Applying routine activity theory to cybercrime: A theoretical and empirical analysis ER Leukfeldt, M Yar Deviant Behavior 37 (3), 263-280, 2016 | 173 | 2016 |
Cybercriminal networks, social ties and online forums: social ties versus digital ties within phishing and malware networks ER Leukfeldt, ER Kleemans, WP Stol The British Journal of Criminology 57 (3), 704-722, 2017 | 89 | 2017 |
Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization ER Leukfeldt Cyberpsychology, Behavior, and Social Networking 17 (8), 551-555, 2014 | 84 | 2014 |
Cybercrime and social ties. Phishing in Amsterdam ER Leukfeldt Trends in organized crime 17 (4), 231-249, 2014 | 66 | 2014 |
Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime ER Leukfeldt, A Lavorgna, ER Kleemans European Journal on Criminal Policy and Research 23 (3), 287-300, 2017 | 58 | 2017 |
A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists ER Leukfeldt, ER Kleemans, WP Stol Crime, Law and Social Change 67 (1), 21-37, 2017 | 50 | 2017 |
High volume cyber crime and the organization of the police: The results of two empirical studies in the Netherlands R Leukfeldt, S Veenstra, W Stol International Journal of Cyber Criminology 7 (1), 1, 2013 | 43 | 2013 |
Verkenning cybercrime in Nederland 2009 ER Leukfeldt, MML Domenie, W Stol | 43* | 2010 |
Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis ER Leukfeldt, ER Kleemans, WP Stol Crime, Law and Social Change 67 (1), 39-53, 2017 | 37 | 2017 |
Governmental filtering of websites: The Dutch case WP Stol, HKW Kaspersen, J Kerstens, ER Leukfeldt, AR Lodder Computer Law & Security Review 25 (3), 251-262, 2009 | 37 | 2009 |
Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization J Jansen, R Leukfeldt International Journal of Cyber Criminology 10 (1), 79, 2016 | 35 | 2016 |
Big five personality traits of cybercrime victims SGA Van de Weijer, ER Leukfeldt Cyberpsychology, Behavior, and Social Networking 20 (7), 407-412, 2017 | 34 | 2017 |
Research agenda the human factor in cybercrime and cybersecurity ER Leukfeldt Eleven international publishing, 2017 | 34 | 2017 |
How people help fraudsters steal their money: An analysis of 600 online banking fraud cases J Jansen, R Leukfeldt 2015 workshop on socio-technical aspects in security and trust, 24-31, 2015 | 32 | 2015 |
Slachtofferschap in een gedigitaliseerde samenleving: Een onderzoek onder burgers naar e-fraude, hacken en andere veelvoorkomende criminaliteit MML Domenie, ER Leukfeldt, JA Wilsem, J Jansen, P Stol, W Boom Lemma, 2013 | 31* | 2013 |
Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking SGA van de Weijer, R Leukfeldt, W Bernasco European Journal of Criminology 16 (4), 486-508, 2019 | 30 | 2019 |
The use of online crime markets by cybercriminal networks: A view from within R Leukfeldt, E Kleemans, W Stol American Behavioral Scientist 61 (11), 1387-1402, 2017 | 27 | 2017 |
Fighting cybercrime: A joint effort S Boes, ER Leukfeldt Cyber-physical security, 185-203, 2017 | 27 | 2017 |
Organised cybercrime and social opportunity structures: A proposal for future research directions ER Leukfeldt The European Review of Organised Crime 2 (2), 91-103, 2015 | 25 | 2015 |
Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention ER Leukfeldt arXiv preprint arXiv:1506.00769, 2015 | 18 | 2015 |