Sledovat
Kyung-Shick Choi
Kyung-Shick Choi
Cybercrime Investigation & Cybersecurity Program Director, Boston University
E-mailová adresa ověřena na: bu.edu - Domovská stránka
Název
Citace
Citace
Rok
Computer crime victimization and integrated theory: An empirical assessment.
K Choi
International Journal of Cyber Criminology 2 (1), 2008
3442008
Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory
KS Choi, JR Lee
Computers in Human Behavior 73, 394-402, 2017
1152017
An empirical evaluation: gunshot detection system and its effectiveness on police practices
KS Choi, M Librett, TJ Collins
Police Practice and Research 15 (1), 48-61, 2014
602014
Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine …
KS Choi, S Cho, JR Lee
Computers in Human Behavior 100, 1-10, 2019
592019
Diagnosis of cyber and non-physical bullying victimization: A lifestyles and routine activities theory approach to constructing effective preventative measures
KS Choi, K Earl, JR Lee, S Cho
Computers in Human Behavior 92, 11-19, 2019
552019
Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning
KS Choi, SS Lee, JR Lee
International Journal of Cyber Criminology 11 (1), 110-127, 2017
542017
Ransomware Against Police: Diagnosis of Risk Factors via Application of Cyber-Routine Activities Theory
K Choi, T Scott, D LeClair
International Journal of Forensic Science & Pathology 4 (7), 253-258, 2016
512016
Cybercriminology and Digital Investigation
K Choi
Lfb Scholarly Pub Llc, 2015
492015
Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime
KS Choi, CS Lee, ER Lounderback
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 2-17, 2019
372019
Mapping global cyberterror networks: an empirical study of al-Qaeda and ISIS cyberterrorism events
CS Lee, KS Choi, R Shandler, C Kayser
Journal of Contemporary Criminal Justice 37 (3), 333-355, 2021
322021
Methodological and ethical challenges to conducting human trafficking studies: A case study of Korean trafficking and smuggling for sexual exploitation to the United States
K Choo, JO Jang, K Choi
Women & Criminal Justice 20 (1-2), 167-185, 2010
312010
A Test of Structural Model for Fear of Crime in Social Networking Sites
SS Lee, K Choi, S Choi, E Englander
International Journal of Cybersecurity Intelligence & Cybercrime 2 (2), 5-22, 2019
292019
Spreading Propaganda in Cyberspace: Comparing Cyber-Resource Usage of Al Qaeda and ISIS
K Choi, CS Lee, R Cadigan
International Journal of Cybersecurity Intelligence & Cybercrime 1 (1), 21-39, 2018
292018
Applying the lifestyle routine activities theory to understand physical and nonphysical peer victimization
S Cho, JS Hong, DL Espelage, KS Choi
Journal of Aggression, Maltreatment & Trauma 26 (3), 297-315, 2017
292017
Interrelationship between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity Assessment via Cyber-Routine Activities Theoretical Framework
H Lee, KS Choi
The New Technology of Financial Crime 1, 82-103, 2022
252022
The Assessment of Capable Guardianship Measures against Bullying Victimization in the School Environment.
K Choi, S Cronin, H Correia
Global Perspectives on Crime Prevention and Community Resilience, 2017
242017
Cibercriminología. Guía para la investigación del cibercrimen y mejores prácticas en seguridad digital
K Choi, MM Toro-Alvarez
22*2017
Demographic variables and risk factors in computer-crime: an empirical assessment
K Choi, K Choo, Y Sung
Cluster Computing 19 (1), 369-377, 2016
212016
Illegal Gambling and Its Operation via the Darknet and Bitcoin: An Application of Routine Activity Theory
S Choi, KS Choi, Y Sungu-Eryilmaz, HK and Park
International Journal of Cybersecurity Intelligence & Cybercrime 3 (1), 3-23, 2020
192020
The Present and Future of Cybercrime, Cyberterrorism, and Cybersecurity
K Choi, CS Lee
International Journal of Cybersecurity Intelligence & Cybercrime 1 (1), 1-4, 2018
192018
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20