Getting started with Cybercrime Theory
Cybercrimeology15 Mar 2020

Getting started with Cybercrime Theory

Find out more about the guest:

Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.

https://cj.msu.edu/directory/holt-thomas.html

~~~~

Texts Mentioned in this show:

Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.

https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168

~~~~~~~

Deterrence Theory

https://www.sciencedirect.com/topics/computer-science/deterrence-theory

General Theory - Self control

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?

Social Learning Theory

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?

Sub-Cultures of Crime

https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en

Techniques of Neutralization and Drift

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml

Actor Network Theory

https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory

Drake presents a story of moving from the bottom to here, not sure where here is though. https://youtu.be/RubBzkZzpUA

Gauthier and Forsyth provide an analysis of "Bug-Chasing".

K. Gauthier, D., & J. Forsyth, C. (1999). Bareback sex, bug chasers, and the gift of death. Deviant Behavior, 20(1), 85-100.

https://www.tandfonline.com/doi/abs/10.1080/016396299266605

If you are curious about the rules of the internet, bear in mind that these have always been very dynamic. The link below shows a list. Keep in mind that a lot of this is a joke, and there was never any real process for deciding on this rules, apart from they should be funny. Rumour is that rule 34 was the first rule. If you have no idea what this is all about then take care in researching as it is all 'fringe' internet culture, mostly NSFW and some things cannot be unseen. The link below is picture free, apart from some ascii graphics.

https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page

The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource. https://archive.org/details/prelinger

Episoder(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Jul 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Jun 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Mai 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Apr 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Mar 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Feb 202522min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Jan 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Des 202425min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
foreldreradet
treningspodden
rss-strid-de-norske-borgerkrigene
mikkels-paskenotter
jakt-og-fiskepodden
sinnsyn
takk-og-lov-med-anine-kierulf
hverdagspsyken
rss-sunn-okonomi
gravid-uke-for-uke
rss-kunsten-a-leve
rss-bisarr-historie
tomprat-med-gunnar-tjomlid
rss-kull
hagespiren-podcast
rss-var-forste-kaffe
fryktlos