skip to primary navigationskip to content

Department of Computer Science and Technology

Cybercrime

Course pages 2021–22

Cybercrime

Reading assignments

The following papers are assigned reading for Cybercrime/R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.

  1. Introduction (24 January 2022)

    No set readings.

  2. Cybercrime victimisation (31 January 2022)
    1. Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
    2. de Kimpe, L., Ponnet, K., Walrave, M, Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108(2020), 106310.
    Optional additional reading:
  3. Costs and harms of cybercrime (7 February 2022)
    1. Anderson, R., Barton, C., Böhme, R., Clayton, R., Gañán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. Workshop on Economics and Information Security (WEIS19), Boston, 3-4 June.
    2. Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
  4. Criminal marketplaces (14 February 2022)
    1. van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Ganan, C. H., Klievink, B., Christin, N., & van Eeten M. (2018). Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets. Proceedings of the 27th USENIX Security Symposium. Baltimore, 15-17 August.
    2. Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. Proceedings of the ACM World Wide Web Conference, San Francisco, 13-17 May.
    Optional additional readings:
  5. Cybercrime offenders and offender pathways (21 February 2022)
    1. Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
    2. Collier, B., Clayton, R., Hutchings, A., & Thomas, D. R. (2021). Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture. British Journal of Criminology, 61(5), 1407-1423.
    Optional additional readings:
  6. Cybercrime prevention (28 February 2022)
    1. Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
    2. Collier, B., Thomas, D. R., Clayton, R., & Hutchings, A. (2019). Booting the Booters: Evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the ACM Internet Measurement Conference, Amsterdam.
    Optional additional readings:
  7. Regulation and policy (7 March 2022)
    1. Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
    2. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
  8. Cybercrime and the criminal justice system (14 March 2022)
    1. Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
    2. Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, 29(8), 906-921.