Course pages 2019–20
Cybercrime
Reading assignments
The following papers are assigned reading for R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.
- Introduction (14 October 2019)
No set readings.
- Cybercrime victimisation (21 October 2019)
- Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
- Cohen, L. E. & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588-608.
- Costs and harms of cybercrime (28 October 2019)
- Anderson, R., Barton, C., Böhme, R., Clayton, R., Gañán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. Workshop on Economics and Information Security (WEIS19), Boston, 3-4 June.
- Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
- Criminal marketplaces (4 November 2019)
- Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.
- Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. The ACM World Wide Web Conference, San Francisco, 13-17 May.
- Cybercrime offenders and offender pathways (11 November 2019)
- Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
- Hutchings, A. & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178.
- Pastrana, S., Hutchings, A., Caines, A., & Buttery, P. (2018). Characterizing Eve: Analysing cybercrime actors in a large underground forum. 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, 10-12 September.
- Cybercrime prevention (18 November 2019)
- Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
- Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Electronic Crime Reseach (eCrime), Toronto, 1-3 June.
- Smith, R. G., Wolanin, N., & Worthington, G. (2003). E-crime solutions and crime displacement. Trends & Issues in Crime and Criminal Justice series no. 243. Canberra: Australian Institute of Criminology.
- Regulation and policy (25 November 2019)
- Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
- Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
- Cybercrime and the criminal justice system (2 December 2019)
- Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
- Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, advance access.