Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Peter ReuterProfessor of Public Policy, University of MarylandVerified email at umd.edu
- Mike MaguireProfessor of Criminology, University of South WalesVerified email at southwales.ac.uk
- Matthew L WilliamsProfessor of Criminology, Cardiff UniversityVerified email at cf.ac.uk
- R.V. Gundurcriminologist, ravejudgerun.comVerified email at ravejudgerun.com
- Nicholas LordProfessor of Criminology, University of ManchesterVerified email at manchester.ac.uk
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Dr. Alexander SchuchterUniversity of St.Gallen (HSG)Verified email at schuchter-management.ch
- Terence C HallidayAmerican Bar FoundationVerified email at abfn.org
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Richard ClaytonUniversity of CambridgeVerified email at cam.ac.uk
- David S. WallUniversity of LeedsVerified email at leeds.ac.uk
- Phil WilliamsProfessor of International Security, University of Pittsburgh Verified email at frontier.com
- David Nelken FBAProfessor of Comparative and Transnational Law, KIng's College, LondonVerified email at kcl.ac.uk
- Adam EdwardsCardiff UniversityVerified email at cardiff.ac.uk
- Stefan SavageProfessor of Computer Science and Engineering, UC San DiegoVerified email at cs.ucsd.edu
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
- Professor Priscilla HarriesProfessor of Occupational TherapyVerified email at sgul.kingston.ac.uk
- Mary L M GilhoolyProfessor of Gerontology, Brunel UniversityVerified email at brunel.ac.uk
- Georgios A. AntonopoulosProfessor of Criminology, Northumbria University NewcastleVerified email at northumbria.ac.uk
Follow