Department of Computer Science and Technology

Course pages 2018–19

Cybercrime

Reading assignments

The following papers are assigned reading for R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.

  1. Introduction (17 January 2019)

    No set readings.

  2. Cybercrime victimisation (24 January 2019)
    1. Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
    2. Cohen, L. E. & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588-608.
  3. Costs and harms of cybercrime (31 January 2019)
    1. Anderson, R., Barton, C., Boehme, R., Clayton, R., van Eeten, M. J. G., Levi, M., Moore, T., & Savage, S. (2012). Measuring the cost of cybercrime. Eleventh Annual Workshop on Economics and Information Security (WEIS12), Berlin, 25-26 June.
    2. Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
  4. Criminal marketplaces (7 February 2019)
    1. Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.
    2. Herley, C. & Florêncio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In Moore T., Pym D., Ioannidis C. (eds) Economics of Information Security and Privacy. Springer: Boston, MA.
  5. Cybercrime offenders and offender pathways (14 February 2019)
    1. Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
    2. Hutchings, A. & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178.
    Optional additional reading:
  6. Cybercrime prevention (21 February 2019)
    1. Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
    2. Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Electronic Crime Reseach (eCrime), Toronto, 1-3 June.
    Optional additional reading:
  7. Regulation and policy (28 February 2019)
    1. Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
    2. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
  8. Cybercrime and the criminal justice system (7 March 2019)
    1. Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
    2. Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, advance access.