skip to primary navigationskip to content

Department of Computer Science and Technology



Course pages 2022–23


Reading assignments

The following papers are assigned reading for Cybercrime/R254, which should be read prior to the class indicated. Please contact the module instructors if you have any questions.

  1. Introduction (23 January 2023)

    No set readings.

  2. Cybercrime victimisation (30 January 2023)
    1. Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social & Legal Studies, 10(2), 243-249.
    2. de Kimpe, L., Ponnet, K., Walrave, M, Snaphaan, T., Pauwels, L., & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in Human Behavior, 108(2020), 106310.
    Optional additional reading:
  3. Costs and harms of cybercrime (6 February 2023)
    1. Anderson, R., Barton, C., Böhme, R., Clayton, R., Gañán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the changing cost of cybercrime. Workshop on Economics and Information Security (WEIS19), Boston, 3-4 June.
    2. Tcherni, M., Davies, A., Lopes, G., & Lizotte, A. (2016). The dark figure of online property crime: Is cyberspace hiding a crime wave? Justice Quarterly, 33(5), 890-911.
  4. Criminal marketplaces (15 February 2023--please note this session falls on a Wednesday)
    1. van Wegberg, R., Tajalizadehkhoob, S., Soska, K., Akyazi, U., Ganan, C. H., Klievink, B., Christin, N., & van Eeten M. (2018). Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets. Proceedings of the 27th USENIX Security Symposium. Baltimore, 15-17 August.
    2. Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. Proceedings of the ACM World Wide Web Conference, San Francisco, 13-17 May.
    Optional additional readings:
  5. Cybercrime offenders and offender pathways (20 February 2023)
    1. Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime, 14(1), 52-60.
    2. Collier, B., Clayton, R., Hutchings, A., & Thomas, D. R. (2021). Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture. British Journal of Criminology, 61(5), 1407-1423.
    Optional additional readings:
  6. Regulation and policy (27 February 2023) **PLEASE NOTE TOPIC CHANGE FOR THIS DATE**
    1. Clayton, R., Moore, T., & Christin, N. (2015). Concentrating correctly on cybercrime concentration. Workshop on the Economics of Information Security, Delft.
    2. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Green, M., Landau, S., Neumann, P. G., Rivest, R. L., Schiller, J. I., Schneier, B., Specter, M. A., & Weitzner, D. J. (2015). Keys under doormats: mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79.
  7. Cybercrime prevention (6 March 2023) **PLEASE NOTE TOPIC CHANGE FOR THIS DATE**
    1. Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime prevention. Crime & Delinquency, 22(3), 284-296.
    2. Collier, B., Thomas, D. R., Clayton, R., & Hutchings, A. (2019). Booting the Booters: Evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the ACM Internet Measurement Conference, Amsterdam.
    Optional additional readings:
  8. Cybercrime and the criminal justice system (13 March 2023)
    1. Wall, D S. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace. Police Practice and Research, 8(2), 183-205.
    2. Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents. Policing and Society: An International Journal of Research and Policy, 29(8), 906-921.