Questioning Advice: Rethinking Cybercrime Education
Cybercrimeology1 Helmi 2021

Questioning Advice: Rethinking Cybercrime Education

Show Notes:

Elissa Redmiles:

https://www.cs.umd.edu/~eredmiles/

Papers Mentioned in this Episode.

Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016, October). How i learned to be secure: a census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 666-677).

https://dl.acm.org/doi/abs/10.1145/2976749.2978307

Redmiles, E. M., Kross, S., & Mazurek, M. L. (2017, May). Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931-936).

https://dl.acm.org/doi/abs/10.1145/3025453.3025673

Redmiles, E. M., Warford, N., Jayanti, A., Koneru, A., Kross, S., Morales, M., ... & Mazurek, M. L. (2020). A comprehensive quality evaluation of security and privacy advice on the web. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 89-108).

https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles

Redmiles, E. M., Mazurek, M. L., & Dickerson, J. P. (2018, June). Dancing pigs or externalities? measuring the rationality of security decisions. In Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 215-232).

https://dl.acm.org/doi/abs/10.1145/3219166.3219185

Redmiles, E. M. (2019). Quality and Inequity in Digital Security Education (Doctoral dissertation).

https://drum.lib.umd.edu/handle/1903/25404

The Evening statesman., March 20, 1906, Page TWO

https://chroniclingamerica.loc.gov/lccn/sn88085421/1906-03-20/ed-1/seq-2/#date1=1777&index=4&rows=20&words=Prisoner+prisoner+Spanish&searchType=basic&sequence=0&state=&date2=1963&proxtext=Spanish+Prisoner&y=0&x=0&dateFilterType=yearRange&page=1

This scam was about Spanish prisoner fraud, which is an old form of advance fee fraud. You can see an example of one from 1903 that is being sold from an action house here:

https://www.pbagalleries.com/images/lot/1209/12090_0.jpg

Probably the first record of these is in a New York Times articles titled "AN OLD SWINDLE REVIVED", from Dec. 26, 1878

Read more here:

https://www.atlasobscura.com/articles/the-9-lives-of-the-spanish-prisoner-the-treasure-dangling-scam-that-wont-die

This episodes music samples old traffic safety videos found at the Prelinger Archives available at archive.org.

Jaksot(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Heinä 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Kesä 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Touko 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Huhti 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Maalis 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Helmi 202522min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Tammi 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Joulu 202425min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
rss-narsisti
adhd-podi
rahapuhetta
rss-rahamania
kesken
psykologia
rss-liian-kuuma-peruna
rss-niinku-asia-on
rss-eron-alkemiaa
rss-arkea-ja-aurinkoa-podcast-espanjasta
esa-saarinen-filosofia-ja-systeemiajattelu
rss-duodecim-lehti
rss-vapaudu-voimaasi
rss-luonnollinen-synnytys-podcast
rss-tietoinen-yhteys-podcast-2
rss-finnish-daily-dialogues
ihminen-tavattavissa-tommy-hellsten-instituutti