Criminal methods
Prevention, Protection and International Cooperation Against the Use of New Information Technologies To Abuse and/or Exploit Children
NCJ Number
247485
Date Published
March 2014
Hunt for Red October: The New Face of Cyber Espionage
NCJ Number
247053
Journal
.SIAK-Journal International Edition
Date Published
2014
Publication Link
Measuring a Year of Child Pornography Trafficking by U.S. Computers on a Peer-to-Peer Network
NCJ Number
246704
Journal
Child Abuse and Neglect
Date Published
February 2014
Agencies
NIJ-Sponsored
Publication Link
Explaining and Controlling Illegal Commercial Fishing: An Application of the CRAVED Theft Model
NCJ Number
246277
Journal
British Journal of Criminology
Date Published
January 2014
Publication Link
Research on Partner Stalking: Putting the Pieces Together
Date Published
October 2010
Publication Type
Report (Study/Research),
Report (Grant Sponsored),
Literature Review
Agencies
NIJ-Sponsored
Information Exposure, Presentation Modality, and Cognitive Mechanisms of Countermeasures in P300 Concealed Information Tests
Date Published
August 2013
Publication Type
Test/Measurement,
Report (Technical)
Agencies
NIJ-Sponsored
Mechanisms Used in Intellectual Property Rights Fraud in the Republic of Kazakhstan
NCJ Number
243461
Journal
Internal Security
Date Published
December 2012
Corporate Security - Private Justice? (Un)settling Employer-Employee Troubles
NCJ Number
243381
Journal
Security Journal
Date Published
July 2013
Technology, Teen Dating Violence and Abuse, and Bullying
Date Published
July 2013
Publication Type
Survey,
Report (Study/Research),
Report (Grant Sponsored)
Agencies
NIJ-Sponsored
Lessons of Disloyalty in the World of Criminal Informants
NCJ Number
242676
Journal
American Criminal Law Review
Date Published
2012