Computer Laboratory

Alice Hutchings

Publications

Please note: As an interdisciplinary researcher, I publish in both computer science and social science, which have very different ways of publishing. However, both disciplines go through rigorous peer review procedures, whether it be for journals or conference proceedings.

Peer reviewed publications

Collier, B., Clayton, R., Hutchings, A., & Thomas, D. R. (2020). Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies. Workshop on the Economics of Information Security, Brussels. [open access]

Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019). Identifying unintended harms of cybersecurity countermeasures. Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh. [paywall version] [accepted manuscript]

Hughes, J., Collier, B., & Hutchings, A. (2019). From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum. Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Pittsburgh. [paywall version] [accepted manuscript]

Collier, B., Thomas, D. R., Clayton, R., & Hutchings, A. (2019). Booting the Booters: Evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the ACM Internet Measurement Conference, Amsterdam. [paywall version] [accepted manuscript]

Pastrana, S., Hutchings, A., Thomas, D. R., & Tapiador, J. (2019). Measuring eWhoring. Proceedings of the ACM Internet Measurement Conference, Amsterdam. [paywall version] [accepted manuscript]

Hutchings, A., Pastrana, S., & Clayton, R. (2019). Displacing big data. In R. Leukfeldt & T. J. Holt (eds.), The Human Factor of Cybercrime. Oxon: Routledge. [draft version] [e-book version]

Hutchings, A. & Pastrana, S. (2019). Understanding eWhoring. Proceedings of the 4th IEEE European Symposium on Security and Privacy, Stockholm. [paywall version] [accepted manuscript]

Hutchings, A. & Collier, B. (2019). Inside out: Characterising cybercrimes committed inside and outside the workplace. Proceedings of the 4th IEEE European Symposium on Security and Privacy Workshop on Attackers and Cyber-Crime Operations, Stockholm. [paywall version] [accepted manuscript]

Caines, A., Pastrana, S., Hutchings, A. & Buttery, P. (2018). Automatically identifying the function and intent of posts in underground forums. Crime Science, 7(19), 1-14. [open access]

Hutchings, A. & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75-94. [open access]

Hutchings, A. (2018). Flying in cyberspace: Policing global travel fraud. Policing: A Journal of Policy and Practice, https://doi.org/10.1093/police/pay063 [open access]

Caines, A., Pastrana, S., Hutchings, A. & Buttery, P. (2018). Aggressive language in an online hacking forum. Proceedings of the 2nd Workshop on Abusive Language Online, Brussels. [open access]

Pastrana, S., Hutchings, A., Caines, A., & Buttery, P. (2018). Characterizing Eve: Analysing cybercrime actors in a large underground forum. Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion. [paywall version] [accepted manuscript]

Hutchings, A. (2018). Leaving on a Jet Plane: The trade in fraudulently obtained airline tickets. Crime, Law and Social Change, 70(4), 461-487. [open access]

Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018). CrimeBB: Enabling cybercrime research on underground forums at scale. Proceedings of the ACM International World Wide Web (WWW) Conference, Lyon. [paywall version] [accepted manuscript]

Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S. J., Sasse, M. A., & Stringhini, G. (2017). International comparison of bank fraud reimbursement: Customer perceptions and contractual terms. Journal of Cybersecurity, 3(2), 109-125. [open access]

Thomas, D. R., Pastrana, S., Hutchings, A., Clayton, R., & Beresford, A. R. (2017). Ethical issues in research using datasets of illicit origin. Proceedings of the ACM Internet Measurement Conference, London. [open access]

Hutchings, A. & Clayton, R. (2017). Configuring Zeus: A case study of online crime target selection and knowledge transmission. Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Arizona. [paywall version] [accepted manuscript]

Hutchings, A. & Chua, Y. T. (2017). Gendering cybercrime. In T. J. Holt (ed), Cybercrime through an Interdisciplinary Lens (pp. 167-188). Oxon: Routledge. [draft version] [e-book version]

Hutchings, A. & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11-30. [paywall version] [accepted manuscript]

Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137-145. [open access]

Hutchings, A. & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178. [paywall version] [accepted manuscript]

Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (ed), Crime Online: Correlates, Causes, and Context (pp. 117-140). Durham: Carolina Academic Press. [draft version]

Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Proceedings of the APWG Symposium on Electronic Crime Research (eCrime), Toronto. [paywall version] [accepted manuscript]

Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S. J., Sasse, M. A., & Stringhini, G. (2016). International comparison of bank fraud reimbursement: Customer perceptions and contractual terms. Workshop on the Economics of Information Security, Berkeley. [open access]

Murdoch, S. J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., Sasse, M. A., & Stringhini, G. (2016). Are payment card contracts unfair? Proceedings of the International Conference on Financial Cryptography and Data Security, Barbados. [open access]

Leontiadis, N. & Hutchings, A. (2015). Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity, 1(1), 81-92. [open access]

Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614. [paywall version] [accepted manuscript]

Hutchings, A., Smith, R. G. & James, L. (2015). Criminals in the cloud: An overview of criminal and security threats and prevention measures. In R. G. Smith, R. Cheung & L. Lau (eds), Cybercrime Risks and Responses: Eastern and Western Perspectives (pp. 146-162). Basingstoke: Palgrave Macmillan. [draft version]

Hutchings, A. & Jorna, P. (2015). Misuse of information and communications technology within the public sector. Trends & Issues in Crime & Criminal Justice Series No. 470. Canberra: Australian Institute of Criminology. [open access]

Hutchings, A. (2014). Crime from the keyboard: Organised crime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1), 1-20. [paywall version] [accepted manuscript]

Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (eds), Global Criminology: Crime and Victimization in the Globalized Era (pp. 93-114). Boca Raton: CRC Press. [draft version]

Hutchings, A., Smith, R. G. & James, L. (2013). Cloud computing for small business: Criminal and security threats and prevention measures. Trends & Issues in Crime & Criminal Justice Series No. 456. Canberra: Australian Institute of Criminology. [open access]

Hutchings, A. (2012). Computer security threats faced by small businesses in Australia. Trends & Issues in Crime & Criminal Justice Series No. 433. Canberra: Australian Institute of Criminology. [open access]

Hutchings, A. (2010). Review of computer chip identification systems. Brisbane: Australian Research Council Centre of Excellence in Policing and Security. [open access]

Hutchings, A. & Hayes, H. (2009). Routine activity theory and phishing victimisation: Who gets caught in the ‘net’? Current Issues in Criminal Justice, 20(3), 433–451. [paywall version]

Books

Brewer, R., de Vel-Palumbo, M., Hutchings, A., Holt, T., Goldsmith, A., & Maimon, D. (2019). Cybercrime Prevention: Theory and Applications. Cham: Palgrave Macmillan.

Policy reports

Krone, T., Smith, R. G., Cartwright, J., Hutchings, A., Tomison, A. & Napier, S. (2017). Online child sexual exploitation offenders: A study of Australian law enforcement data. Report to the Criminology Research Advisory Council CRG 58/12-13. Canberra: Australian Institute of Criminology.

Smith, R. G. & Hutchings, A. (2014). Identity crime and misuse in Australia: Results of the 2013 online survey. Research and Public Policy Series No. 128. Canberra: Australian Institute of Criminology.

Jorna, P. & Hutchings, A. (2013). Australasian Consumer Fraud Taskforce: Results of the 2012 consumer fraud survey. Technical and Background Paper Series No. 56. Canberra: Australian Institute of Criminology.

James, L., Hutchings, A. & Smith R. G. (2012). Final report - Cloud Computing Threat Assessment for Small Business. Brisbane: Australian Research Council Centre of Excellence in Policing and Security and the Australian Institute of Criminology.

Hutchings, A. & Lindley, J. (2012). Australasian Consumer Fraud Taskforce: Results of the 2010 and 2011 consumer fraud surveys. Technical and Background Paper Series No. 50. Canberra: Australian Institute of Criminology.

Keynote speeches

Hutchings, A. (2017). Displacing big data: How criminals cheat the system. Presented at MaCCI Law and Economics Conference on Big Data, Mannheim, 6-7 November.

Hutchings, A. (2016). Stressed out? Denial of service attacks from the providers' perspective. Presented at hack.lu, Luxembourg, 18-20 October.

Hutchings, A. (2013). Cloud computing for small business: Crime and security threats and prevention measures. Presented at the Oceania CACS 2013, Adelaide, 23-25 September.