whittle, H., Hamilton-Giachritsis, C., Wolf, K., Vazsonyi, A., & Junger, M. (2017). Correlates of mono-and dual-victims of cybergrooming and cyberbullying: evidence from four countries. CyberPsychology, Behavior, and Social Networking. ID - ref81 ER - TY - CHAP AU - Wall, D. S. ED - Pattavina, A. PY - 2005 DA - 2005// TI - The Internet as a Conduit for Criminal Activity BT - Information technology and the criminal justice system PB - Sage CY - Thousand Oaks, CA UR - https://doi.org/10.4135/9781452225708.n4 DO - 10.4135/9781452225708.n4 ID - Wall2005 ER - TY - BOOK AU - Wall, D. S. PY - 2007 DA - 2007// TI - Cybercrime: The transformation of crime in the information age PB - Polity Press CY - Cambridge, UK ID - Wall2007 ER - TY - STD TI - Westerberg, S. (2017). [Online banking fraud and its prevention (personal communication)]. ID - ref84 ER - TY - JOUR AU - Whitty, M. T. AU - Buchanan, T. PY - 2012 DA - 2012// TI - The online romance scam: A serious cybercrime JO - CyberPsychology, Behavior, and Social Networking VL - 15 UR - https://doi.org/10.1089/cyber.2011.0352 DO - 10.1089/cyber.2011.0352 ID - Whitty2012 ER - TY - JOUR AU - Wittebrood, K. AU - Junger, M. PY - 2002 DA - 2002// TI - Trends in violent crime: a comparison between police statistics and victimization surveys JO - Social Indicators Research VL - 59 UR - https://doi.org/10.1023/A:1016207225351 DO - 10.1023/A:1016207225351 ID - Wittebrood2002 ER - TY - BOOK PY - 2008 DA - 2008// TI - Environmental criminology and crime analysis PB - Willan CY - London ID - ref87 ER -