Open Access

Evaluation of Digital Shadow Economy Prevention Measures


Cite

Arli, D., Tjiptono, F., Porto, R. (2015). The impact of moral equity, relativism and attitude on individuals’ digital piracy behaviour in a developing country. Marketing Intelligence & Planning, 33 (3), 348-365.10.1108/MIP-09-2013-0149Search in Google Scholar

Bossler, A. M., Holt, T. H. (2012). Patrol officers' perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management, 35 (1), 165-181. http://dx.doi.org/10.1108/1363951121121550410.1108/13639511211215504Search in Google Scholar

Brenner, S. W. (2008). Cyberthreats: The Emerging Fault Lines of the Nation State, Oxford University Press, New York, NY.10.1093/acprof:oso/9780195385014.001.0001Search in Google Scholar

Camarero, C., Anton, C., Rodriguez, J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance: Evidence from the Spanish case. The Electronic Library, 32 (4), 542-566. http://dx.doi.org/10.1108/EL-11-2012-014910.1108/EL-11-2012-0149Search in Google Scholar

Duncan, D. F., White, J. B. and Nicholson, T. (2003). Using internet based surveys to reach hidden populations: case of non-abusive illicit drug users. American Journal of Health Behaviour, 27 (3), 208-18.10.5993/AJHB.27.3.2Search in Google Scholar

Hinduja, S. (2007). Computer crime investigations in the United States: leveraging knowledge from the past to address the future. International Journal of Cyber Criminology, (1), 1-26.Search in Google Scholar

Holt, T. J., Blevins, K. R. and Burkert, N. (2010). Considering the pedophile subculture on-line. Sexual Abuse: Journal of Research and Treatment, (22), 3-24.10.1177/1079063209344979Search in Google Scholar

Holz, T., Engelberth, M., Freiling, F. (2012). Learning more about the underground economy: A case-study of keyloggers and dropzones. In ESORICS Proceedings, (9), 1-18.Search in Google Scholar

Kim, D. J., Steinfield, C. and Lai, Y. (2008). Revisiting the role of web assurance seals in business-to-consumer electronic commerce. Decision Support Systems, 44 (4), 1000-1015.10.1016/j.dss.2007.11.007Search in Google Scholar

Lithuanian Free Market Institute (2014). Lietuvos seseline ekonomika. [Accessed 12.01.2016]. Available from Internet: http://files.lrinka.lt/Seseline_ekonomika/LSE3.pdfSearch in Google Scholar

Manolas, G., Rontos, K., Sfakianakis, G., Vavouras, I. (2013). The Determinants of the Shadow Economy: The Case of Greece. International Journal of Criminology and Sociological Theory, 6 (1), 1036-1047.Search in Google Scholar

Mayayise, T., Osunmakinde, I. O. (2014). E-commerce assurance models and trustworthiness issues: an empirical study. Information Management & Computer Security, 22 (1), 76-96. http://dx.doi.org/10.1108/IMCS-01-2013-000110.1108/IMCS-01-2013-0001Search in Google Scholar

McQuade, S. (2006). Technology-enabled crime, policing and security. Journal of Technology Studies, (32), 32-42.10.21061/jots.v32i1.a.5Search in Google Scholar

Mello, J. P. (2013). Cybercrime fueled by mature digital underground. [Accessed 10.10.2015]. Available from Internet: http://www.csoonline.com/article/2133649/identity-access/cybercrime-fueled-by-mature-digitalunderground.htmlSearch in Google Scholar

Morz, B. (2011). Migration into the Shadow: Unregistered Work in Poland. Journal of Management and Financial Sciences, 4 (6), 73-112.Search in Google Scholar

Russel, B. (2010). Revenue Administration - Managing the Shadow Economy. Technical Notes and Manual, IMF.10.5089/9781462355587.005Search in Google Scholar

Senjo, S. R. (2004). An analysis of computer-related crime: comparing police officer perceptions with empirical data. Security Journal, (17), 55-71.10.1057/palgrave.sj.8340168Search in Google Scholar

Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime, 22(1), 104-125.10.1108/JFC-09-2013-0051Search in Google Scholar

Swire, P. (2009). No cop on the beat: underenforcement in e-commerce and cybercrime. Journal of Telecommunications and High Technology Law, (7), 107-26.Search in Google Scholar

Taylor, R. W., Fritsch, E. J., Liederbach, J. and Holt, T. J. (2010). Digital Crime and Digital Terrorism, 2nd ed., Pearson Prentice Hall, Upper Saddle River.Search in Google Scholar

Taylor, S. A. (2012). Evaluating digital piracy intentions on behaviours. Journal of Services Marketing, 26 (7), 472-483.10.1108/08876041211266404Search in Google Scholar

Vershinina, N., Barrett, R. and Meyer, M. (2009). Polish immigrants in Leicester: forms of capital underpinning entrepreneurial activity, Leicester Business School Occasional Paper Series, N86 (August), Leicester Business School, Leicester.Search in Google Scholar

Vershinina, N.; Rodionova, Y. (2011). Methodological issues in studying hidden populations operating in informal economy, International Journal of Sociology and Social Policy, 31(11/12), 697-716.10.1108/01443331111177887Search in Google Scholar

Vida, I., Koklic, M. K., Kukar-Kinney, M., Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298-313.10.1108/17505931211282418Search in Google Scholar

Vlachos, V., Minou, M., Assimakopouos, V., Toska, A. (2011). The landscape of cybercrime in Greece. Information Management & Computer Security,19(2), 113-123.10.1108/09685221111143051Search in Google Scholar

Wall, D. S., Williams, M. (2007). Policing diversity in the digital age: maintaining order in virtual communities. Criminology and Criminal Justice, (7), 391-415.10.1177/1748895807082064Search in Google Scholar

Williams, P.; Nicholas, D.; Rowlands, I. (2010). The attitudes and behaviours of illegal downloaders. Aslib Proceedings, 62(3), 283-301.10.1108/00012531011046916Search in Google Scholar

Yip, M., Shadbolt, N., Tiropanis, N., Webber, C. (2012). The digital underground economy: A social network approach to understanding cybercrime: Digital Futures 2012. In the third Annual Digital Economy All Hands Conference. [Accessed 10.10.2015]. Available from Internet Available from Internet: http://eprints.soton.ac.uk/343351/1/yip_de2012_submission.pdfSearch in Google Scholar

eISSN:
2256-0173
Language:
English
Publication timeframe:
2 times per year
Journal Subjects:
Business and Economics, Political Economics, other, Business Management, Law, Commercial Law, Social Sciences, Education