Anomie.exe: Geography, Strain and the Motivated Cyber Offender
Cybercrimeology1 Helmi 2025

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)
  • Understanding Cybercrime through Strain and Anomie Theories
    • Dr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.
    • Discussion on economic and social pressures that push individuals toward cybercrime, including unemployment, inequality, and lack of upward mobility.
  • The Role of Honeypots in Cybercrime Research
    • Overview of honeypots—deceptive systems designed to attract cyber attackers.
    • How honeypots help researchers observe and analyze hacker behaviors in real-world settings.
    • Differences in hacking techniques and motivations across different regions.
  • Regional Variations in Cybercriminal Activities
    • Why cybercrime is not uniformly distributed worldwide despite the internet being a global network.
    • Case studies on West African romance scams, Russian cyber operations, and Indian call center frauds.
    • The interplay between legitimate and illegitimate economies in cybercrime hotspots.
  • Cybercrime and Economic Opportunity
    • Findings from recent research on how financial strain vs. greed influences cybercrime.
    • The role of cryptocurrency in enabling financial cybercrimes and providing anonymity to offenders.
    • Discussion on how cybercrime prevention strategies need to address offender motivations, not just security vulnerabilities.
  • Future Research and Policy Implications
    • The need for broader, structural changes to mitigate cybercrime, rather than relying solely on reactive security measures.
    • How cross-national studies and criminological data collection can improve cybercrime prevention strategies.
    • Upcoming projects on measuring cyber-offending patterns and regional differences in hacking behavior.
About Our Guest

Dr. Thomas Dearden

https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html

Papers and Resources Mentioned in This Episode

Dearden, T. E., & Gottschalk, P. (2024).Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyberoffending.Deviant Behavior.DOI Link

Parti, K., & Dearden, T. (2024).Cybercrime and Strain Theory: An Examination of Online Crime and Gender.International Journal of Criminology and Sociology. https://doi.org/10.6000/1929-4409.2024.13.19

Dearden, T. E., Parti, K., & Hawdon, J. (2022).Institutional Anomie Theory and Cybercrime: Cybercrime and the American Dream.Journal of Contemporary Criminal Justice. https://doi.org/10.1177/10439862211001590

Related Episodes Featuring Dr. Dearden

Episode 39 : Strained Dreams: Cybercrime and Institutional Anomie

https://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie

Other:

The Human Factors in cybercrime Conference: https://www.hfc-conference.com

We had a chat in a room with a bunch of people just outside having their own great conversations. Kind of nice to get a little bit of that vibe into the mix. Conferences can be a lot of fun ;)/.

To the best of my knowledge, no bovines were harmed during the recording of this episode.

Jaksot(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Heinä 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Kesä 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Touko 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Huhti 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Maalis 202521min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Tammi 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Joulu 202425min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
adhd-podi
rss-narsisti
rss-rahamania
rahapuhetta
rss-liian-kuuma-peruna
kesken
rss-uskonto-on-tylsaa
rss-vapaudu-voimaasi
rss-niinku-asia-on
rss-tietoinen-yhteys-podcast-2
aloita-meditaatio
salainen-paivakirja
esa-saarinen-filosofia-ja-systeemiajattelu
filocast-filosofian-perusteet
rss-valo-minussa-2
rss-koira-haudattuna
rss-hereilla