Minority Reporting: Beyond WEIRD(E) Cybercrime
Cybercrimeology1 Marras 2023

Minority Reporting: Beyond WEIRD(E) Cybercrime

Notes:

  1. Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.
  2. While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.
  3. Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.
  4. Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.
  5. Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.
  6. Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.
  7. Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.
  8. Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.
  9. Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.
  10. Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.

About our guest:

Dr Steven Kemp

https://www.udg.edu/ca/directori/pagina-personal?ID=2003705

https://www.linkedin.com/in/steven-kemp-ed/

Papers or resources mentioned in this episode:

Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. https://doi.org/10.1177/17488958211062359

Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.

https://doi.org/10.1016/j.cose.2022.103089

Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. https://doi.org/10.1177/1477370820941405

Other:

I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.

Jaksot(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Heinä 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Kesä 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Touko 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Huhti 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Maalis 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Helmi 202522min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Tammi 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Joulu 202425min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
rss-narsisti
psykopodiaa-podcast
adhd-podi
rahapuhetta
rss-uskonto-on-tylsaa
rss-liian-kuuma-peruna
rss-rahamania
kesken
rss-vapaudu-voimaasi
rss-niinku-asia-on
salainen-paivakirja
rss-duodecim-lehti
rss-tietoinen-yhteys-podcast-2
rss-koira-haudattuna
aloita-meditaatio
mielipaivakirja
esa-saarinen-filosofia-ja-systeemiajattelu
filocast-filosofian-perusteet