Showing 1 - 20 results of 51 Skip to content
Universität Tübingen
Universitätsbibliothek
KrimDok
Institut für Kriminologie
  • Home
  • Infos
    • Search Tips
    • FAQs
  • My Account
  • Log Out
  • Login
  • Language
    • English
    • Deutsch
    • Español
Universitätsbibliothek
KrimDok
Institut für Kriminologie
  • Title
  • Full Texts
  • Persons / Corporations
  • Advanced Search
  • Browse
    • Browse the Catalog
    • Browse alphabetically
  • Search History
  • New items
Page will reload when a filter is removed. Reset Filters
Applied Filters:
Subject (keyword): Hacking
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Subject (keyword): Hacking
  1. Home
  2. Search Results

Search Results

  • Showing 1 - 20 results of 51
  • Go to Next Page
Refine Results
  1. 1
    Exploring and estimating the revenues of cybercrime-as-service providers: analyzing booter and stresser services
    by Smirnova, Olga (Author) Holt, Thomas J. 1978- (Author)
    in: Deviant behavior, 46 (2025), 10, Seite 1300-1313
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  2. 2
    Are active users the most central to hacker social networks?: a comparative analysis of public and private online network structures among hackers
    by Smirnova, Olga (Author) Hyslip, Thomas S. (Author) Holt, Thomas J. 1978- (Author)
    in: Deviant behavior, 46 (2025), 7, Seite 877-893
    Volltext (lizenzpflichtig)
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  3. 3
    Hacktivism: from loners to formal organizations?: assessing the social organization of hacktivist networks
    by Romagna, Marco (Author) Leukfeldt, E. R. 1982- (Author)
    in: Deviant behavior, 46 (2025), 9, Seite 1104-1124
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  4. 4
    Rational choice on a hacker forum: the effect of risk and reward cues on target selection for account hijacking
    by Stibbe, Danielle (Author) Ruiter, Stijn (Author) Steenbeek, Wouter (Author) Moneva, Asier (Author)
    in: Deviant behavior, 46 (2025), 9, Seite 1172-1193
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  5. 5
    Assessing the seriousness of cybercrime: The case of computer misuse crime in the United Kingdom and the victims’ perspective
    by Button, Mark 1969- (Author) Shepherd, David (Author) Blackbourn, Dean (Author) Sugiura, Lisa (Author) Kapend, Richard (Author) Wang, Victoria (Author)
    in: Criminology & criminal justice, 25 (2025), 2, Seite 670-691
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  6. 6
    An Assessment of the Harms Associated With Ideologically Motivated Cyberattacks
    by Holt, Thomas J. 1978- (Author) Chermak, Steven M. 1964- (Author) Freilich, Joshua D. (Author) Turner, Noah (Author) Greene-Colozzi, Emily (Author)
    in: Crime & delinquency, 71 (2025), 3, Seite 624-655
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  7. 7
    The morality behind supporting crowdfunding campaigns for eco-hacktivists
    by Tetreault, Christie (Author) Sarma, Kiran M. (Author)
    in: Deviant behavior, 45 (2024), 5, Seite 621-641
    Volltext (kostenfrei)
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  8. 8
    Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective onl...
    by van ’t Hoff-de Goede, M.S. (Author) van de Weijer, S. (Author) Leukfeldt, R. (Author)
    in: Journal of crime and justice, 47 (2024), 4, Seite 472–491
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  9. 9
    Becoming a hacktivist. Examining the motivations and the processes that prompt an individual to engage in hacktivism
    by Romagna, Marco (Author) Leukfeldt, E. R. 1982- (Author)
    in: Journal of crime and justice, 47 (2024), 4, Seite 511–529
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  10. 10
    Theoretical Explanations of the Development of Youth Hacking
    by Kim, Jihoon (Author) Leban, Lindsay (Author) Lee, Yeungjeom (Author)
    in: Crime & delinquency, 70 (2024), 8, Seite 1971-1992
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  11. 11
    Kleine Geschichte der Hackerkultur: Von der Modelleisenbahn zur Ideologie radikaler Transparenz
    by Stöcker, Christian 1973- (Author)
    in: Aus Politik und Zeitgeschichte, 73 (2023), 22-24, Seite 30-37
    Print Article
    Save to List
    Saved in:  
  12. 12
    Ein falscher Klick: Hackern auf der Spur: warum der Cyberkrieg uns alle betrifft
    by Wolfangel, Eva (Author)
    in: Schriftenreihe (Band 11000)
    Inhaltsverzeichnis (Verlag)
    Print Book
    Save to List
    Saved in:  
  13. 13
    Introducing and Exploring the Extremist Cybercrime Database (ECCD)
    by Holt, Thomas J. 1978- (Author) Chermak, Steven M. 1964- (Author) Freilich, Joshua D. (Author) Turner, Noah (Author) Greene-Colozzi, Emily (Author)
    in: Crime & delinquency, 69 (2023), 12, Seite 2411-2436
    Presumably Free Access
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  14. 14
    Legal Aspects of the EncroChat Operation: A Human Rights Perspective
    by Oerlemans, J.J. (Author) Toor, Dave van 1985- (Author)
    in: European journal of crime, criminal law and criminal justice, 30 (2022), 3/4, Seite 309-328
    Print Article
    Save to List
    Saved in:  
  15. 15
    Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums
    by Warkentin, Noelle (Author) Frank, Richard (Author) Zhang, Yuxuan (Cicilia) (Author) Zakimi, Naomi (Author)
    in: Criminal justice studies, 35 (2022), 3, Seite 322-345
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  16. 16
    Cyberterrorism: four Reasons for Its Absence—So Far
    by Jacobsen, Jeppe Teglskov (Author)
    in: Perspectives on terrorism, 16 (2022), 5, Seite 62-72
    Volltext (kostenfrei)
    Electronic Article
    Save to List
    Saved in:  
  17. 17
    Exploring malicious hacker communities: toward proactive cyber-defence
    by Marin, Ericsson (Author) Almukaynizi, Mohammed 1987- (Author, Writer of preface) Sarkar, Soumajyoti 1992- (Author) Nunes, Eric (Author) Shakarian, Jana 1977- (Author) Shakarian, Paulo 1980- (Author)
    Cambridge University Press 2021
    Volltext (lizenzpflichtig)
    Volltext (lizenzpflichtig)
    Electronic Book
    Save to List
    Saved in:  
  18. 18
    Exploring malicious hacker communities: toward proactive cyber-defence
    by Marin, Ericsson (Author) Almukaynizi, Mohammed 1987- (Author, Writer of preface) Sarkar, Soumajyoti 1992- (Author) Nunes, Eric (Author) Shakarian, Jana 1977- (Author) Shakarian, Paulo 1980- (Author)
    Cambridge University Press 2021
    Table of Contents
    Blurb
    Print Book
    Save to List
    Saved in:  
  19. 19
    Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
    by Bossler, Adam M. (Author)
    in: American journal of criminal justice, 46 (2021), 6, Seite 911-934
    Volltext (lizenzpflichtig)
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  20. 20
    Use of a Multitheoretic Model to Understand and Classify Juvenile Computer Hacking Behavior
    by Fox, Bryanna (Author) Holt, Thomas J. 1978- (Author)
    in: Criminal justice and behavior, 48 (2021), 7, Seite 943-963
    Volltext (lizenzpflichtig)
    Electronic Article
    Save to List
    Saved in:  
  • 1
  • 2
  • 3
  • Next

Search Tools:

  • RSS Feed
  • Email Search
  • Save Search
  • Alert schedule: None

Refine Results

Page will reload when a filter is selected or excluded.
Remove Filters
Clear Filter Subject (keyword): Hacking

  • Non-open-access 40 results 40
  • Open access 11 results 11

  • Electronic 35 results 35
  • Non-electronic 16 results 16

  • Article 40 results 40
  • Book 11 results 11

  • English 46 results 46
  • German 5 results 5

  • Holt, Thomas J. 1978- 11 results 11
  • Leukfeldt, E. R. 1982- 6 results 6
  • Bossler, Adam M. 3 results 3
  • Almukaynizi, Mohammed 1987- 2 results 2
  • Amoroso, Edward G. 2 results 2
  • Burkart, Patrick 1969- 2 results 2
  • more… less ...

  • Hacking
  • Cybercrime 23 results 23
  • Cyberkriminalität 9 results 9
  • Cyberterrorism 8 results 8
  • Hacker 7 results 7
  • Internetkriminalität 7 results 7
  • more… less ...

  • China 2 results 2
  • Iran 2 results 2
  • Russland 2 results 2
  • Syrien 2 results 2
  • Usa 2 results 2
  • Deutschland 1 results 1
  • more… less ...
© 2025 Tübingen University Library
 Sponsored by
DFG
  • Contact
  • Imprint
  • Privacy statement
Social Media Bluesky Mastodon