Have a personal or library account? Click to login
Evaluation of Digital Shadow Economy Prevention Measures Cover

Evaluation of Digital Shadow Economy Prevention Measures

Open Access
|Jul 2016

References

  1. Arli, D., Tjiptono, F., Porto, R. (2015). The impact of moral equity, relativism and attitude on individuals’ digital piracy behaviour in a developing country. Marketing Intelligence & Planning, 33 (3), 348-365.10.1108/MIP-09-2013-0149
  2. Bossler, A. M., Holt, T. H. (2012). Patrol officers' perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management, 35 (1), 165-181. http://dx.doi.org/10.1108/1363951121121550410.1108/13639511211215504
  3. Brenner, S. W. (2008). Cyberthreats: The Emerging Fault Lines of the Nation State, Oxford University Press, New York, NY.10.1093/acprof:oso/9780195385014.001.0001
  4. Camarero, C., Anton, C., Rodriguez, J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case. The Electronic Library, 32 (4), 542-566. http://dx.doi.org/10.1108/EL-11-2012-014910.1108/EL-11-2012-0149
  5. Duncan, D. F., White, J. B. and Nicholson, T. (2003). Using internet based surveys to reach hidden populations: case of non-abusive illicit drug users. American Journal of Health Behaviour, 27 (3), 208-18.10.5993/AJHB.27.3.2
  6. Hinduja, S. (2007). Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International Journal of Cyber Criminology, (1), 1-26.
  7. Holt, T. J., Blevins, K. R. and Burkert, N. (2010). Considering the pedophile subculture on-line. Sexual Abuse: Journal of Research and Treatment, (22), 3-24.10.1177/1079063209344979
  8. Holz, T., Engelberth, M., Freiling, F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones. In ESORICS Proceedings, (9), 1-18.
  9. Kim, D. J., Steinfield, C. and Lai, Y. (2008). Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems, 44 (4), 1000-1015.10.1016/j.dss.2007.11.007
  10. Lithuanian Free Market Institute (2014). Lietuvos seseline ekonomika. [Accessed 12.01.2016]. Available from Internet: http://files.lrinka.lt/Seseline_ekonomika/LSE3.pdf
  11. Manolas, G., Rontos, K., Sfakianakis, G., Vavouras, I. (2013). The Determinants of the Shadow Economy: The Case of Greece. International Journal of Criminology and Sociological Theory, 6 (1), 1036-1047.
  12. Mayayise, T., Osunmakinde, I. O. (2014). E-commerce assurance models and trustworthiness issues: an empirical study. Information Management & Computer Security, 22 (1), 76-96. http://dx.doi.org/10.1108/IMCS-01-2013-000110.1108/IMCS-01-2013-0001
  13. McQuade, S. (2006). Technology-enabled crime, policing and security. Journal of Technology Studies, (32), 32-42.10.21061/jots.v32i1.a.5
  14. Mello, J. P. (2013). Cybercrime fueled by mature digital underground. [Accessed 10.10.2015]. Available from Internet: http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-by-mature-digitalunderground.html
  15. Morz, B. (2011). Migration into the Shadow: Unregistered Work in Poland. Journal of Management and Financial Sciences, 4 (6), 73-112.
  16. Russel, B. (2010). Revenue Administration - Managing the Shadow Economy. Technical Notes and Manual, IMF.10.5089/9781462355587.005
  17. Senjo, S. R. (2004). An analysis of computer-related crime: comparing police officer perceptions with empirical data. Security Journal, (17), 55-71.10.1057/palgrave.sj.8340168
  18. Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime, 22(1), 104-125.10.1108/JFC-09-2013-0051
  19. Swire, P. (2009). No cop on the beat: underenforcement in e-commerce and cybercrime. Journal of Telecommunications and High Technology Law, (7), 107-26.
  20. Taylor, R. W., Fritsch, E. J., Liederbach, J. and Holt, T. J. (2010). Digital Crime and Digital Terrorism, 2nd ed., Pearson Prentice Hall, Upper Saddle River.
  21. Taylor, S. A. (2012). Evaluating digital piracy intentions on behaviours. Journal of Services Marketing, 26 (7), 472-483.10.1108/08876041211266404
  22. Vershinina, N., Barrett, R. and Meyer, M. (2009). Polish immigrants in Leicester: forms of capital underpinning entrepreneurial activity, Leicester Business School Occasional Paper Series, N86 (August), Leicester Business School, Leicester.
  23. Vershinina, N.; Rodionova, Y. (2011). Methodological issues in studying hidden populations operating in informal economy, International Journal of Sociology and Social Policy, 31(11/12), 697-716.10.1108/01443331111177887
  24. Vida, I., Koklic, M. K., Kukar-Kinney, M., Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298-313.10.1108/17505931211282418
  25. Vlachos, V., Minou, M., Assimakopouos, V., Toska, A. (2011). The landscape of cybercrime in Greece. Information Management & Computer Security,19(2), 113-123.10.1108/09685221111143051
  26. Wall, D. S., Williams, M. (2007). Policing diversity in the digital age: maintaining order in virtual communities. Criminology and Criminal Justice, (7), 391-415.10.1177/1748895807082064
  27. Williams, P.; Nicholas, D.; Rowlands, I. (2010). The attitudes and behaviours of illegal downloaders. Aslib Proceedings, 62(3), 283-301.10.1108/00012531011046916
  28. Yip, M., Shadbolt, N., Tiropanis, N., Webber, C. (2012). The digital underground economy: A social network approach to understanding cybercrime: Digital Futures 2012. In the third Annual Digital Economy All Hands Conference. [Accessed 10.10.2015]. Available from Internet Available from Internet: http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdf
Language: English
Page range: 31 - 40
Published on: Jul 6, 2016
Published by: University College of Economics and Culture
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2016 Rita Remeikiene, Ligita Gaspareniene, published by University College of Economics and Culture
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.