A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks.
By: David Maimon et al.
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces.