Browser Windows of opportunity: Cyberspace and Changes in Crime
Cybercrimeology15 Feb 2021

Browser Windows of opportunity: Cyberspace and Changes in Crime

More about our Guest:

Dr. Fernando Miró-Llinares

https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html

Papers mentioned in this Episode:

Asier Moneva, Fernando Miró-Llinares & Timothy C. Hart (2020) Hunter or Prey? Exploring the Situational Profiles that Define Repeated Online Harassment Victims and Offenders, Deviant Behavior, DOI: 10.1080/01639625.2020.1746135

Miró-Llinares F., Moneva A. (2020) Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles. In: Holt T., Bossler A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_30

David Buil-Gil, Fernando Miró-Llinares, Asier Moneva, Steven Kemp & Nacho Díaz-Castaño (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK, European Societies, DOI: 10.1080/14616696.2020.1804973

Kemp, S., Miró-Llinares, F. & Moneva, A. The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain. Eur J Crim Policy Res 26, 293–312 (2020). https://doi.org/10.1007/s10610-020-09439-2

Farrell, G., Birks, D. Did cybercrime cause the crime drop?. Crime Sci 7, 8 (2018). https://doi.org/10.1186/s40163-018-0082-8

Miró-Llinares, F., Moneva, A. What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Sci 8, 12 (2019). https://doi.org/10.1186/s40163-019-0107-y

Farrell, G., & Birks, D. (2020). Further rejection of the cybercrime hypothesis. Crime Science, 9, 1-4.https://doi.org/10.1186/s40163-020-00113-w

Other:

The introduction referenced the Spanish dubbed version of the 1983 movie "Juegos de guerra" or "War Games" a Metro-Goldwin Mayer film that is available for streaming online from MGM.

You can play dig dug from 1983 online here: https://archive.org/details/msdos_Dig_Dug_1983

Episoder(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Jul 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Jun 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Mai 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Apr 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Mar 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Feb 202522min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Jan 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Des 202425min

Populært innen Fakta

fastlegen
mikkels-paskenotter
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
foreldreradet
treningspodden
rss-strid-de-norske-borgerkrigene
jakt-og-fiskepodden
takk-og-lov-med-anine-kierulf
sinnsyn
hverdagspsyken
rss-bisarr-historie
gravid-uke-for-uke
rss-kunsten-a-leve
tomprat-med-gunnar-tjomlid
rss-sunn-okonomi
rss-kull
hagespiren-podcast
fryktlos
rss-var-forste-kaffe