Getting started with Cybercrime Theory
Cybercrimeology15 Mar 2020

Getting started with Cybercrime Theory

Find out more about the guest:

Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.

https://cj.msu.edu/directory/holt-thomas.html

~~~~

Texts Mentioned in this show:

Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.

https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168

~~~~~~~

Deterrence Theory

https://www.sciencedirect.com/topics/computer-science/deterrence-theory

General Theory - Self control

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?

Social Learning Theory

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?

Sub-Cultures of Crime

https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en

Techniques of Neutralization and Drift

https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml

Actor Network Theory

https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory

Drake presents a story of moving from the bottom to here, not sure where here is though. https://youtu.be/RubBzkZzpUA

Gauthier and Forsyth provide an analysis of "Bug-Chasing".

K. Gauthier, D., & J. Forsyth, C. (1999). Bareback sex, bug chasers, and the gift of death. Deviant Behavior, 20(1), 85-100.

https://www.tandfonline.com/doi/abs/10.1080/016396299266605

If you are curious about the rules of the internet, bear in mind that these have always been very dynamic. The link below shows a list. Keep in mind that a lot of this is a joke, and there was never any real process for deciding on this rules, apart from they should be funny. Rumour is that rule 34 was the first rule. If you have no idea what this is all about then take care in researching as it is all 'fringe' internet culture, mostly NSFW and some things cannot be unseen. The link below is picture free, apart from some ascii graphics.

https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page

The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource. https://archive.org/details/prelinger

Episoder(127)

The Open Science Revolution: Building Trust with Transparency

The Open Science Revolution: Building Trust with Transparency

Episode NotesEpisode SummaryIntroduction to Open Science – Asier Moneva introduces open science, emphasizing transparency and replicability as essential to modern research.Importance of Transparency –...

1 Nov 202428min

Cinematic Cybersecurity: What are movies teaching us about passwords?

Cinematic Cybersecurity: What are movies teaching us about passwords?

Episode Notes:The research focuses on analyzing the representation of passwords and cyber threats in films, particularly how password guessing and hacking scenes influence public perceptions of securi...

1 Okt 202428min

Signals, Deception, and AI: Navigating Trust in the Digital World

Signals, Deception, and AI: Navigating Trust in the Digital World

About our Guest:Judith Donathhttps://cyber.harvard.edu/people/jdonathKey Discussion Points:Understanding Signaling Theory:The foundation of signaling theory in communication.The balance between honest...

1 Sep 202444min

Mapping the Digital Threat: The Geography of Cybercrime

Mapping the Digital Threat: The Geography of Cybercrime

Notes:Background in Sociology: Dr. Miranda Bruce started in sociology, focusing on the dynamics of power and institutions.PhD Research: Her PhD explored the Internet of Things (IoT) using post-structu...

1 Aug 202432min

Policing Street Trolls: Navigating Cop Baiting and Digital Extremism

Policing Street Trolls: Navigating Cop Baiting and Digital Extremism

Notes: Dual Research Focus: Dr. Huey historically focused on policing and victimization, particularly in marginalized communities.Burnout and Shift: Burnout from trauma research led her to shift focus...

1 Jul 202433min

Timing is Everything: Context-Based Cybersecurity Training

Timing is Everything: Context-Based Cybersecurity Training

Notes:Joakim Kävrestad is an Assistant Professor of Computer Science at Jönköping University, with a background in networking and cybersecurity.He shifted his focus to the societal and psychological a...

1 Jun 202434min

Hackting Out: Defacement and Hate Online amid Global Conflicts

Hackting Out: Defacement and Hate Online amid Global Conflicts

Notes:Introduction to Cybercrime Research: Dr. Hutchings and Ahn Vu introduce their work at the Cambridge Cybercrime Centre.Global Conflicts and Cyber Activities: Discussion on how global conflicts, s...

1 Mai 202424min

Bridging realities: The Convergence of Ideology and Cybercrime

Bridging realities: The Convergence of Ideology and Cybercrime

Episode Notes:Dr. Tom Holt discussed the nascent stages of cybercrime research during his doctoral studies, highlighting its evolution into a more recognized and competitive field.He emphasized the gr...

1 Apr 202431min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
foreldreradet
treningspodden
rss-strid-de-norske-borgerkrigene
mikkels-paskenotter
jakt-og-fiskepodden
sinnsyn
takk-og-lov-med-anine-kierulf
hverdagspsyken
rss-sunn-okonomi
gravid-uke-for-uke
rss-kunsten-a-leve
rss-bisarr-historie
tomprat-med-gunnar-tjomlid
rss-kull
hagespiren-podcast
rss-var-forste-kaffe
fryktlos