Applying routine activity theory to cybercrime: A theoretical and empirical analysis ER Leukfeldt, M Yar Deviant Behavior 37 (3), 263-280, 2016 | 568 | 2016 |
Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks ER Leukfeldt, ER Kleemans, WP Stol The British Journal of Criminology 57 (3), 704-722, 2017 | 223 | 2017 |
Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization ER Leukfeldt Cyberpsychology, Behavior, and Social Networking 17 (8), 551-555, 2014 | 190 | 2014 |
Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime ER Leukfeldt, A Lavorgna, ER Kleemans European Journal on Criminal Policy and Research 23, 287-300, 2017 | 171 | 2017 |
Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking SGA Van de Weijer, R Leukfeldt, W Bernasco European Journal of Criminology 16 (4), 486-508, 2019 | 149 | 2019 |
Cybercrime and social ties. Phishing in Amsterdam ER Leukfeldt Trends in organized crime 17 (4), 231-249, 2014 | 146 | 2014 |
Big five personality traits of cybercrime victims SGA Van de Weijer, ER Leukfeldt Cyberpsychology, Behavior, and Social Networking 20 (7), 407-412, 2017 | 134 | 2017 |
A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists ER Leukfeldt, ER Kleemans, WP Stol Crime, Law and Social Change 67, 21-37, 2017 | 116 | 2017 |
Phishing and malware attacks on online banking customers in the Netherlands: A qualitative analysis of factors leading to victimization J Jansen, R Leukfeldt International Journal of Cyber Criminology 10 (1), 79, 2016 | 113 | 2016 |
Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis ER Leukfeldt, ER Kleemans, WP Stol Crime, Law and Social Change 67, 39-53, 2017 | 100 | 2017 |
Research agenda the human factor in cybercrime and cybersecurity ER Leukfeldt Eleven international publishing, 2017 | 99* | 2017 |
High volume cyber crime and the organization of the police: The results of two empirical studies in the Netherlands R Leukfeldt, S Veenstra, W Stol International Journal of Cyber Criminology 7 (1), 1, 2013 | 96 | 2013 |
Fighting cybercrime: A joint effort S Boes, ER Leukfeldt Cyber-physical security: Protecting critical infrastructure at the state and …, 2017 | 80 | 2017 |
Coping with cybercrime victimization: An exploratory study into impact and change J Jansen, R Leukfeldt Journal of Qualitative Criminal Justice and Criminology 6 (2), 205-228, 2018 | 78 | 2018 |
Money talks money laundering choices of organized crime offenders in a digital age EW Kruisbergen, ER Leukfeldt, ER Kleemans, RA Roks Journal of Crime and Justice 42 (5), 569-581, 2019 | 76 | 2019 |
The use of online crime markets by cybercriminal networks: A view from within R Leukfeldt, E Kleemans, W Stol American Behavioral Scientist 61 (11), 1387-1402, 2017 | 75 | 2017 |
Reporting cybercrime victimization: determinants, motives, and previous experiences S van de Weijer, R Leukfeldt, S Van der Zee Policing: An International Journal 43 (1), 17-34, 2020 | 66 | 2020 |
Testing an integrated self-control and routine activities framework to examine malware infection victimization TJ Holt, J van Wilsem, S van de Weijer, R Leukfeldt Social Science Computer Review 38 (2), 187-206, 2020 | 62 | 2020 |
The human factor of cybercrime TJ Holt Routledge, 2019 | 61 | 2019 |
An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites TJ Holt, R Leukfeldt, S van de Weijer Criminal Justice and Behavior 47 (4), 487-505, 2020 | 57 | 2020 |