首页 > 最新文献

International Journal of Cyber Criminology最新文献

英文 中文
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function 网络骚扰认识课程:家庭虐待实施者方案对其设计和功能的影响
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-06-30 DOI: 10.5281/ZENODO.3750140
L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short
{"title":"Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function","authors":"L. Conradie, Melanie Pitchford, Ellie Myers, James Barnes, E. Short","doi":"10.5281/ZENODO.3750140","DOIUrl":"https://doi.org/10.5281/ZENODO.3750140","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"220"},"PeriodicalIF":1.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42272738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud 受害经历对网络犯罪恐惧的影响:大学生信用卡/借记卡诈骗经历
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3749468
M. Abdulai
{"title":"Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud","authors":"M. Abdulai","doi":"10.5281/ZENODO.3749468","DOIUrl":"https://doi.org/10.5281/ZENODO.3749468","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"157"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria 尼日利亚克罗斯河州对企业组织的网络钓鱼攻击呈上升趋势
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.4770111
J. T. Okpa, B. O. Ajah, Joseph Egidi Igbe
{"title":"Rising Trend of Phishing Attacks on Corporate Organisations in Cross River State, Nigeria","authors":"J. T. Okpa, B. O. Ajah, Joseph Egidi Igbe","doi":"10.5281/ZENODO.4770111","DOIUrl":"https://doi.org/10.5281/ZENODO.4770111","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"460-478"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71084130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes 理解网络空间中的目标适宜性:网络受害过程的国际比较
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3744874
F. Miró-Llinares, Jacqueline M. Drew, M. Townsley
Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.
经济形式的网络犯罪影响着全世界数百万人。网络罪犯越来越多地实施垃圾邮件、诈骗和恶意软件等预备犯罪。然而,文献表明,有些人比其他人更容易受到这些类型的攻击,这可能是一个不同国家的情况。采用比较研究设计,确定了与经济预备犯罪受害可能性较高相关的行为。从两个样本(一个是西班牙人,一个是澳大利亚人)获得的结果表明,尽管受害的普遍程度相似,但日常活动的相关关系却大不相同。虽然分析的11种行为中有6种相似,但发现了其他实质性差异。西班牙人面临的最大风险是网上购物,而澳大利亚人面临的最大风险是下载文件。在使用杀毒软件、盗版软件、联系陌生人和参加视频会议方面也发现了差异。基于目前的研究,得出的结论是,网络受害应该集中在识别在线用户日常活动中的细微差别,而不是更广泛的结构,如互动或可见性。此外,预防战略必须考虑到不同地理区域日常行为的差异。
{"title":"Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes","authors":"F. Miró-Llinares, Jacqueline M. Drew, M. Townsley","doi":"10.5281/ZENODO.3744874","DOIUrl":"https://doi.org/10.5281/ZENODO.3744874","url":null,"abstract":"Economic forms of cybercrime affect millions of people around the world. Preparatory crimes such as spam, scam and malware are increasingly enacted by cybercriminals. However, literature has shown that some people are more vulnerable than others to these types of attacks and this may be a circumstance that varies cross-nationally. Using a comparative research design, behaviors that are associated with a higher probabUity of victimization by economic preparatory crimes are identified. The results obtained ffom two samples, one Spanish and one Australian, show that despite similar victimization prevalence, the correlates of routine activities vary substantially. While 6 of the 11 behaviors analyzed were similar, other substantial differences were found. The greatest risk for Spanish participants is online shopping, while for Australians it is downloading files. Differences were also found for use of antivirus, pirated software, contacting strangers and taking part in video conferences. Based on the current research, it is concluded that cyber victimization should locus on identifying nuances in the daily activities performed by online users, rather than on broader constructs such as interaction or visibility. Further, preventive strategies must take into account differences in routine behaviors across different geographical areas.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"35 1","pages":"139-155"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Harmful discourse on social triggering factors of persecution truth era 有害话语对社会迫害真相时代的触发因素
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3752537
Bagus Sudarmanto, A. Meliala
{"title":"Harmful discourse on social triggering factors of persecution truth era","authors":"Bagus Sudarmanto, A. Meliala","doi":"10.5281/ZENODO.3752537","DOIUrl":"https://doi.org/10.5281/ZENODO.3752537","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"236-253"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Project Leaked: research on non-consensual sharing of intimate images in Brazil 项目泄露:研究在巴西未经同意的私密图像共享
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3766654
Leandro Ayres França, Jéssica Veleda Quevedo
{"title":"Project Leaked: research on non-consensual sharing of intimate images in Brazil","authors":"Leandro Ayres França, Jéssica Veleda Quevedo","doi":"10.5281/ZENODO.3766654","DOIUrl":"https://doi.org/10.5281/ZENODO.3766654","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"1-28"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack 从漏洞搜索到刑事案件:SQL注入攻击的脚本分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3740361
Anna Leppänen, Tero Toiviainen, T. Kankaanranta
{"title":"From a Vulnerability Search to a Criminal Case: Script Analysis of an SQL Injection Attack","authors":"Anna Leppänen, Tero Toiviainen, T. Kankaanranta","doi":"10.5281/ZENODO.3740361","DOIUrl":"https://doi.org/10.5281/ZENODO.3740361","url":null,"abstract":"","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"63"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sexual behaviours in indecent images of children: A content analysis 儿童不雅图像中的性行为:内容分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2020-01-01 DOI: 10.5281/ZENODO.3743390
R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley
Whilst research on indecent image of children (HOC) offenders is increasing, litde is known about HOC content. This paper presents a content analysis on the sexual actions depicted in a sample of 729 HOC ffom 26 offenders. Victims were most often White females aged around 95 years, with most offenders in the 18-24 age range, male and White. Most images show erotic posing with no sexual activity, with 13.4% presenting sexual activity by an adult on a child and 12.8%presenting sexual activity by a child on an adult. ExpUcit portrayals of physical aggression, humih'ation or overt physical suffering were conspicuously rare. Few images depicted attempts to display pseudo affection towards the victim. Interactions were found in several variables between victims' age and gender and offenders' age and gender. The need to more fully understand the nature and content of HOC and their psychological significance are discussed.
虽然对儿童不雅图像(HOC)罪犯的研究越来越多,但对HOC内容知之甚少。本文对26名罪犯729名HOC的性行为进行了内容分析。受害者通常是年龄在95岁左右的白人女性,大多数罪犯年龄在18-24岁之间,男性和白人。大多数图片显示的是没有性行为的色情姿势,13.4%的图片显示的是成年人对孩子的性行为,12.8%的图片显示的是孩子对成年人的性行为。对身体攻击、羞辱或公开的身体痛苦的描绘明显罕见。很少有图片描绘试图对受害者表现出虚假的感情。在受害者的年龄和性别与犯罪者的年龄和性别之间的几个变量中发现了相互作用。讨论了对HOC的性质、内容及其心理学意义的进一步认识。
{"title":"Sexual behaviours in indecent images of children: A content analysis","authors":"R. Tejeiro, Laurence Alison, Emma L. Hendricks, S. Giles, Matthew L. Long, David Shipley","doi":"10.5281/ZENODO.3743390","DOIUrl":"https://doi.org/10.5281/ZENODO.3743390","url":null,"abstract":"Whilst research on indecent image of children (HOC) offenders is increasing, litde is known about HOC content. This paper presents a content analysis on the sexual actions depicted in a sample of 729 HOC ffom 26 offenders. Victims were most often White females aged around 95 years, with most offenders in the 18-24 age range, male and White. Most images show erotic posing with no sexual activity, with 13.4% presenting sexual activity by an adult on a child and 12.8%presenting sexual activity by a child on an adult. ExpUcit portrayals of physical aggression, humih'ation or overt physical suffering were conspicuously rare. Few images depicted attempts to display pseudo affection towards the victim. Interactions were found in several variables between victims' age and gender and offenders' age and gender. The need to more fully understand the nature and content of HOC and their psychological significance are discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"14 1","pages":"121"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71079984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delineating victims from perpetrators: Prosecuting self-produced child pornography in Youth Criminal Justice Systems 区分受害者与犯罪者:在青少年刑事司法系统中起诉自产儿童色情制品
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.1467907
B. Westlake
Video recording technology advancements and accessibility has been paralleled by a growth in selfproduced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce nonsexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad punishment, education, and counseling response from youth criminal justice systems (YCJS). Recommendations are meant as a starting point, framed with multiple YCJS structures, the duality of victim and perpetrator, the justice and welfare approaches to juvenile justice, and the United Nations Convention on the Rights of the Child in mind. _____________________________________________________________________
录像技术的进步和可访问性与自制儿童色情(SPCP)的增长并行。虽然社会和司法已经注意到青少年性短信的实例,但基于互联网的SPCP形式,如网络摄像头/网站性旅游,几乎被忽视了。虽然一些拟议的立法改革参考了基于视频的SPCP,但大多数人关注的是通过手机分发的SPCP;不包括那些在网上或通过企业努力表现出来的。本文的目的是通过对Justin Berry(美国)的案例研究,介绍无性短信的SPCP,并提出青少年刑事司法系统(YCJS)的广泛惩罚、教育和咨询对策。建议是一个起点,考虑到青少年司法的多重结构、受害者和加害者的二元性、少年司法的司法和福利方法,以及《联合国儿童权利公约》。_____________________________________________________________________
{"title":"Delineating victims from perpetrators: Prosecuting self-produced child pornography in Youth Criminal Justice Systems","authors":"B. Westlake","doi":"10.5281/ZENODO.1467907","DOIUrl":"https://doi.org/10.5281/ZENODO.1467907","url":null,"abstract":"Video recording technology advancements and accessibility has been paralleled by a growth in selfproduced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce nonsexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad punishment, education, and counseling response from youth criminal justice systems (YCJS). Recommendations are meant as a starting point, framed with multiple YCJS structures, the duality of victim and perpetrator, the justice and welfare approaches to juvenile justice, and the United Nations Convention on the Rights of the Child in mind. _____________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"255-268"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71025235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Predictive Ability of Self-Control and Differential Association on Sports Fans’ Decision to Engage in Cyber Bullying Perpetration against Rivals 自我控制与差异关联对体育迷网络欺凌行为决策的预测能力
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2018-01-01 DOI: 10.5281/ZENODO.3365618
S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson
A sample of 318 students from two Iranian universities was employed to conduct a test of Gottfredson and Hirschi’s self-control theory and elements of Akers’ social learning theory. Specifically, we sought to determine whether these theories are capable of explaining the decision to cyber bully members and fans of rival sports teams. Structural equation modeling was used to analyze these data. Findings suggest that individuals with low levels of self-control are more likely to engage in cyber bullying perpetration. Similarly, those who associate with delinquent peers are more likely to engage in cyber bullying perpetration. Additionally, we found that ineffective parenting has an indirect effect on cyber bullying perpetration through its direct effect on self-control and differential association. Lastly, we found that self-control and differential association interact to more fully explain cyber bullying perpetration. Theoretical implications are discussed. _____________________________________________________________________________________
本研究以来自伊朗两所大学的318名学生为样本,对Gottfredson和Hirschi的自我控制理论和Akers的社会学习理论进行了检验。具体来说,我们试图确定这些理论是否能够解释网络欺凌成员和竞争对手运动队球迷的决定。采用结构方程模型对数据进行分析。研究结果表明,自我控制水平较低的人更有可能参与网络欺凌行为。同样,那些与有不良行为的同龄人交往的人更有可能参与网络欺凌行为。此外,我们还发现,无效教养通过其对自我控制和差异联想的直接影响,间接影响网络欺凌的发生。最后,我们发现自我控制和差异联想的相互作用更充分地解释了网络欺凌的发生。讨论了理论意义。_____________________________________________________________________________________
{"title":"The Predictive Ability of Self-Control and Differential Association on Sports Fans’ Decision to Engage in Cyber Bullying Perpetration against Rivals","authors":"S. Shadmanfaat, C. J. Howell, Caitlyn N. Muniz, John K. Cochran, Saeed Kabiri, D. Richardson","doi":"10.5281/ZENODO.3365618","DOIUrl":"https://doi.org/10.5281/ZENODO.3365618","url":null,"abstract":"A sample of 318 students from two Iranian universities was employed to conduct a test of Gottfredson and Hirschi’s self-control theory and elements of Akers’ social learning theory. Specifically, we sought to determine whether these theories are capable of explaining the decision to cyber bully members and fans of rival sports teams. Structural equation modeling was used to analyze these data. Findings suggest that individuals with low levels of self-control are more likely to engage in cyber bullying perpetration. Similarly, those who associate with delinquent peers are more likely to engage in cyber bullying perpetration. Additionally, we found that ineffective parenting has an indirect effect on cyber bullying perpetration through its direct effect on self-control and differential association. Lastly, we found that self-control and differential association interact to more fully explain cyber bullying perpetration. Theoretical implications are discussed. _____________________________________________________________________________________","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"12 1","pages":"362"},"PeriodicalIF":1.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71073383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
International Journal of Cyber Criminology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1