• Publications
  • Influence
Laundering Money Online: a review of cybercriminals methods
  • J. Richet
  • Business, Computer Science
  • ArXiv
  • 8 October 2013
TLDR
Money laundering is a critical step in the cyber crime process which is experiencing some changes as hackers and their criminal colleagues continually alter and optimize payment mechanisms. Expand
  • 21
  • 1
  • PDF
Game-Changing Strategies: How to Create New Market Space in Established Industries by Breaking the Rules—Constantinos C. Markides. (San Francisco, CA: Jossey-Bass, 256 pages, $19,77, 2008). Reviewed
  • J. Richet
  • Economics, Business
  • IEEE Transactions on Engineering Management
  • 1 February 2014
This book is relevant to managers who want to understand the process of how new market space is created through business model innovation. By briefly explaining how the process has worked for newExpand
  • 2
  • 1
Extortion on the Internet: the Rise of Crypto-Ransomware
This article highlights the transition from traditional ransomware threats (ransomware 1.0) to new and more complex attacks (crypto-ransomware) targeting desktop computers. The article suggests thatExpand
  • 14
  • PDF
From Young Hackers to Crackers
  • J. Richet
  • Psychology, Computer Science
  • Int. J. Technol. Hum. Interact.
  • 1 July 2013
TLDR
A growing number of scholars state that the Internet presents "some unique opportunities for deviant behavior" Rogers et al, 2006. Expand
  • 9
Financial Crimes: Psychological, Technological, and Ethical Issues
Cyprus and Greece, both members of the EU and the Eurozone, are currently in the throes of a devastating financial crisis. Public opinion surveys carried out in Cyprus (2010, 2011, 2012), GreeceExpand
  • 2
Overt censorship: a fatal mistake?
  • J. Richet
  • History, Computer Science
  • CACM
  • 1 August 2013
TLDR
Censorship of information often has the opposite effect by drawing attention to the censored material. Expand
  • 6
Cornerstone of terror: the double-edged impact of fear appeals in a transformational information system security project
TLDR
We investigated how the management team uses fear appeals to legitimize a large and transformational Information Systems Security project. Expand
A Loose Coupling Perspective on Ancient Egypt Economy and Society
A large body of literature assumes that Ancient Egypt’s economy and society were tightly and hierarchically coupled. However, a detailed understanding of complexity in Ancient Egypt eludes us.Expand
...
1
2
...