Twenty 23: Conferences
Cybercrimeology1 Jan 2023

Twenty 23: Conferences

About Our Guests:

Dr Thomas Dearden

https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html

Jordan Howell

https://cina.gmu.edu/people/c-jordan-howell/

Dr Marti DeLiema,

https://www.cehd.umn.edu/ssw/people/mdeliema/

Dr Volkan Topali,

https://aysps.gsu.edu/profile/volkan-topalli/

Eden Komar

https://ebcs.gsu.edu/profile/eden-kamar/

Dr Thomas Hyslip

https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx

And Gary

https://www.usa.gov

Scott Wright

https://www.linkedin.com/in/scottwright/

https://clickarmor.ca

Conferences Mentioned in this Episode:

https://hicss.hawaii.edu The Hawaii International Conference on System Sciences Hawaii, USAhttps://chi2023.acm.orgACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction (HCI).Hamburg, Germanyhttps://spritehub.org/sprite-conference-belfast-28-29-june/SPRITE+ Conference (Security Privacy Identity and Trust Engagement Network)Belfast, Irelandhttps://eurosp2023.ieee-security.org8th IEEE European Symposium on Security and PrivacyDelft, The Netherlandshttps://weis2023.econinfosec.orgWorkshop on the Economics of Information Security (WEIS). The main topic of the conference is Digital Sovereignty Geneva, Switzerlandhttps://www.usenix.org/conference/soups2023Symposium on Usable Privacy and SecurityAnaheim, USAhttps://defcon.orgDEFCON31Las Vegas, USAhttps://www.blackhat.comBlack Hat USA Las Vegas, USAhttps://eurocrim2023.comEuropean Society of CriminologyFlorence, Italy https://asc41.com/events/American Society of CriminologyPhiladelphia, USA

Also Look out for:

https://www.hfc-conference.com

https://www.cambridgecybercrime.uk

https://nsec.io

https://secrev.org/

Other:

Bloom's Taxonomy

https://en.wikipedia.org/wiki/Bloom's_taxonomy

This episode was a bit different because it was for the start of the year. Back to the normal style next episode.

Avsnitt(127)

The Human in_security - deception, weapons, crime & culture

The Human in_security - deception, weapons, crime & culture

About our guest:Dr. Iain ReidSenior Lecturer in CybercrimeUniversity of Portsmouthhttps://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid Topics discussed in this episo...

1 Juli 202527min

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

In this episode:How Estelle became involved in ransomware research between degreesThe scale and origin of the ContiLeaks datasetUsing machine learning and topic modelling to analyse criminal group com...

1 Juni 202527min

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

Notes:Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.Sarah Eaton and Sabina Alam first...

1 Maj 202539min

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

Episode Notes:Dr. Reeves’ Background – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.Cybersecurity Fatigue Defined – A form o...

1 Apr 202538min

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Wake up Calling: Impacting businesses by communicating cybersecurity risk

Episode NotesSMEs struggle with cybersecurity due to time, cost, and lack of expertise, despite recognizing its importance.An automated cybersecurity scan was developed to assess SME websites and emai...

1 Mars 202521min

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

Episode Summary (Dot Points)Understanding Cybercrime through Strain and Anomie TheoriesDr. Dearden explains how strain theory and anomie theory provide insights into cybercriminal motivations.Discussi...

1 Feb 202522min

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, ...

1 Jan 202523min

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

About Our Guest:Dr. Tom Holthttps://cj.msu.edu/directory/holt-tom.htmlKey Topics Discussed:Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcem...

1 Dec 202425min

Populärt inom Utbildning

historiepodden-se
rss-bara-en-till-om-missbruk-medberoende-2
det-skaver
alska-oss
harrisons-dramatiska-historia
nu-blir-det-historia
not-fanny-anymore
rss-foraldramotet-bring-lagercrantz
roda-vita-rosen
johannes-hansen-podcast
rss-viktmedicinpodden
sa-in-i-sjalen
i-vantan-pa-katastrofen
sektledare
rss-max-tant-med-max-villman
allt-du-velat-veta
rib-podcast
rss-sjalsligt-avkladd
rikatillsammans-om-privatekonomi-rikedom-i-livet
rss-basta-livet