skip to primary navigationskip to content

Department of Computer Science and Technology

Cybercrime

 

Course pages 2020–21

Cybercrime

Reading assignments

The following papers are assigned reading for Cybercrime/R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.

  1. Introduction (25 January 2021)

    No set readings.

  2. Cybercrime victimisation (1 February 2021)
    1. Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
    2. de Kimpe, L., Ponnet, K., Walrave, M, Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108(2020), 106310.
    Optional additional reading:
  3. Costs and harms of cybercrime (8 February 2021)
    1. Anderson, R., Barton, C., Böhme, R., Clayton, R., Gañán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. Workshop on Economics and Information Security (WEIS19), Boston, 3-4 June.
    2. Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
  4. Criminal marketplaces (15 February 2021)
    1. van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Ganan, C. H., Klievink, B., Christin, N., & van Eeten M. (2018). Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets. Proceedings of the 27th USENIX Security Symposium. Baltimore, 15-17 August.
    2. Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. Proceedings of the ACM World Wide Web Conference, San Francisco, 13-17 May.
    Optional additional reading:
  5. Cybercrime offenders and offender pathways (22 February 2021)
    1. Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
    2. Collier, B., Clayton, R., Hutchings, A., & Thomas, D. R. (2020). Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies. Workshop on the Economics of Information Security, Brussels.
    Optional additional readings:
  6. Cybercrime prevention (1 March 2021)
    1. Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
    2. Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Electronic Crime Reseach (eCrime), Toronto, 1-3 June.
    Optional additional reading:
  7. Regulation and policy (8 March 2021)
    1. Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
    2. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
  8. Cybercrime and the criminal justice system (15 March 2021)
    1. Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
    2. Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, advance access.