Course pages 2018–19
Cybercrime
Reading assignments
The following papers are assigned reading for R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.
- Introduction (17 January 2019)
No set readings.
- Cybercrime victimisation (24 January 2019)
- Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
- Cohen, L. E. & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588-608.
- Costs and harms of cybercrime (31 January 2019)
- Anderson, R., Barton, C., Boehme, R., Clayton, R., van Eeten, M. J. G., Levi, M., Moore, T., & Savage, S. (2012). Measuring the cost of cybercrime. Eleventh Annual Workshop on Economics and Information Security (WEIS12), Berlin, 25-26 June.
- Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
- Criminal marketplaces (7 February 2019)
- Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.
- Herley, C. & Florêncio, D. (2010). Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy. In Moore T., Pym D., Ioannidis C. (eds) Economics of Information Security and Privacy. Springer: Boston, MA.
- Cybercrime offenders and offender pathways (14 February 2019)
- Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
- Hutchings, A. & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178.
- Pastrana, S., Hutchings, A., Caines, A., & Buttery, P. (2018). Characterizing Eve: Analysing cybercrime actors in a large underground forum. 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, 10-12 September.
- Cybercrime prevention (21 February 2019)
- Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
- Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Electronic Crime Reseach (eCrime), Toronto, 1-3 June.
- Smith, R. G., Wolanin, N., & Worthington, G. (2003). E-crime solutions and crime displacement. Trends & Issues in Crime and Criminal Justice series no. 243. Canberra: Australian Institute of Criminology.
- Regulation and policy (28 February 2019)
- Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
- Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
- Cybercrime and the criminal justice system (7 March 2019)
- Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
- Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, advance access.