Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Peter ReuterProfessor of Public Policy, University of MarylandVerified email at umd.edu
Mike MaguireProfessor of Criminology, University of South WalesVerified email at southwales.ac.uk
Matthew L WilliamsProfessor of Criminology, Cardiff UniversityVerified email at cf.ac.uk
R.V. Gundurcriminologist, ravejudgerun.comVerified email at ravejudgerun.com
Nicholas LordProfessor of Criminology, University of ManchesterVerified email at manchester.ac.uk
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Dr. Alexander SchuchterUniversity of St.Gallen (HSG)Verified email at schuchter-management.ch
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
Terence C HallidayAmerican Bar FoundationVerified email at abfn.org
David S. WallUniversity of LeedsVerified email at leeds.ac.uk
David Nelken FBAProfessor of Comparative and Transnational Law, KIng's College, LondonVerified email at kcl.ac.uk
Phil WilliamsProfessor of International Security, University of Pittsburgh Verified email at frontier.com
Adam EdwardsCardiff UniversityVerified email at cardiff.ac.uk
Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Professor Priscilla HarriesProfessor of Occupational TherapyVerified email at sgul.kingston.ac.uk
Mary L M GilhoolyProfessor of Gerontology, Brunel UniversityVerified email at brunel.ac.uk
Georgios A. AntonopoulosProfessor of Criminology, Northumbria University NewcastleVerified email at northumbria.ac.uk
Follow![Michael Levi](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=yCJJqssAAAAJ&citpid=1)