Alice Hutchings
Publications
Please note: As an interdisciplinary researcher, I publish in both computer science and social science, which have very different ways of publishing. However, both disciplines go through rigorous peer review procedures, whether it be for journals or conference proceedings.
Papers
Tina Marjanov & Alice Hutchings (2025). SoK: Digging into the digital underworld of stolen data markets. Proceedings of the IEEE Symposium on Security and Privacy (SP), pages 1-18. [accepted manuscript][paywall version]
Alice Hutchings (2025). Police behaving badly. IEEE Security and Privacy, 23(1), 80-82. [accepted manuscript] [paywall version]
Alice Hutchings & Alastair R. Beresford (2025). Transparent truths: Critical friends and coordinated disclosure. Festschrift in memory of Ross Anderson, pages 163-170. [open access]
Helen Oliver & Alice Hutchings (2025). What we talk about when we talk about extortion: The evolution from romanticism to ransomware (2005-2009). Festschrift in memory of Ross Anderson, pages 155-162. [open access]
Kieron Ivy Turk & Alice Hutchings (2024). Stop Following Me! Evaluating the malicious uses of personal item tracking devices and their anti-stalking features. Proceedings of the ACM European Symposium on Usable Security (EuroUSEC), pages 277-289. [open access]
Quincy Taylor, Anna Talas & Alice Hutchings (2024). Love Bytes Back: Cybercrime following relationship breakdown. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 123-135. [accepted manuscript] [paywall version]
Luis A. Saavedra, Hridoy Sankar Dutta, Alastair R. Beresford, & Alice Hutchings (2024). ModZoo: A large-scale study of modded Android apps and their markets. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 162-174. [accepted manuscript] [paywall version]
Marilyne Ordekian, Gilberto Atondo-Siu, Alice Hutchings, & Marie Vasek (2024). Investigating wrench attacks: Physical attacks targeting cryptocurrency users. Proceedings of the 6th Conference on Advances in Financial Technologies (AFT), pages 1-24. [open access]
Jonah Gibbon, Tina Marjanov, Alice Hutchings, & John Aston (2024). Measuring the Unmeasurable: Estimating true population of hidden online communities. Proceedings of the IEEE European Symposium on Security and Privacy Workshops, pages 56-66. [accepted manuscript] [paywall version]
Anh V. Vu, Alice Hutchings, & Ross Anderson (2024). No Easy Way Out: The effectiveness of deplatforming an extremist forum to suppress hate and harassment. Proceedings of the 45th IEEE Symposium on Security and Privacy (IEEE S&P), pages 717-734. [accepted manuscript] [paywall version]
Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, & Ross Anderson (2024). Getting Bored of Cyberwar: Exploring the role of low-level cybercrime actors in the Russia-Ukraine conflict. Proceedings of the ACM Web Conference, pages 1596-1607. [open access]
Alice Hutchings (2024). Position Paper: The amplification of online deviancy through the language of violent crime, war, and aggression. IEEE Security and Privacy, 22(2), 81-84. [accepted manuscript] [paywall version]
Tina Marjanov, Konstantinos Ioannidis, Tom Hyndman, Nicolas Seyedzadeh, & Alice Hutchings (2024). Breaking the ice: Using transparency to overcome the cold start problem in an underground market. Workshop on the Economics of Information Security (WEIS), pages 1-11. [open access]
Jack Hughes, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li, & Ericsson Santana Marin (2024). The Science Art of Cybercrime Community Research. ACM Computing Surveys, 56(6), 1-26. [open access]
Jessica Man, Gilberto Atondo-Siu, & Alice Hutchings (2023). Autism disclosures and cybercrime discourse on a large underground forum. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-14. [accepted manuscript] [paywall version]
Anna Talas & Alice Hutchings (2023). Hacker’s Paradise: Analysing music in a cybercrime forum. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-14. [accepted manuscript] [paywall version]
Dimitrios Georgoulias, Jens Myrup Pedersen, Alice Hutchings, Morten Falch, & Emmanouil Vasilomanolakis (2023). In the market for a Botnet? An in-depth analysis of botnet-related listings on Darkweb marketplaces. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-14. [accepted manuscript] [payall version]
Ben Collier & Alice Hutchings (2023). Cybercrime: A social ecology. In A. Liebling, S. Maruna, & L. McAra (eds.), The Oxford Handbook of Criminology 7th ed. Oxford: Oxford University Press. [accepted manuscript] [e-book version]
Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, & Fabio Massacci (2023). A graph-based stratified sampling methodology for the analysis of (underground) forums. IEEE Transactions on Information Forensics & Security, 18, 5473-5483. [accepted manuscript] [paywall version]
Jack Hughes & Alice Hutchings (2023). Digital drift and the evolution of a large cybercrime forum. Proceedings of the IEEE European Symposium on Security and Privacy Workshops, pages 183-193. [accepted manuscript] [paywall version]
Gilberto Atondo Siu & Alice Hutchings (2023). “Get a higher return on your savings!”: Comparing adverts for cryptocurrency investment scams across platforms. Proceedings of the IEEE European Symposium on Security and Privacy Workshops, pages 158-169. [accepted manuscript] [paywall version]
Jack Hughes, Andrew Caines, & Alice Hutchings (2023). Argot as a trust signal: Slang, jargon & reputation on a large cybercrime forum. Workshop on the Economics of Information Security, pages 1-11. [open access]
Kieron Ivy Turk, Alice Hutchings, & Alastair R. Beresford (2023). Can't Keep Them Away: The failures of anti-stalking protocols in personal item tracking devices. Proceedings of the Security Protocols Workshop, pages 78-11. [open access]
Kieron Ivy Turk & Alice Huchings (2023). Click here to exit: An evaluation of quick exit buttons. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI) 2023, pages 1-15. [open access]
Sharad Agarwal, Gilberto Atondo-Siu, Marilyn Ordekian, Alice Hutchings, Enrico Mariconti, & Marie Vasek (2023). Short Paper: DeFi Deception - Uncovering the prevalence of rugpulls in cryptocurrency projects. Proceedings of the International Conference on Financial Cryptography and Data Security, pages 1-10. [open access]
Linda Zhou, Andrew Caines, Ildiko Pete, & Alice Hutchings (2023). Automated hate speech detection and span extraction in underground hacking and extremist forums. Natural Language Engineering, 29(5), 1247-1274. [open access]
Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, & Tyler Moore (2022). "Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-12. [accepted manuscript] [paywall version]
Ildiko Pete, Jack Hughes, Andrew Caines, Anh V. Vu, Harshad Gupta, Alice Hutchings, Ross Anderson, & Paula Buttery (2022). POSTCOG: A tool for interdisciplinary research into underground forums at scale. Proceedings of the 7th IEEE European Symposium on Security and Privacy Workshops, pages 93-104. [accepted manuscript] [paywall version]
Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings, & Yi Ting Chua (2022). Influence, infrastructure, and recentering cybercrime policing: evaluating emerging approaches to online law enforcement through a market for cybercrime services. Policing and Society: An International Journal of Research and Policy, 32(1), 103-124. [open access]
Jack Hughes, Yi Ting Chua & Alice Hutchings (2021). Too much data? Opportunities and challenges of large datasets and cybercrime. In A. Lavorgna & T. J. Holt (eds.), Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches. Oxon: Palgrave Macmillan. [accepted manuscript] [e-book version]
Gilberto Atondo Siu, Ben Collier, & Alice Hutchings (2021). Follow the money: The relationship between currency exchange and illicit behaviour in an underground forum. Proceedings of the 6th IEEE European Symposium on Security and Privacy Workshop on Attackers and Cyber-Crime Operations, pages 191-201. [accepted manuscript] [paywall version]
Alice Hutchings (2021). Flying in cyberspace: Policing global travel fraud. Policing: A Journal of Policy and Practice, 15(1), 103-118. [open access]
Ben Collier, Richard Clayton, Alice Hutchings, & Daniel R. Thomas (2021). Cybercrime is (often) boring: Infrastructure and alienation in a deviant subculture. British Journal of Criminology, 61(5), 1407-1423. [open access]
Jack Hughes, Seth Aycock, Andrew Caines, Paula Buttery, & Alice Hutchings (2020). Detecting trending terms in cybersecurity forum discussions. Workshop on Noisy User-generated Text (W-NUT), pages 1-9. [open access]
Anh V. Vu, Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, & Alice Hutchings (2020). Turning up the dial: The evolution of a cybercrime market through set-up, stable, and COVID-19 eras. Proceedings of the ACM Internet Measurement Conference, pages 551-566. [accepted version] [paywall version]
Ben Collier, Richard Clayton, Alice Hutchings, & Daniel R. Thomas (2020). Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies. Workshop on the Economics of Information Security, pages 1-25. [open access]
Yi Ting Chua, Simon Parkin, Matthew Edwards, Daniela Oliveira, Stefan Schiffner, Gareth Tyson, & Alice Hutchings (2019). Identifying unintended harms of cybersecurity countermeasures. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-15. [paywall version] [accepted manuscript]
Jack Hughes, Ben Collier, & Alice Hutchings (2019). From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-12. [paywall version] [accepted manuscript]
Ben Collier, Daniel R. Thomas, Richard Clayton, & Alice Hutchings (2019). Booting the Booters: Evaluating the effects of police interventions in the market for denial-of-service attacks. Proceedings of the ACM Internet Measurement Conference, pages 50-64. [paywall version] [accepted manuscript]
Sergio Pastrana, Alice Hutchings, Daniel R. Thomas, & Juan Tapiador (2019). Measuring eWhoring. Proceedings of the ACM Internet Measurement Conference, pages 463-477. [paywall version] [accepted manuscript]
Alice Hutchings, Sergio Pastrana, & Richard Clayton (2019). Displacing big data. In R. Leukfeldt & T. J. Holt (eds.), The Human Factor of Cybercrime. Oxon: Routledge. [draft version] [e-book version]
Alice Hutchings & Sergio Pastrana (2019). Understanding eWhoring. Proceedings of the 4th IEEE European Symposium on Security and Privacy, pages 201-214. [open access]
Alice Hutchings & Ben Collier (2019). Inside out: Characterising cybercrimes committed inside and outside the workplace. Proceedings of the 4th IEEE European Symposium on Security and Privacy Workshop on Attackers and Cyber-Crime Operations, pages 481-490. [paywall version] [accepted manuscript]
Andrew Caines, Sergio Pastrana, Alice Hutchings, & Paula Buttery (2018). Automatically identifying the function and intent of posts in underground forums. Crime Science, 7(19), 1-14. [open access]
Alice Hutchings, A. & Thomas J. Holt (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75-94. [open access]
Andrew Caines, Sergio Pastrana, Alice Hutchings, & Paula Buttery (2018). Aggressive language in an online hacking forum. Proceedings of the 2nd Workshop on Abusive Language Online, pages 66-74. [open access]
Sergio Pastrana, Alice Hutchings, Andrew Caines, & Paula Buttery (2018). Characterizing Eve: Analysing cybercrime actors in a large underground forum. Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), pages 207-227. [open access]
Alice Hutchings (2018). Leaving on a Jet Plane: The trade in fraudulently obtained airline tickets. Crime, Law and Social Change, 70(4), 461-487. [open access]
Sergio Pastrana, Daniel R. Thomas, Alice Hutchings, & Richard Clayton (2018). CrimeBB: Enabling cybercrime research on underground forums at scale. Proceedings of the ACM International World Wide Web (WWW) Conference, pages 1845-1854. [open access]
Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, & Gianluca Stringhini (2017). International comparison of bank fraud reimbursement: Customer perceptions and contractual terms. Journal of Cybersecurity, 3(2), 109-125. [open access]
Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, A., Richard Clayton, & Alastair R. Beresford (2017). Ethical issues in research using datasets of illicit origin. Proceedings of the ACM Internet Measurement Conference, pages 445-462. [open access]
Alice Hutchings & Richard Clayton (2017). Configuring Zeus: A case study of online crime target selection and knowledge transmission. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 33-40. [paywall version] [accepted manuscript]
Alice Hutchings & Yi Ting Chua (2017). Gendering cybercrime. In T. J. Holt (ed), Cybercrime through an Interdisciplinary Lens (pp. 167-188). Oxon: Routledge. [draft version] [e-book version]
Alice Hutchings & Thomas J. Holt (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11-30. [paywall version] [accepted manuscript]
Thomas J. Holt, Olga Smirnova, & Alice Hutchings (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137-145. [open access]
Alice Hutchings & Richard Clayton (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178. [paywall version] [accepted manuscript]
Alice Hutchings (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (ed), Crime Online: Correlates, Causes, and Context (pp. 117-140). Durham: Carolina Academic Press. [draft version]
Alice Hutchings, Richard Clayton, & Ross Anderson (2016). Taking down websites to prevent crime. Proceedings of the IEEE APWG Symposium on Electronic Crime Research (eCrime), pages 1-10. [paywall version] [accepted manuscript]
Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Steven J. Murdoch, M. Angela Sasse, & Gianluca Stringhini (2016). International comparison of bank fraud reimbursement: Customer perceptions and contractual terms. Workshop on the Economics of Information Security, pages 1-31. [open access]
Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, & Gianluca Stringhini (2016). Are payment card contracts unfair? Proceedings of the International Conference on Financial Cryptography and Data Security, pages 1-9. [open access]
Nektarios Leontiadis & Alice Hutchings (2015). Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity, 1(1), 81-92. [open access]
Alice Hutchings & Thomas J. Holt (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614. [paywall version] [accepted manuscript]
Alice Hutchings, Russell G. Smith, & Lachlan James (2015). Criminals in the cloud: An overview of criminal and security threats and prevention measures. In R. G. Smith, R. Cheung & L. Lau (eds), Cybercrime Risks and Responses: Eastern and Western Perspectives (pp. 146-162). Basingstoke: Palgrave Macmillan. [draft version]
Alice Hutchings & Penny Jorna (2015). Misuse of information and communications technology within the public sector. Trends & Issues in Crime & Criminal Justice Series No. 470. Canberra: Australian Institute of Criminology. [open access]
Alice Hutchings (2014). Crime from the keyboard: Organised crime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change, 62(1), 1-20. [paywall version] [accepted manuscript]
Alice Hutchings (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (eds), Global Criminology: Crime and Victimization in the Globalized Era (pp. 93-114). Boca Raton: CRC Press. [draft version]
Alice Hutchings, Russell G. Smith & Lachlan James (2013). Cloud computing for small business: Criminal and security threats and prevention measures. Trends & Issues in Crime & Criminal Justice Series No. 456. Canberra: Australian Institute of Criminology. [open access]
Alice Hutchings (2012). Computer security threats faced by small businesses in Australia. Trends & Issues in Crime & Criminal Justice Series No. 433. Canberra: Australian Institute of Criminology. [open access]
Alice Hutchings (2010). Review of computer chip identification systems. Brisbane: Australian Research Council Centre of Excellence in Policing and Security. [open access]
Alice Hutchings & Hennessey Hayes (2009). Routine activity theory and phishing victimisation: Who gets caught in the ‘net’? Current Issues in Criminal Justice, 20(3), 433–451. [accepted manuscript] [paywall version]
Books
Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith & David Maimon (2019). Cybercrime Prevention: Theory and Applications. Cham: Palgrave Macmillan.
Policy reports
Maria Bada, Alice Hutchings, Yanna Papadodimitraki, & Richard Clayton (2023). An evaluation of police interventions for cybercrime prevention. Technical Report No. 983. Cambridge: Computer Laboratory, University of Cambridge.
Tony Krone, Russell G. Smith, Jenny Cartwright, Alice Hutchings, Adam Tomison, & Sarah Napier (2017). Online child sexual exploitation offenders: A study of Australian law enforcement data. Report to the Criminology Research Advisory Council CRG 58/12-13. Canberra: Australian Institute of Criminology.
Russell G. Smith & Alice Hutchings (2014). Identity crime and misuse in Australia: Results of the 2013 online survey. Research and Public Policy Series No. 128. Canberra: Australian Institute of Criminology.
Penny Jorna & Alice Hutchings (2013). Australasian Consumer Fraud Taskforce: Results of the 2012 consumer fraud survey. Technical and Background Paper Series No. 56. Canberra: Australian Institute of Criminology.
Lachlan James, Alice Hutchings, & Russell G. Smith (2012). Final report - Cloud Computing Threat Assessment for Small Business. Brisbane: Australian Research Council Centre of Excellence in Policing and Security and the Australian Institute of Criminology.
Alice Hutchings & Jade Lindley (2012). Australasian Consumer Fraud Taskforce: Results of the 2010 and 2011 consumer fraud surveys. Technical and Background Paper Series No. 50. Canberra: Australian Institute of Criminology.