scispace - formally typeset
T

Thomas J. Holt

Researcher at Michigan State University

Publications -  189
Citations -  6025

Thomas J. Holt is an academic researcher from Michigan State University. The author has contributed to research in topics: Cybercrime & The Internet. The author has an hindex of 35, co-authored 186 publications receiving 4951 citations. Previous affiliations of Thomas J. Holt include Queensland University of Technology & University of North Carolina at Charlotte.

Papers
More filters
Journal ArticleDOI

Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization

TL;DR: In this paper, the authors explored the gap in the research literature by examining a specific form of cybercrime, on-line harassment, and found some support for elements of lifestyle-routine activities theory.
Journal ArticleDOI

Exploring stolen data markets online: products and market forces

TL;DR: Examination of the nature of the market for stolen data using a qualitative analysis of 300 threads from six web forums run by and for data thieves suggests that all manner of personal and financial data can be obtained through these markets at a fraction of their true value.
Journal Article

On-line Activities, Guardianship, and Malware Infection: An Examination of Routine Activities Theory

TL;DR: The growth and penetration of computer technology in modern life has provided criminals with efficient tools to commit crime by providing opportunities to commit crimes that could not exist without cyberspace.
Journal ArticleDOI

subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures

TL;DR: The authors explored the normative orders of computer hacker subculture with multiple data sets and found that the norms and values of cyber-hacker subculture cut across the digital divide to shape relationships between hackers in virtual and real situations.
Journal ArticleDOI

An Assessment of the Current State of Cybercrime Scholarship

TL;DR: In this article, the authors examine the current literature on virtually all forms of cybercrime and the theoretical frameworks used to address these issues and give direction to refine our understanding of criminological theory and social policies to combat these offenses.