Criminal methods
Prevention, Protection and International Cooperation Against the Use of New Information Technologies To Abuse and/or Exploit Children
NCJ Number
247485
Date Published
March 2014
Hunt for Red October: The New Face of Cyber Espionage
NCJ Number
247053
Journal
.SIAK-Journal International Edition
Date Published
2014
Publication Link
Measuring a Year of Child Pornography Trafficking by U.S. Computers on a Peer-to-Peer Network
NCJ Number
246704
Journal
Child Abuse and Neglect
Date Published
February 2014
Agencies
NIJ-Sponsored
Publication Link
Explaining and Controlling Illegal Commercial Fishing: An Application of the CRAVED Theft Model
NCJ Number
246277
Journal
British Journal of Criminology
Date Published
January 2014
Publication Link
Research on Partner Stalking: Putting the Pieces Together
Date Published
October 2010
Publication Type
Report (Study/Research),
Report (Grant Sponsored),
Literature Review
Agencies
NIJ-Sponsored
Information Exposure, Presentation Modality, and Cognitive Mechanisms of Countermeasures in P300 Concealed Information Tests
Date Published
August 2013
Publication Type
Test/Measurement,
Report (Technical)
Agencies
NIJ-Sponsored
Mechanisms Used in Intellectual Property Rights Fraud in the Republic of Kazakhstan
NCJ Number
243461
Journal
Internal Security
Date Published
December 2012
Corporate Security - Private Justice? (Un)settling Employer-Employee Troubles
NCJ Number
243381
Journal
Security Journal
Date Published
July 2013
Lessons of Disloyalty in the World of Criminal Informants
NCJ Number
242676
Journal
American Criminal Law Review
Date Published
2012
Bridging Security and Good Design: Understanding Perceptions of Expert and Novice Shoplifters
NCJ Number
242093
Journal
Security Journal
Date Published
February 2013