<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/u7LQgEZL" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Cybercrimeology</title>
    <description>Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research.  We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more.  
The podcast has been running since November of 2019 and there is still so much to learn.  I am happy to have you along for the journey into this fascinating subject.</description>
    <language>en</language>
    <pubDate>Wed, 1 Apr 2026 04:00:00 +0000</pubDate>
    <lastBuildDate>Wed, 1 Apr 2026 04:00:12 +0000</lastBuildDate>
    <image>
      <link>https://cybercrimeology.com</link>
      <title>Cybercrimeology</title>
      <url>https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/2d4b299c-7693-4af3-bdb9-69ebd13d1725/3000x3000/80-epidodes-cover.jpg?aid=rss_feed</url>
    </image>
    <link>https://cybercrimeology.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Cybercrimeology is a podcast about cybercrime, its research and its researchers. We talk to top researchers from around the world to learn about different forms of cybercrime and their research.  We learn about cybercrime theory, organized crime online, Darknet drug markets, cybercrime awareness and crime prevention, technology-facilitated intimate partner violence and much more.  
The podcast has been running since November of 2019 and there is still so much to learn.  I am happy to have you along for the journey into this fascinating subject.</itunes:summary>
    <itunes:author>Cybercrimeology</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/2d4b299c-7693-4af3-bdb9-69ebd13d1725/3000x3000/80-epidodes-cover.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/u7LQgEZL</itunes:new-feed-url>
    <itunes:keywords>cybersecurity, academic, research, cyber, crime, cybercrime</itunes:keywords>
    <itunes:owner>
      <itunes:name>Michael</itunes:name>
      <itunes:email>cybercrimeology@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Science"/>
    <itunes:category text="Education"/>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">66e55c88-08e4-4c7e-b8a4-5b56a5ad6db8</guid>
      <title>Who You Gonna Call?: Cybercrime Types and Expectations of Police Response</title>
      <description><![CDATA[<h2>Notes:</h2>
<ul>
 <li>Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked.</li>
 <li>Digital technologies change behaviour and scale, but do not fundamentally alter the social dynamics underlying crime.</li>
 <li>There is a significant gap between the harms experienced by individuals and the institutions available to respond to those harms.</li>
 <li>Federal law enforcement has expanded cyber capabilities, but local and state-level responses to individual victimization remain limited.</li>
 <li>Private sector actors, particularly financial institutions, play a major role in responding to financially motivated cybercrime.</li>
 <li>Non-financial cyber harms, such as sextortion or image-based abuse, often fall outside both private and public response systems.</li>
 <li>In the absence of clear response pathways, private companies are emerging to fill the gap, sometimes exploiting victims seeking help.</li>
 <li>Public attitudes toward police in cybercrime contexts are shaped by perceptions that police do not care or are unable to help.</li>
 <li>These attitudes mirror broader perceptions of policing, indicating continuity between offline and online trust dynamics.</li>
 <li>Perceptions of police capability differ depending on the type of cybercrime:
  <ul>
   <li>Computer-focused crimes (e.g., malware) are associated with lower perceived police usefulness</li>
   <li>Interpersonal cybercrimes (e.g., sextortion) are associated with higher perceived police relevance</li>
  </ul></li>
 <li>Perceived likelihood of victimization reduces confidence in police effectiveness, while fear increases it.</li>
 <li>Gender differences emerge, with men less likely to believe police can help in cybercrime contexts.</li>
 <li>A central problem is definitional ambiguity:
  <ul>
   <li>There is no consistent definition of cybercrime across agencies</li>
   <li>This limits measurement, comparison, and policy design</li>
  </ul></li>
 <li>Reporting systems are fragmented and often poorly understood by the public.</li>
 <li>Cybercrime often involves chains of offences, making classification and response assignment difficult.</li>
 <li>Comparative research suggests that investment and coordination can improve public confidence, but large-scale successes do not always translate to individual-level trust.</li>
</ul>
<h2>About our guest:</h2>
<p>Rachel McNealey</p>
<p><a href="https://www.linkedin.com/in/rachel-mcnealey-4b8720284/" rel="noopener noreferrer">https://www.linkedin.com/in/rachel-mcnealey-4b8720284/</a></p>
<h2>Papers or resources mentioned in this episode:</h2>
<p>McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can't help you”: Exploring influences on perceptions of policing cybercrime. <i>Journal of Criminal Justice, 101</i>, 102542. <a href="https://doi.org/10.1016/j.jcrimjus.2025.102542" rel="noopener noreferrer">https://doi.org/10.1016/j.jcrimjus.2025.102542</a></p>
<p>Hale, R., & Penzendstadler, N. (2025, March 20). Digital forensics firms promise help to sextortion victims. Some leave them worse off. <i>USA Today</i>. <a href="https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/" rel="noopener noreferrer">https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/</a></p>
<h2>Other:</h2>
<ul>
 <li>Internet Crime Complaint Center (IC3): <a href="https://www.ic3.gov/" rel="noopener noreferrer">https://www.ic3.gov/</a></li>
</ul>
]]></description>
      <pubDate>Wed, 1 Apr 2026 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rachel McNealy)</author>
      <link>https://cybercrimeology.com/episodes/who-you-gonna-call-cybercrime-types-and-expectations-of-police-response-HvwQe0qb</link>
      <content:encoded><![CDATA[<h2>Notes:</h2>
<ul>
 <li>Cybercrime is often treated as a distinct phenomenon, but there are strong continuities with offline crime that are frequently overlooked.</li>
 <li>Digital technologies change behaviour and scale, but do not fundamentally alter the social dynamics underlying crime.</li>
 <li>There is a significant gap between the harms experienced by individuals and the institutions available to respond to those harms.</li>
 <li>Federal law enforcement has expanded cyber capabilities, but local and state-level responses to individual victimization remain limited.</li>
 <li>Private sector actors, particularly financial institutions, play a major role in responding to financially motivated cybercrime.</li>
 <li>Non-financial cyber harms, such as sextortion or image-based abuse, often fall outside both private and public response systems.</li>
 <li>In the absence of clear response pathways, private companies are emerging to fill the gap, sometimes exploiting victims seeking help.</li>
 <li>Public attitudes toward police in cybercrime contexts are shaped by perceptions that police do not care or are unable to help.</li>
 <li>These attitudes mirror broader perceptions of policing, indicating continuity between offline and online trust dynamics.</li>
 <li>Perceptions of police capability differ depending on the type of cybercrime:
  <ul>
   <li>Computer-focused crimes (e.g., malware) are associated with lower perceived police usefulness</li>
   <li>Interpersonal cybercrimes (e.g., sextortion) are associated with higher perceived police relevance</li>
  </ul></li>
 <li>Perceived likelihood of victimization reduces confidence in police effectiveness, while fear increases it.</li>
 <li>Gender differences emerge, with men less likely to believe police can help in cybercrime contexts.</li>
 <li>A central problem is definitional ambiguity:
  <ul>
   <li>There is no consistent definition of cybercrime across agencies</li>
   <li>This limits measurement, comparison, and policy design</li>
  </ul></li>
 <li>Reporting systems are fragmented and often poorly understood by the public.</li>
 <li>Cybercrime often involves chains of offences, making classification and response assignment difficult.</li>
 <li>Comparative research suggests that investment and coordination can improve public confidence, but large-scale successes do not always translate to individual-level trust.</li>
</ul>
<h2>About our guest:</h2>
<p>Rachel McNealey</p>
<p><a href="https://www.linkedin.com/in/rachel-mcnealey-4b8720284/" rel="noopener noreferrer">https://www.linkedin.com/in/rachel-mcnealey-4b8720284/</a></p>
<h2>Papers or resources mentioned in this episode:</h2>
<p>McNealey, R. L., Figueroa, C. I., & Maher, C. A. (2025). “Police can't help you”: Exploring influences on perceptions of policing cybercrime. <i>Journal of Criminal Justice, 101</i>, 102542. <a href="https://doi.org/10.1016/j.jcrimjus.2025.102542" rel="noopener noreferrer">https://doi.org/10.1016/j.jcrimjus.2025.102542</a></p>
<p>Hale, R., & Penzendstadler, N. (2025, March 20). Digital forensics firms promise help to sextortion victims. Some leave them worse off. <i>USA Today</i>. <a href="https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/" rel="noopener noreferrer">https://www.usatoday.com/story/life/health-wellness/2025/03/20/digital-forensics-sexortion-blackmail-recovery-services/81934584007/</a></p>
<h2>Other:</h2>
<ul>
 <li>Internet Crime Complaint Center (IC3): <a href="https://www.ic3.gov/" rel="noopener noreferrer">https://www.ic3.gov/</a></li>
</ul>
]]></content:encoded>
      <enclosure length="29443278" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/b479188f-69ec-438d-a8fa-4603a5276d90/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/audio/group/49d6b3e5-762a-4bbe-859f-f35e24305fe3/group-item/5baee140-b03b-465a-afea-c0a7d5073a8d/128_default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Who You Gonna Call?: Cybercrime Types and Expectations of Police Response</itunes:title>
      <itunes:author>Rachel McNealy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9c0bdabe-ee64-46a7-bb0e-d855ebe05f01/3000x3000/ep128.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:38</itunes:duration>
      <itunes:summary>Dr. Rachel McNealey joins us to examine how people understand cybercrime and why existing response systems often fail to meet their needs. We explore how perceptions of police capability differ across types of cybercrime, and what happens when gaps in response are filled by private actors.</itunes:summary>
      <itunes:subtitle>Dr. Rachel McNealey joins us to examine how people understand cybercrime and why existing response systems often fail to meet their needs. We explore how perceptions of police capability differ across types of cybercrime, and what happens when gaps in response are filled by private actors.</itunes:subtitle>
      <itunes:keywords>malware, research, scams, cybercrime, academic, policing, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e0412123-10c0-4e5f-82f6-f8c0ae71f174</guid>
      <title>Disordered Sense-Making: Conflict Narratives in the Digital Era</title>
      <description><![CDATA[<h2>Notes:</h2>
<ul>
 <li>Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants on multiple sides of the conflict.</li>
 <li>A central puzzle of his PhD research was not denial of violence, but how individuals who acknowledged their participation struggled to explain how they came to commit acts of mass violence.</li>
 <li>This led to an intellectual shift from viewing violence as purely intentional to understanding it as embedded in structures, representations, and processes of sense-making.</li>
 <li>Following a postdoctoral year at MIT working with political scientist Roger Petersen, Dr Tanner deepened his focus on the relationship between political violence, identity narratives, and institutional structures.</li>
 <li>After joining the Université de Montréal, he shifted toward research on policing and later co-led a major project examining right-wing extremism in Canada beginning in 2013.</li>
 <li>The Canadian project revealed that relatively few participants were “true believers.” Many were navigating economic precarity, cultural uncertainty, and political confusion, often influenced by moral or ideological entrepreneurs.</li>
 <li>Fieldwork in this area involved significant challenges, including surveillance, threats, cancelled interviews, and difficulties accessing participants.</li>
 <li>During the COVID-19 pandemic, Dr Tanner and colleagues examined anti-restriction movements and observed how disinformation and fragmented information ecosystems shaped divergent interpretations of shared events.</li>
 <li>He argues that information is not neutral. Information produces order. The ways in which information is produced, amplified, and consumed shape how individuals interpret reality and coordinate socially.</li>
 <li>Social media platforms function as privatized public spaces, structuring discourse through governance mechanisms that are not democratically accountable.</li>
 <li>Dr Tanner’s more recent research focuses on the evolution of extremist discourse, particularly the emergence of “pop masculinism,” where gendered and anti-feminist narratives are embedded within popular culture, fitness culture, gaming aesthetics, and entrepreneurial self-discipline discourse.</li>
 <li>The “sigma” discourse operates as a gateway into broader manosphere ideologies by framing personal discipline and self-improvement in opposition to women, feminism, and equality discourse.</li>
 <li>Interviews with young men and women reveal perceptions of a growing gender gap, including feelings among some young men of status loss and lack of positive role models.</li>
 <li>Dr Tanner raises concern about the erosion of shared institutional facts and the desynchronization of social expectations, suggesting that social trust depends upon shared informational baselines.</li>
 <li>He argues for an expanded criminology attentive to digital environments, disinformation, and the governance of online prejudice, aligning with broader developments in digital criminology.</li>
 <li>Central to his work is the question: how do people make sense of their world when institutional anchors weaken and informational environments fragment?</li>
</ul>
<h2>About our guest:</h2>
<p>Dr Samuel Tanner</p>
<p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15014/sg/Samuel" rel="noopener noreferrer">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15014/sg/Samuel</a> Tanner/</p>
<h2>Papers or resources mentioned in this episode:</h2>
<p><strong>Tanner, Samuel & Gillardin, François (2025).</strong><i>Toxic Communication on TikTok: Sigma Masculinities and Gendered Disinformation.</i><strong>Social Media + Society, 11(1).</strong><a href="https://doi.org/10.1177/20563051251313844" rel="noopener noreferrer">https://doi.org/10.1177/20563051251313844</a></p>
<p><i>Open access PDF:</i><a href="https://doi.org/10.1177/20563051251313844" rel="noopener noreferrer">https://doi.org/10.1177/20563051251313844</a></p>
<p><strong>Leman-Langlois, Stéphane, Campana, Aurélie & Tanner, Samuel (2024).</strong><i>The Great Right North: Inside Far-Right Activism in Canada.</i> McGill-Queen’s University Press. (Book overview: <a href="https://www.jstor.org/stable/jj.20829378" rel="noopener noreferrer">https://www.jstor.org/stable/jj.20829378</a>)</p>
<h2><strong>People mentioned in this episode:</strong></h2>
<p>Jean-Paul Brodeur — Presses de l’Université de Montréal (institutional collection page)</p>
<p><a href="https://pum.umontreal.ca/collections/jean-paul-brodeur/" rel="noopener noreferrer">https://pum.umontreal.ca/collections/jean-paul-brodeur/</a></p>
<p>Roger D. Petersen — MIT Political Science profile</p>
<p> <a href="https://polisci.mit.edu/people/roger-petersen" rel="noopener noreferrer">https://polisci.mit.edu/people/roger-petersen</a></p>
<p>Aurélie Campana — Université Laval (Faculté des sciences sociales) </p>
<p> <a href="https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/aurelie-campana" rel="noopener noreferrer">https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/aurelie-campana</a></p>
<p>Stéphane Leman-Langlois — Université Laval (Faculté des sciences sociales) </p>
<p> <a href="https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/stephane-leman-langlois" rel="noopener noreferrer">https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/stephane-leman-langlois</a></p>
<p>François Gillardin — Centre international de criminologie comparée (CICC), Université de Montréal</p>
<p> <a href="https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/gillardin" rel="noopener noreferrer">https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/gillardin</a></p>
<p>Francis Dupuis-Déri — UQAM Professor </p>
<p> <a href="https://professeurs.uqam.ca/professeur/dupuis-deri.francis" rel="noopener noreferrer">https://professeurs.uqam.ca/professeur/dupuis-deri.francis</a></p>
<p>Anastasia Powell — RMIT University </p>
<p> <a href="https://www.rmit.edu.au/profiles/p/anastasia-powell" rel="noopener noreferrer">https://www.rmit.edu.au/profiles/p/anastasia-powell</a></p>
<h2>Other:</h2>
<p>The term <i>enrobage</i> <i>naïf (or naïf enrobage, as said) </i>refers to a veneer of naivety; in this case, a problematic discourse wrapped in innocent or everyday cultural forms, akin to a wolf in sheep’s clothing.</p>
<p> </p>
]]></description>
      <pubDate>Sun, 1 Mar 2026 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Samuel Tanner)</author>
      <link>https://cybercrimeology.com/episodes/disordered-sense-making-conflict-narratives-in-the-digital-era-JpVh75Ck</link>
      <content:encoded><![CDATA[<h2>Notes:</h2>
<ul>
 <li>Dr Samuel Tanner began his doctoral research examining war crimes and armed militias involved in mass violence in the Balkans, conducting extensive fieldwork and interviews with participants on multiple sides of the conflict.</li>
 <li>A central puzzle of his PhD research was not denial of violence, but how individuals who acknowledged their participation struggled to explain how they came to commit acts of mass violence.</li>
 <li>This led to an intellectual shift from viewing violence as purely intentional to understanding it as embedded in structures, representations, and processes of sense-making.</li>
 <li>Following a postdoctoral year at MIT working with political scientist Roger Petersen, Dr Tanner deepened his focus on the relationship between political violence, identity narratives, and institutional structures.</li>
 <li>After joining the Université de Montréal, he shifted toward research on policing and later co-led a major project examining right-wing extremism in Canada beginning in 2013.</li>
 <li>The Canadian project revealed that relatively few participants were “true believers.” Many were navigating economic precarity, cultural uncertainty, and political confusion, often influenced by moral or ideological entrepreneurs.</li>
 <li>Fieldwork in this area involved significant challenges, including surveillance, threats, cancelled interviews, and difficulties accessing participants.</li>
 <li>During the COVID-19 pandemic, Dr Tanner and colleagues examined anti-restriction movements and observed how disinformation and fragmented information ecosystems shaped divergent interpretations of shared events.</li>
 <li>He argues that information is not neutral. Information produces order. The ways in which information is produced, amplified, and consumed shape how individuals interpret reality and coordinate socially.</li>
 <li>Social media platforms function as privatized public spaces, structuring discourse through governance mechanisms that are not democratically accountable.</li>
 <li>Dr Tanner’s more recent research focuses on the evolution of extremist discourse, particularly the emergence of “pop masculinism,” where gendered and anti-feminist narratives are embedded within popular culture, fitness culture, gaming aesthetics, and entrepreneurial self-discipline discourse.</li>
 <li>The “sigma” discourse operates as a gateway into broader manosphere ideologies by framing personal discipline and self-improvement in opposition to women, feminism, and equality discourse.</li>
 <li>Interviews with young men and women reveal perceptions of a growing gender gap, including feelings among some young men of status loss and lack of positive role models.</li>
 <li>Dr Tanner raises concern about the erosion of shared institutional facts and the desynchronization of social expectations, suggesting that social trust depends upon shared informational baselines.</li>
 <li>He argues for an expanded criminology attentive to digital environments, disinformation, and the governance of online prejudice, aligning with broader developments in digital criminology.</li>
 <li>Central to his work is the question: how do people make sense of their world when institutional anchors weaken and informational environments fragment?</li>
</ul>
<h2>About our guest:</h2>
<p>Dr Samuel Tanner</p>
<p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15014/sg/Samuel" rel="noopener noreferrer">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15014/sg/Samuel</a> Tanner/</p>
<h2>Papers or resources mentioned in this episode:</h2>
<p><strong>Tanner, Samuel & Gillardin, François (2025).</strong><i>Toxic Communication on TikTok: Sigma Masculinities and Gendered Disinformation.</i><strong>Social Media + Society, 11(1).</strong><a href="https://doi.org/10.1177/20563051251313844" rel="noopener noreferrer">https://doi.org/10.1177/20563051251313844</a></p>
<p><i>Open access PDF:</i><a href="https://doi.org/10.1177/20563051251313844" rel="noopener noreferrer">https://doi.org/10.1177/20563051251313844</a></p>
<p><strong>Leman-Langlois, Stéphane, Campana, Aurélie & Tanner, Samuel (2024).</strong><i>The Great Right North: Inside Far-Right Activism in Canada.</i> McGill-Queen’s University Press. (Book overview: <a href="https://www.jstor.org/stable/jj.20829378" rel="noopener noreferrer">https://www.jstor.org/stable/jj.20829378</a>)</p>
<h2><strong>People mentioned in this episode:</strong></h2>
<p>Jean-Paul Brodeur — Presses de l’Université de Montréal (institutional collection page)</p>
<p><a href="https://pum.umontreal.ca/collections/jean-paul-brodeur/" rel="noopener noreferrer">https://pum.umontreal.ca/collections/jean-paul-brodeur/</a></p>
<p>Roger D. Petersen — MIT Political Science profile</p>
<p> <a href="https://polisci.mit.edu/people/roger-petersen" rel="noopener noreferrer">https://polisci.mit.edu/people/roger-petersen</a></p>
<p>Aurélie Campana — Université Laval (Faculté des sciences sociales) </p>
<p> <a href="https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/aurelie-campana" rel="noopener noreferrer">https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/aurelie-campana</a></p>
<p>Stéphane Leman-Langlois — Université Laval (Faculté des sciences sociales) </p>
<p> <a href="https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/stephane-leman-langlois" rel="noopener noreferrer">https://www.fss.ulaval.ca/notre-faculte/repertoire-du-personnel/stephane-leman-langlois</a></p>
<p>François Gillardin — Centre international de criminologie comparée (CICC), Université de Montréal</p>
<p> <a href="https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/gillardin" rel="noopener noreferrer">https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/gillardin</a></p>
<p>Francis Dupuis-Déri — UQAM Professor </p>
<p> <a href="https://professeurs.uqam.ca/professeur/dupuis-deri.francis" rel="noopener noreferrer">https://professeurs.uqam.ca/professeur/dupuis-deri.francis</a></p>
<p>Anastasia Powell — RMIT University </p>
<p> <a href="https://www.rmit.edu.au/profiles/p/anastasia-powell" rel="noopener noreferrer">https://www.rmit.edu.au/profiles/p/anastasia-powell</a></p>
<h2>Other:</h2>
<p>The term <i>enrobage</i> <i>naïf (or naïf enrobage, as said) </i>refers to a veneer of naivety; in this case, a problematic discourse wrapped in innocent or everyday cultural forms, akin to a wolf in sheep’s clothing.</p>
<p> </p>
]]></content:encoded>
      <enclosure length="34595583" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/b479188f-69ec-438d-a8fa-4603a5276d90/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/audio/group/e302f023-35b3-4ac7-b1f7-c7ecfae3caa6/group-item/6e625c4a-488e-4d72-a8fe-0f7140c6160d/128_default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Disordered Sense-Making: Conflict Narratives in the Digital Era</itunes:title>
      <itunes:author>Samuel Tanner</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/0a7d2455-77c8-4e0b-86b4-39cb806ad2fe/3000x3000/ep127.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:00</itunes:duration>
      <itunes:summary>Dr Samuel Tanner offers a reflective monologue tracing his intellectual journey from doctoral research on war crimes in the Balkans to contemporary work on right-wing extremism, disinformation, and what he calls pop masculinism. Across these projects runs a persistent question: how do people make sense of a world that feels as though it is slipping out of alignment? Drawing on fieldwork, policing research, and analysis of digital platforms, Dr Tanner explores the relationship between violence, information, and social order in an era where public discourse increasingly unfolds within privately governed online spaces.</itunes:summary>
      <itunes:subtitle>Dr Samuel Tanner offers a reflective monologue tracing his intellectual journey from doctoral research on war crimes in the Balkans to contemporary work on right-wing extremism, disinformation, and what he calls pop masculinism. Across these projects runs a persistent question: how do people make sense of a world that feels as though it is slipping out of alignment? Drawing on fieldwork, policing research, and analysis of digital platforms, Dr Tanner explores the relationship between violence, information, and social order in an era where public discourse increasingly unfolds within privately governed online spaces.</itunes:subtitle>
      <itunes:keywords>anti-feminism, sigma, pop masculinity, research, cybercrime, criminology, conflict studies, sense-making, education, war, social media, acadmia</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">783e7e9c-d3d3-45ff-aef1-8065165dd22b</guid>
      <title>Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders</title>
      <description><![CDATA[<h3>Notes:</h3><ul><li>Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or technologies.</li><li>Cybercrime offenders are often portrayed as a homogeneous group of highly skilled hackers, but research shows they are a heterogeneous population with distinct motivations, skills, and pathways into crime.</li><li>A key distinction can be made between financially motivated cybercrime, such as online fraud, and more technically complex cyber-dependent crimes such as hacking, DDoS attacks, and website defacement.</li><li>Financially motivated cybercrime offenders often resemble traditional offline offenders and may commit both online and offline crimes, with similar risk factors, peer influences, and personality profiles.</li><li>Technically skilled cyber offenders tend to show different characteristics, including higher levels of self-control and intrinsic motivations such as curiosity, challenge, and skill development.</li><li>Research suggests that traditional criminological theories still help explain some forms of cybercrime, particularly financially motivated offences, while other forms require additional or adapted theoretical approaches.</li><li>Gaming environments may act as pathways into certain forms of cybercrime by facilitating skill development, exposure to deviant peers, and access to illicit online forums, though gaming may also be protective in some contexts.</li><li>Parental supervision and open communication may play a role in shaping online behaviour, similar to the role of guardianship and social control in offline offending.</li><li>Law enforcement responses differ depending on the type of cybercrime, with financially motivated offences often handled by local police and more technical crimes investigated by specialized units.</li><li>Dr Bekkers highlights the need for longitudinal research and greater engagement with offenders to better understand pathways into cybercrime and to inform prevention and intervention strategies.</li></ul><h2>About our guest:</h2><p>Dr Luuk Bekkers</p><p><a href="https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity">https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity</a></p><p><a href="https://www.linkedin.com/in/luuk-bekkers-79621b162/">https://www.linkedin.com/in/luuk-bekkers-79621b162/</a></p><h2>Papers or resources mentioned in this episode:</h2><p>Bekkers, L. M. J., Moneva, A., & Leukfeldt, E. R. (2025). Distinct group, distinct traits? A comparison of risk factors across cybercrime offenders, traditional offenders and non-offenders. <i>Psychiatry, Psychology and Law</i>, 1–25. <a href="https://doi.org/10.1080/13218719.2025.2546311">https://doi.org/10.1080/13218719.2025.2546311</a></p><p>Bekkers, L. M., Holt, T. J., & Leukfeldt, E. R. (2025). The psychological correlates of cybercrime offending: Exploring the self-control/social learning relationship in serious cyber-dependent crime. <i>European Journal of Criminology</i>, <i>0</i>(0). <a href="https://doi.org/10.1177/14773708251378356">https://doi.org/10.1177/14773708251378356</a></p><p>Bekkers, L. M. J., Holt, T. J., & Leukfeldt, E. R. (2025). <i>Exploring the factors that differentiate individual and group offenders in cyber-dependent crime</i>. <strong>Journal of Criminal Justice, 101</strong>, 102522. <a href="https://doi.org/10.1016/j.jcrimjus.2025.102522">https://doi.org/10.1016/j.jcrimjus.2025.102522</a></p>
]]></description>
      <pubDate>Sun, 1 Feb 2026 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/beyond-the-cybercriminal-understanding-diversity-in-cyber-offenders-yNfXVpZB</link>
      <content:encoded><![CDATA[<h3>Notes:</h3><ul><li>Dr Bekkers describes his academic pathway from psychology to criminology and explains why his research focus has consistently been on offenders and their behaviour rather than on offences or technologies.</li><li>Cybercrime offenders are often portrayed as a homogeneous group of highly skilled hackers, but research shows they are a heterogeneous population with distinct motivations, skills, and pathways into crime.</li><li>A key distinction can be made between financially motivated cybercrime, such as online fraud, and more technically complex cyber-dependent crimes such as hacking, DDoS attacks, and website defacement.</li><li>Financially motivated cybercrime offenders often resemble traditional offline offenders and may commit both online and offline crimes, with similar risk factors, peer influences, and personality profiles.</li><li>Technically skilled cyber offenders tend to show different characteristics, including higher levels of self-control and intrinsic motivations such as curiosity, challenge, and skill development.</li><li>Research suggests that traditional criminological theories still help explain some forms of cybercrime, particularly financially motivated offences, while other forms require additional or adapted theoretical approaches.</li><li>Gaming environments may act as pathways into certain forms of cybercrime by facilitating skill development, exposure to deviant peers, and access to illicit online forums, though gaming may also be protective in some contexts.</li><li>Parental supervision and open communication may play a role in shaping online behaviour, similar to the role of guardianship and social control in offline offending.</li><li>Law enforcement responses differ depending on the type of cybercrime, with financially motivated offences often handled by local police and more technical crimes investigated by specialized units.</li><li>Dr Bekkers highlights the need for longitudinal research and greater engagement with offenders to better understand pathways into cybercrime and to inform prevention and intervention strategies.</li></ul><h2>About our guest:</h2><p>Dr Luuk Bekkers</p><p><a href="https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity">https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity</a></p><p><a href="https://www.linkedin.com/in/luuk-bekkers-79621b162/">https://www.linkedin.com/in/luuk-bekkers-79621b162/</a></p><h2>Papers or resources mentioned in this episode:</h2><p>Bekkers, L. M. J., Moneva, A., & Leukfeldt, E. R. (2025). Distinct group, distinct traits? A comparison of risk factors across cybercrime offenders, traditional offenders and non-offenders. <i>Psychiatry, Psychology and Law</i>, 1–25. <a href="https://doi.org/10.1080/13218719.2025.2546311">https://doi.org/10.1080/13218719.2025.2546311</a></p><p>Bekkers, L. M., Holt, T. J., & Leukfeldt, E. R. (2025). The psychological correlates of cybercrime offending: Exploring the self-control/social learning relationship in serious cyber-dependent crime. <i>European Journal of Criminology</i>, <i>0</i>(0). <a href="https://doi.org/10.1177/14773708251378356">https://doi.org/10.1177/14773708251378356</a></p><p>Bekkers, L. M. J., Holt, T. J., & Leukfeldt, E. R. (2025). <i>Exploring the factors that differentiate individual and group offenders in cyber-dependent crime</i>. <strong>Journal of Criminal Justice, 101</strong>, 102522. <a href="https://doi.org/10.1016/j.jcrimjus.2025.102522">https://doi.org/10.1016/j.jcrimjus.2025.102522</a></p>
]]></content:encoded>
      <enclosure length="24169183" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c91fab4e-c842-4ca9-9524-74ac03f49f5e/audio/d936549e-29f6-475a-a68f-bb0f25828a45/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/e5796276-dc16-45aa-97b2-8c53fec85463/3000x3000/ep126.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:09</itunes:duration>
      <itunes:summary>Who commits cybercrime, and are all cybercrime offenders the same? In this episode, We speak with Dr. Luuk Bekkers about what criminological and psychological research reveals about cybercrime perpetrators. They discuss differences between financially motivated and technically skilled offenders, the overlap between online and offline crime, and why understanding offender types matters for prevention, policing, and policy.</itunes:summary>
      <itunes:subtitle>Who commits cybercrime, and are all cybercrime offenders the same? In this episode, We speak with Dr. Luuk Bekkers about what criminological and psychological research reveals about cybercrime perpetrators. They discuss differences between financially motivated and technically skilled offenders, the overlap between online and offline crime, and why understanding offender types matters for prevention, policing, and policy.</itunes:subtitle>
      <itunes:keywords>profiling, research, cybercrime, academic, policy, law enforcement, cyber profiling, education, psychology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">789318ac-80ff-4803-aa2a-9068fd107c1b</guid>
      <title>Systematically Improving Cybersecurity Training</title>
      <description><![CDATA[<h2><strong>Notes:</strong></h2><ul><li>Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.</li><li>The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies.</li><li>Findings from a large-scale systematic review of cybersecurity training methods are discussed, highlighting the diversity of training approaches used across the literature.</li><li>The episode examines results from a meta-analysis assessing the overall effectiveness of cybersecurity training and the gap between improvements in precursors such as knowledge and intentions versus observable behaviour.</li><li>Julia explains why many cybersecurity training programmes lack explicit behavioural theory and rely on trial-and-error design choices.</li><li>A key theme is the distinction between cybersecurity behaviours that require active engagement, such as phishing detection, and behaviours that may benefit from habit formation, such as screen locking or password management.</li><li>The conversation draws on research into email habits and phishing susceptibility to illustrate how habitual behaviour can increase vulnerability in certain contexts.</li><li>Julia discusses the use of psychological theory, including habit formation and implementation intentions, to design and evaluate cybersecurity training interventions.</li><li>The episode concludes with reflections on the future of cybersecurity training research and the need for behaviour-specific, theory-informed models.</li></ul><h2>About our Guest:</h2><p><strong>Julia Prümmer</strong></p><p><a href="https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1">https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1</a></p><p><a href="https://www.linkedin.com/in/julia-pr%C3%BCmmer-376778159/">https://www.linkedin.com/in/julia-prümmer-376778159/</a></p><h2>Papers or resources mentioned in this episode</h2><h3> </h3><p>Prümmer, J., van Steen, T., & van den Berg, B. (2024). <i>A systematic review of current cybersecurity training methods</i>. <strong>Computers & Security, 136</strong>, 103585.</p><p><a href="https://doi.org/10.1016/j.cose.2023.103585">https://doi.org/10.1016/j.cose.2023.103585</a></p><p>Prümmer, J. (2024). <i>The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement</i>. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), <strong>Augmented cognition. HCII 2024</strong> (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.</p><p><a href="https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101">https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101</a></p><p>Prümmer, J., van Steen, T., & van den Berg, B. (2025). <i>Assessing the effect of cybersecurity training on end-users: A meta-analysis</i>. <strong>Computers & Security, 150</strong>, 104206.</p><p><a href="https://doi.org/10.1016/j.cose.2024.104206">https://doi.org/10.1016/j.cose.2024.104206</a></p><p>Vishwanath, A. (2015). <i>Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack</i>. <strong>Journal of Computer-Mediated Communication, 20</strong>(5), 570–584.</p><p><a href="https://doi.org/10.1111/jcc4.12126">https://doi.org/10.1111/jcc4.12126</a></p><h2>Other</h2><h3> </h3><p>If this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.  </p>
]]></description>
      <pubDate>Thu, 1 Jan 2026 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Julia Prümmer)</author>
      <link>https://cybercrimeology.com/episodes/systematically-improving-cybersecurity-training-5BHr1_EF</link>
      <content:encoded><![CDATA[<h2><strong>Notes:</strong></h2><ul><li>Julia Prümmer describes her transition from legal psychology into cybersecurity research and how psychological methods shape her approach to cybersecurity training.</li><li>The discussion explores the role of systematic reviews in mapping what a research field actually knows, rather than relying on highly visible or frequently cited studies.</li><li>Findings from a large-scale systematic review of cybersecurity training methods are discussed, highlighting the diversity of training approaches used across the literature.</li><li>The episode examines results from a meta-analysis assessing the overall effectiveness of cybersecurity training and the gap between improvements in precursors such as knowledge and intentions versus observable behaviour.</li><li>Julia explains why many cybersecurity training programmes lack explicit behavioural theory and rely on trial-and-error design choices.</li><li>A key theme is the distinction between cybersecurity behaviours that require active engagement, such as phishing detection, and behaviours that may benefit from habit formation, such as screen locking or password management.</li><li>The conversation draws on research into email habits and phishing susceptibility to illustrate how habitual behaviour can increase vulnerability in certain contexts.</li><li>Julia discusses the use of psychological theory, including habit formation and implementation intentions, to design and evaluate cybersecurity training interventions.</li><li>The episode concludes with reflections on the future of cybersecurity training research and the need for behaviour-specific, theory-informed models.</li></ul><h2>About our Guest:</h2><p><strong>Julia Prümmer</strong></p><p><a href="https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1">https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1</a></p><p><a href="https://www.linkedin.com/in/julia-pr%C3%BCmmer-376778159/">https://www.linkedin.com/in/julia-prümmer-376778159/</a></p><h2>Papers or resources mentioned in this episode</h2><h3> </h3><p>Prümmer, J., van Steen, T., & van den Berg, B. (2024). <i>A systematic review of current cybersecurity training methods</i>. <strong>Computers & Security, 136</strong>, 103585.</p><p><a href="https://doi.org/10.1016/j.cose.2023.103585">https://doi.org/10.1016/j.cose.2023.103585</a></p><p>Prümmer, J. (2024). <i>The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement</i>. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), <strong>Augmented cognition. HCII 2024</strong> (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.</p><p><a href="https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101">https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101</a></p><p>Prümmer, J., van Steen, T., & van den Berg, B. (2025). <i>Assessing the effect of cybersecurity training on end-users: A meta-analysis</i>. <strong>Computers & Security, 150</strong>, 104206.</p><p><a href="https://doi.org/10.1016/j.cose.2024.104206">https://doi.org/10.1016/j.cose.2024.104206</a></p><p>Vishwanath, A. (2015). <i>Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack</i>. <strong>Journal of Computer-Mediated Communication, 20</strong>(5), 570–584.</p><p><a href="https://doi.org/10.1111/jcc4.12126">https://doi.org/10.1111/jcc4.12126</a></p><h2>Other</h2><h3> </h3><p>If this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.  </p>
]]></content:encoded>
      <enclosure length="47381334" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/0cf40369-f191-4eca-84bb-017fa81fe138/audio/8f9886a9-b84b-4673-80f0-125bfd553af1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Systematically Improving Cybersecurity Training</itunes:title>
      <itunes:author>Julia Prümmer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/5325ba66-a8c1-492f-b801-7ba6d815bdd8/3000x3000/ep125.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:19</itunes:duration>
      <itunes:summary>How do we change cybersecurity behaviour rather than simply improve awareness? In this episode, Julia Prümmer joins Cybercrimeology to discuss cybersecurity training through the lens of psychology, systematic reviews, and behavioural theory. The conversation examines why many training programmes improve knowledge and attitudes but struggle to produce sustained behavioural change, and how differentiating between types of cybersecurity behaviour may lead to more effective interventions.</itunes:summary>
      <itunes:subtitle>How do we change cybersecurity behaviour rather than simply improve awareness? In this episode, Julia Prümmer joins Cybercrimeology to discuss cybersecurity training through the lens of psychology, systematic reviews, and behavioural theory. The conversation examines why many training programmes improve knowledge and attitudes but struggle to produce sustained behavioural change, and how differentiating between types of cybersecurity behaviour may lead to more effective interventions.</itunes:subtitle>
      <itunes:keywords>academia, passwords, cybercrime training, research, training, phishing, cybersecurity, cybersecurity awareness, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd94ab21-6770-4d53-acee-99232ff75e2f</guid>
      <title>The Human beneath the Hoodie: Profiling pathways into cybercrime</title>
      <description><![CDATA[<p><strong>otes:</strong></p><p>Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.</p><p>Her research focuses on understanding the human behind the keyboard through developmental history, motivation and lived experience.</p><p>Initial motivations among hackers often centre on curiosity, challenge seeking and belonging rather than financial gain.</p><p>Many participants reported early interest in technology, solitary online activity and experiences they described as destabilising events.</p><p>Melissa distinguishes between lawful and criminal pathways using indicators such as modifying games, low self-control and a history of property offending.</p><p>Her work highlights misunderstandings about intent, the role of gamification and the abstraction of harm when offending takes place online.</p><p>She argues that cybercrime is a societal problem requiring early education, parental and teacher capability building and partnerships with tech and gaming companies.</p><p>Diversion programs are essential to guide youth with technical interest toward prosocial cybersecurity roles rather than criminalisation.</p><p><strong>About our guest:</strong><br />Dr Melissa Martineau<br /><a href="https://www.linkedin.com/in/melissa-martineau-369bb5258/">https://www.linkedin.com/in/melissa-martineau-369bb5258/</a><br /><a href="https://www.captechu.edu/webinar-series-melissa-martineau">https://www.captechu.edu/webinar-series-melissa-martineau</a></p><p><strong>Papers or resources mentioned in this episode:</strong><br />Martineau, M. (2023). The pathways of cyber dependent offenders. <i>Journal of Cybercriminology</i>, 3(3), 32.<br /><a href="https://www.mdpi.com/2673-6756/3/3/32">https://www.mdpi.com/2673-6756/3/3/32</a></p><p>Martineau, M. (2024). Distinguishing lawful and criminal hacker trajectories. <i>Journal of Cybercriminology</i>, 4(4), 45.<br /><a href="https://www.mdpi.com/2673-6756/4/4/45">https://www.mdpi.com/2673-6756/4/4/45</a></p><p><strong>Other:</strong><br />Dr Martineau wanted to share something called PRISMA (Preferred Reporting Items for Systematic reviews and Meta-Analyses) which is a helpful guideline designed to improve the reporting of systematic reviews. You can find out more about it here.   <br /><a href="http://www.prisma-statement.org/">http://www.prisma-statement.org</a></p>
]]></description>
      <pubDate>Mon, 1 Dec 2025 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Melissa Martineau)</author>
      <link>https://cybercrimeology.com/episodes/the-human-beneath-the-hoodie-profiling-pathways-into-cybercrime-CIPfWelV</link>
      <content:encoded><![CDATA[<p><strong>otes:</strong></p><p>Melissa completed her PhD after two decades of operational work, bringing a pracademic perspective to cyber profiling and offender pathways.</p><p>Her research focuses on understanding the human behind the keyboard through developmental history, motivation and lived experience.</p><p>Initial motivations among hackers often centre on curiosity, challenge seeking and belonging rather than financial gain.</p><p>Many participants reported early interest in technology, solitary online activity and experiences they described as destabilising events.</p><p>Melissa distinguishes between lawful and criminal pathways using indicators such as modifying games, low self-control and a history of property offending.</p><p>Her work highlights misunderstandings about intent, the role of gamification and the abstraction of harm when offending takes place online.</p><p>She argues that cybercrime is a societal problem requiring early education, parental and teacher capability building and partnerships with tech and gaming companies.</p><p>Diversion programs are essential to guide youth with technical interest toward prosocial cybersecurity roles rather than criminalisation.</p><p><strong>About our guest:</strong><br />Dr Melissa Martineau<br /><a href="https://www.linkedin.com/in/melissa-martineau-369bb5258/">https://www.linkedin.com/in/melissa-martineau-369bb5258/</a><br /><a href="https://www.captechu.edu/webinar-series-melissa-martineau">https://www.captechu.edu/webinar-series-melissa-martineau</a></p><p><strong>Papers or resources mentioned in this episode:</strong><br />Martineau, M. (2023). The pathways of cyber dependent offenders. <i>Journal of Cybercriminology</i>, 3(3), 32.<br /><a href="https://www.mdpi.com/2673-6756/3/3/32">https://www.mdpi.com/2673-6756/3/3/32</a></p><p>Martineau, M. (2024). Distinguishing lawful and criminal hacker trajectories. <i>Journal of Cybercriminology</i>, 4(4), 45.<br /><a href="https://www.mdpi.com/2673-6756/4/4/45">https://www.mdpi.com/2673-6756/4/4/45</a></p><p><strong>Other:</strong><br />Dr Martineau wanted to share something called PRISMA (Preferred Reporting Items for Systematic reviews and Meta-Analyses) which is a helpful guideline designed to improve the reporting of systematic reviews. You can find out more about it here.   <br /><a href="http://www.prisma-statement.org/">http://www.prisma-statement.org</a></p>
]]></content:encoded>
      <enclosure length="32486574" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/5362284a-56bd-4b16-8a18-98d9dd4c84d3/audio/089b4ff8-b445-4174-94a6-815bcda3e326/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Human beneath the Hoodie: Profiling pathways into cybercrime</itunes:title>
      <itunes:author>Melissa Martineau</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/4899c21f-830d-4b86-95ba-9f9f16a2cf12/3000x3000/ep124.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:48</itunes:duration>
      <itunes:summary>What leads someone from early curiosity in technology to criminal hacking? Dr Melissa Martineau joins us to discuss cyber profiling, pathways into cyber dependent offending and what distinguishes those who drift toward crime from those who enter cybersecurity. We talk about motivations, early developmental factors and what her research reveals about opportunities for prevention and diversion.</itunes:summary>
      <itunes:subtitle>What leads someone from early curiosity in technology to criminal hacking? Dr Melissa Martineau joins us to discuss cyber profiling, pathways into cyber dependent offending and what distinguishes those who drift toward crime from those who enter cybersecurity. We talk about motivations, early developmental factors and what her research reveals about opportunities for prevention and diversion.</itunes:subtitle>
      <itunes:keywords>profiling, online crime, research, criminals, cybercrime, academic, pathways, cyber profiling, education, investigation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">38d9f3c3-ce67-4647-96b2-014cca6202f4</guid>
      <title>Courses, Clicks and Consequences: Empiricizing Enterprise Security</title>
      <description><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow them to perform the research in this setting.</li><li>Study setting and scope: eight-month randomised controlled trial at UC San Diego Health involving ~19,500 employees and ten distinct phishing campaign lures.</li><li>Annual awareness training: the study found no significant relationship between how recently staff completed the mandated course and their likelihood of failing a simulated phishing campaign.</li><li>Embedded training (when someone clicks a phishing simulation and is immediately redirected to training): the measurable improvement was very small (≈2% reduction in failure rate) and varied significantly by lure and engagement.</li><li>Engagement challenge: The vast majority of embedded-training sessions were extremely short or incomplete, a key factor in explaining limited effect size.</li><li>Variability of lure difficulty: Some phishing lures elicited very low click-rates (~1.8%) while others up to ~30.8%, indicating that the phishing stimulus matters as much as, or more than, the training intervention.</li></ul><p>Practical takeaway: Organizations should treat training (especially annually mandated modules) as only one part of a broader defence strategy, and design empirical measurement systems (including controls, realistic lures, and sustained engagement) before assuming large effect sizes.</p><p><strong>About our Guest:</strong></p><p>Dr Grant Ho Profile: <a href="https://cs.uchicago.edu/people/grant-ho/">https://cs.uchicago.edu/people/grant-ho/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Ho, G.; Mirian, A.; Luo, E.; Tong, K.; Lee, E.; Liu, L.; Longhurst, C.A.; Dameff, C.; Voelker, G.M. (2025). Understanding the Efficacy of Phishing Training in Practice: A Randomized Controlled Trial at a Large Health Organisation. Presented at the IEEE Symposium on Security & Privacy (May 2025). Full PDF: <a href="https://people.cs.uchicago.edu/~grantho/papers/oakland2025_phishing-training.pdf">https://people.cs.uchicago.edu/~grantho/papers/oakland2025_phishing-training.pdf</a></p><p><strong>Other: </strong></p><p>I mentioned some figures about the spending on cybercsecurity education and training, You can find those here.  </p><p>Canadian Survey of Cyber Security and Cybercrime (CSCSC)<br /><a href="https://www23.statcan.gc.ca/imdb/p2SV.pl?Function=getSurvey&SDDS=5244">https://www23.statcan.gc.ca/imdb/p2SV.pl?Function=getSurvey&SDDS=5244</a></p><p>Get convenient Excel Tables of the Statistics from 2017 and 2019. </p><p><a href="https://www.serene-risc.ca/en/statistics-canada">https://www.serene-risc.ca/en/statistics-canada</a></p><p><strong>Other Other:</strong></p><p>Dr Ho was great to chat with and has a long history of researching phishing, Some of his older work that is more technical in nature, as so we didn't talk about in the episode, but in the case that it  might be interesting to you, here are some links: </p><p>Ho, G., Sharma, A., Javed, M., Paxson, V., & Wagner, D. (2017). <i>Detecting Credential Spearphishing Attacks in Enterprise Settings.</i> In Proceedings of the 26th USENIX Security Symposium (USENIX Security ’17), Vancouver, BC, Canada, August 16-18, 2017. USENIX Association. ISBN 978-1-931971-40-9.<br />PDF: <a href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf?utm_source=chatgpt.com">https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf</a> <a href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf?utm_source=chatgpt.com" target="_blank">USENIX+2USENIX+2</a><br />Presentation page: <a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho">https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho</a><a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions?utm_source=chatgpt.com" target="_blank">USENIX+1</a></p><p>Ho, G., Cidon, A., Gavish, L., Schweighauser, M., Paxson, V., Savage, S., Voelker, G. M., & Wagner, D. (2019). <i>Detecting and Characterizing Lateral Phishing at Scale.</i> In Proceedings of the 28th USENIX Security Symposium (USENIX Security ’19), Santa Clara, CA, USA, August 14-16, 2019. USENIX Association. ISBN 978-1-939133-06-9.<br />PDF: <a href="https://www.usenix.org/system/files/sec19-ho.pdf?utm_source=chatgpt.com">https://www.usenix.org/system/files/sec19-ho.pdf</a> <a href="https://www.usenix.org/system/files/sec19-ho.pdf?utm_source=chatgpt.com" target="_blank">USENIX+1</a><br />Presentation page: <a href="https://www.usenix.org/conference/usenixsecurity19/presentation/ho">https://www.usenix.org/conference/usenixsecurity19/presentation/ho</a> <a href="https://www.usenix.org/conference/usenixsecurity19/technical-sessions?utm_source=chatgpt.com" target="_blank">USENIX</a></p>
]]></description>
      <pubDate>Sat, 1 Nov 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Grant Ho)</author>
      <link>https://cybercrimeology.com/episodes/courses-clicks-and-consequences-empiricizing-enterprise-security-PY_IFg9s</link>
      <content:encoded><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>Dr Ho describes an empirical research agenda focused on how security actually operates in organisations. He explains his experience with getting this research off the ground to allow them to perform the research in this setting.</li><li>Study setting and scope: eight-month randomised controlled trial at UC San Diego Health involving ~19,500 employees and ten distinct phishing campaign lures.</li><li>Annual awareness training: the study found no significant relationship between how recently staff completed the mandated course and their likelihood of failing a simulated phishing campaign.</li><li>Embedded training (when someone clicks a phishing simulation and is immediately redirected to training): the measurable improvement was very small (≈2% reduction in failure rate) and varied significantly by lure and engagement.</li><li>Engagement challenge: The vast majority of embedded-training sessions were extremely short or incomplete, a key factor in explaining limited effect size.</li><li>Variability of lure difficulty: Some phishing lures elicited very low click-rates (~1.8%) while others up to ~30.8%, indicating that the phishing stimulus matters as much as, or more than, the training intervention.</li></ul><p>Practical takeaway: Organizations should treat training (especially annually mandated modules) as only one part of a broader defence strategy, and design empirical measurement systems (including controls, realistic lures, and sustained engagement) before assuming large effect sizes.</p><p><strong>About our Guest:</strong></p><p>Dr Grant Ho Profile: <a href="https://cs.uchicago.edu/people/grant-ho/">https://cs.uchicago.edu/people/grant-ho/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Ho, G.; Mirian, A.; Luo, E.; Tong, K.; Lee, E.; Liu, L.; Longhurst, C.A.; Dameff, C.; Voelker, G.M. (2025). Understanding the Efficacy of Phishing Training in Practice: A Randomized Controlled Trial at a Large Health Organisation. Presented at the IEEE Symposium on Security & Privacy (May 2025). Full PDF: <a href="https://people.cs.uchicago.edu/~grantho/papers/oakland2025_phishing-training.pdf">https://people.cs.uchicago.edu/~grantho/papers/oakland2025_phishing-training.pdf</a></p><p><strong>Other: </strong></p><p>I mentioned some figures about the spending on cybercsecurity education and training, You can find those here.  </p><p>Canadian Survey of Cyber Security and Cybercrime (CSCSC)<br /><a href="https://www23.statcan.gc.ca/imdb/p2SV.pl?Function=getSurvey&SDDS=5244">https://www23.statcan.gc.ca/imdb/p2SV.pl?Function=getSurvey&SDDS=5244</a></p><p>Get convenient Excel Tables of the Statistics from 2017 and 2019. </p><p><a href="https://www.serene-risc.ca/en/statistics-canada">https://www.serene-risc.ca/en/statistics-canada</a></p><p><strong>Other Other:</strong></p><p>Dr Ho was great to chat with and has a long history of researching phishing, Some of his older work that is more technical in nature, as so we didn't talk about in the episode, but in the case that it  might be interesting to you, here are some links: </p><p>Ho, G., Sharma, A., Javed, M., Paxson, V., & Wagner, D. (2017). <i>Detecting Credential Spearphishing Attacks in Enterprise Settings.</i> In Proceedings of the 26th USENIX Security Symposium (USENIX Security ’17), Vancouver, BC, Canada, August 16-18, 2017. USENIX Association. ISBN 978-1-931971-40-9.<br />PDF: <a href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf?utm_source=chatgpt.com">https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf</a> <a href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-ho.pdf?utm_source=chatgpt.com" target="_blank">USENIX+2USENIX+2</a><br />Presentation page: <a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho">https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ho</a><a href="https://www.usenix.org/conference/usenixsecurity17/technical-sessions?utm_source=chatgpt.com" target="_blank">USENIX+1</a></p><p>Ho, G., Cidon, A., Gavish, L., Schweighauser, M., Paxson, V., Savage, S., Voelker, G. M., & Wagner, D. (2019). <i>Detecting and Characterizing Lateral Phishing at Scale.</i> In Proceedings of the 28th USENIX Security Symposium (USENIX Security ’19), Santa Clara, CA, USA, August 14-16, 2019. USENIX Association. ISBN 978-1-939133-06-9.<br />PDF: <a href="https://www.usenix.org/system/files/sec19-ho.pdf?utm_source=chatgpt.com">https://www.usenix.org/system/files/sec19-ho.pdf</a> <a href="https://www.usenix.org/system/files/sec19-ho.pdf?utm_source=chatgpt.com" target="_blank">USENIX+1</a><br />Presentation page: <a href="https://www.usenix.org/conference/usenixsecurity19/presentation/ho">https://www.usenix.org/conference/usenixsecurity19/presentation/ho</a> <a href="https://www.usenix.org/conference/usenixsecurity19/technical-sessions?utm_source=chatgpt.com" target="_blank">USENIX</a></p>
]]></content:encoded>
      <enclosure length="61916192" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/9f27b1b0-78ba-452f-bc3b-cb514531e544/audio/0a228311-84f4-46ca-a823-c8b51199dee5/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Courses, Clicks and Consequences: Empiricizing Enterprise Security</itunes:title>
      <itunes:author>Grant Ho</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/6fd3aec0-5114-460a-9a27-7fb123d045ef/3000x3000/ep123.jpg?aid=rss_feed"/>
      <itunes:duration>01:04:28</itunes:duration>
      <itunes:summary>We speak with Dr Grant Ho from the University of Chicago about a large-scale field evaluation of anti-phishing training inside a major health organisation. The conversation examines annual awareness training, embedded “teach-at-click” exercises, and the role that engagement plays in any observed benefit. We also discuss how to measure programme value realistically and why careful experimental design matters when organizations make investment decisions.</itunes:summary>
      <itunes:subtitle>We speak with Dr Grant Ho from the University of Chicago about a large-scale field evaluation of anti-phishing training inside a major health organisation. The conversation examines annual awareness training, embedded “teach-at-click” exercises, and the role that engagement plays in any observed benefit. We also discuss how to measure programme value realistically and why careful experimental design matters when organizations make investment decisions.</itunes:subtitle>
      <itunes:keywords>research, academic, training, phishing, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ba5ac13-fb92-4625-bf68-e43937230b33</guid>
      <title>The many minds of MITRE: building multidisciplinary human insider-risk research</title>
      <description><![CDATA[<p><i>Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. </i></p><p><strong>Episode Notes</strong></p><ul><li>Dr Caputo's path from social psychology to applied security, including intelligence analysis and building a behavioural-science team at MITRE.</li><li>What MITRE is: a not-for-profit operating six federally funded R&D centres that provide independent, public-interest research alongside government.</li><li>Why early “indicator” hunting on endpoints often chased the last bad case; shifting to experiments and known-bad/created-bad data to learn patterns of behaviour change.</li><li>The LinkedIn recruiter field experiment: ethically approved creation of recruiter personas, staged outreach in three messages, and follow-up interviews to understand reporting barriers.</li><li>What user-activity monitoring can and cannot tell you; the role of human judgement and programme design.</li><li>Insider-risk is not only “malicious users”: designing programmes for negligent, mistaken or outsmarted behaviours as well.</li><li>Current lines of work include improving employee recognition and reporting of malicious elicitations and exploring whether insider-risk telemetry offers early signals of suicide risk.</li><li>Why multidisciplinary teams beat solo efforts in insider-risk operations.</li></ul><p><strong>About our guest:</strong></p><p>Dr. Deanna D. Caputo</p><p> </p><p>MITRE Insider Threat Research & Solutions profile: <a href="https://insiderthreat.mitre.org/dr-caputo/">https://insiderthreat.mitre.org/dr-caputo/</a> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dr-deanna-d-caputo">https://www.linkedin.com/in/dr-deanna-d-caputo</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Caputo, D. D. (2024). Employee risk recognition and reporting of malicious elicitations: Longitudinal improvement with new skills-based training. Frontiers in Psychology. <a href="https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2024.1410426/full">https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2024.1410426/full</a> </p><p>MITRE Insider Threat Research & Solutions. (2025). Suicide risk and insider-risk telemetry overview. <a href="https://insiderthreat.mitre.org/suicide-risk/">https://insiderthreat.mitre.org/suicide-risk/</a> </p><p>MITRE. (2024). Managing insider threats is a team sport. <a href="https://www.mitre.org/news-insights/impact-story/managing-insider-threats-team-sport">https://www.mitre.org/news-insights/impact-story/managing-insider-threats-team-sport</a> </p><p>MITRE Insider Threat Research & Solutions. (2024). Capability overview two-pager (PDF). <a href="https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-CapabilityTwoPager-24-0659_2024-02-01.pdf">https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-CapabilityTwoPager-24-0659_2024-02-01.pdf</a> </p><p>MITRE Insider Threat Research & Solutions. (2024). Insider Threat Behavioural Risk Framework two-pager (PDF). <a href="https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-InTFramework_TwoPager-24-0674_2024-03-18.pdf">https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-InTFramework_TwoPager-24-0674_2024-03-18.pdf</a></p>
]]></description>
      <pubDate>Wed, 1 Oct 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Deanna Caputo)</author>
      <link>https://cybercrimeology.com/episodes/the-many-minds-of-mitre-building-multidisciplinary-human-insider-risk-research-IfgxUcBE</link>
      <content:encoded><![CDATA[<p><i>Trigger warning: This episode includes discussion of suicide in the context of researching measurable predictive indicators and the lack thereof in the context of cyber. </i></p><p><strong>Episode Notes</strong></p><ul><li>Dr Caputo's path from social psychology to applied security, including intelligence analysis and building a behavioural-science team at MITRE.</li><li>What MITRE is: a not-for-profit operating six federally funded R&D centres that provide independent, public-interest research alongside government.</li><li>Why early “indicator” hunting on endpoints often chased the last bad case; shifting to experiments and known-bad/created-bad data to learn patterns of behaviour change.</li><li>The LinkedIn recruiter field experiment: ethically approved creation of recruiter personas, staged outreach in three messages, and follow-up interviews to understand reporting barriers.</li><li>What user-activity monitoring can and cannot tell you; the role of human judgement and programme design.</li><li>Insider-risk is not only “malicious users”: designing programmes for negligent, mistaken or outsmarted behaviours as well.</li><li>Current lines of work include improving employee recognition and reporting of malicious elicitations and exploring whether insider-risk telemetry offers early signals of suicide risk.</li><li>Why multidisciplinary teams beat solo efforts in insider-risk operations.</li></ul><p><strong>About our guest:</strong></p><p>Dr. Deanna D. Caputo</p><p> </p><p>MITRE Insider Threat Research & Solutions profile: <a href="https://insiderthreat.mitre.org/dr-caputo/">https://insiderthreat.mitre.org/dr-caputo/</a> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/dr-deanna-d-caputo">https://www.linkedin.com/in/dr-deanna-d-caputo</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Caputo, D. D. (2024). Employee risk recognition and reporting of malicious elicitations: Longitudinal improvement with new skills-based training. Frontiers in Psychology. <a href="https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2024.1410426/full">https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2024.1410426/full</a> </p><p>MITRE Insider Threat Research & Solutions. (2025). Suicide risk and insider-risk telemetry overview. <a href="https://insiderthreat.mitre.org/suicide-risk/">https://insiderthreat.mitre.org/suicide-risk/</a> </p><p>MITRE. (2024). Managing insider threats is a team sport. <a href="https://www.mitre.org/news-insights/impact-story/managing-insider-threats-team-sport">https://www.mitre.org/news-insights/impact-story/managing-insider-threats-team-sport</a> </p><p>MITRE Insider Threat Research & Solutions. (2024). Capability overview two-pager (PDF). <a href="https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-CapabilityTwoPager-24-0659_2024-02-01.pdf">https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-CapabilityTwoPager-24-0659_2024-02-01.pdf</a> </p><p>MITRE Insider Threat Research & Solutions. (2024). Insider Threat Behavioural Risk Framework two-pager (PDF). <a href="https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-InTFramework_TwoPager-24-0674_2024-03-18.pdf">https://insiderthreat.mitre.org/wp-content/uploads/2024/06/MITREInTResearchSolutions-InTFramework_TwoPager-24-0674_2024-03-18.pdf</a></p>
]]></content:encoded>
      <enclosure length="42453385" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/ec8ad626-1c79-43bb-8518-4e19d83068c0/audio/14e5115d-7b90-40d7-963f-68489c315f05/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The many minds of MITRE: building multidisciplinary human insider-risk research</itunes:title>
      <itunes:author>Deanna Caputo</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/1e1235c9-7940-42eb-90d5-7c1d0cd770c7/3000x3000/ep122.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:11</itunes:duration>
      <itunes:summary>How do insider-risk programmes work when they are built around people, not just data? Dr Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities at MITRE, explains what multidisciplinary, human-centred insider-risk work looks like in real organisations, why user-activity data has limits, and how carefully designed field experiments can improve reporting and detection. We also touch on new research exploring whether typical insider-risk telemetry contains early indicators of suicide risk.</itunes:summary>
      <itunes:subtitle>How do insider-risk programmes work when they are built around people, not just data? Dr Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities at MITRE, explains what multidisciplinary, human-centred insider-risk work looks like in real organisations, why user-activity data has limits, and how carefully designed field experiments can improve reporting and detection. We also touch on new research exploring whether typical insider-risk telemetry contains early indicators of suicide risk.</itunes:subtitle>
      <itunes:keywords>prevention, academia, human-factor, insider threat, research, government, cybersecurity, behaviour</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb62bcfe-269a-4669-bf89-46f191e3a6e6</guid>
      <title>Follow the Honey: Experiments in Cybercriminal Decision-Making</title>
      <description><![CDATA[<p><strong>Show Notes:</strong></p><ul><li>Daniëlle began her academic path in psychology, later moving into criminology through her interest in decision making and online behaviour.</li><li>Her PhD research at NSCR focuses on <strong>cybercriminal decision making</strong>, using honeypots and experiments in real online environments.</li><li>Early experiments tested how different rewards affected access attempts on fake accounts.</li><li>A major focus has been on the impact of <i>Operation Cookie Monster</i> (2023), which disrupted the Genesis Market. Danielle’s work examined how this law enforcement operation influenced behaviour and moderation practices on hacker forums.</li><li>She emphasizes the value of <strong>experiments in the field</strong>, which allow researchers to test criminological theories with live offender behaviour, while balancing strict ethical and legal safeguards.</li></ul><p><strong>About our guest:</strong></p><p><strong>Danielle Stibbe</strong></p><ul><li>NSCR Profile Page: <a href="https://nscr.nl/en/medewerker/danielle-stibbe-msc/">https://nscr.nl/en/medewerker/danielle-stibbe-msc/</a></li><li>Google Scholar: <a href="https://scholar.google.com/citations?user=1fsHJEgAAAAJ&hl=en">https://scholar.google.com/citations?user=1fsHJEgAAAAJ&hl=en</a></li><li>LinkedIn: <a href="https://www.linkedin.com/in/danielle-stibbe/?originalSubdomain=nl">https://www.linkedin.com/in/danielle-stibbe/?originalSubdomain=nl</a></li></ul><p><strong>Papers or resources mentioned in this episode:</strong></p><ul><li>Onaolapo, J., Mariconti, E., & Stringhini, G. (2016). <i>What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild.</i> Proceedings of the 2016 Internet Measurement Conference. <a href="https://doi.org/10.1145/2987443.2987475">https://doi.org/10.1145/2987443.2987475</a></li><li>Europol (2023). <i>Operation Cookie Monster: Genesis Market taken down in coordinated international action.</i><a href="https://www.europol.europa.eu/media-press/newsroom/news/operation-cookie-monster-genesis-market-taken-down-in-coordinated-international-action">https://www.europol.europa.eu/media-press/newsroom/news/operation-cookie-monster-genesis-market-taken-down-in-coordinated-international-action</a></li><li>Oxford Handbook of Criminal Decision Making (2016). Eds. Bruinsma & Weisburd. Oxford University Press.</li></ul><p><strong>Other</strong>:</p><p>The open science framework <a href="https://osf.io">https://osf.io</a></p><p> </p>
]]></description>
      <pubDate>Mon, 1 Sep 2025 14:50:02 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Daniëlle Stibbe)</author>
      <link>https://cybercrimeology.com/episodes/follow-the-honey-experiments-in-cybercriminal-decision-making-tKBU8xqY</link>
      <content:encoded><![CDATA[<p><strong>Show Notes:</strong></p><ul><li>Daniëlle began her academic path in psychology, later moving into criminology through her interest in decision making and online behaviour.</li><li>Her PhD research at NSCR focuses on <strong>cybercriminal decision making</strong>, using honeypots and experiments in real online environments.</li><li>Early experiments tested how different rewards affected access attempts on fake accounts.</li><li>A major focus has been on the impact of <i>Operation Cookie Monster</i> (2023), which disrupted the Genesis Market. Danielle’s work examined how this law enforcement operation influenced behaviour and moderation practices on hacker forums.</li><li>She emphasizes the value of <strong>experiments in the field</strong>, which allow researchers to test criminological theories with live offender behaviour, while balancing strict ethical and legal safeguards.</li></ul><p><strong>About our guest:</strong></p><p><strong>Danielle Stibbe</strong></p><ul><li>NSCR Profile Page: <a href="https://nscr.nl/en/medewerker/danielle-stibbe-msc/">https://nscr.nl/en/medewerker/danielle-stibbe-msc/</a></li><li>Google Scholar: <a href="https://scholar.google.com/citations?user=1fsHJEgAAAAJ&hl=en">https://scholar.google.com/citations?user=1fsHJEgAAAAJ&hl=en</a></li><li>LinkedIn: <a href="https://www.linkedin.com/in/danielle-stibbe/?originalSubdomain=nl">https://www.linkedin.com/in/danielle-stibbe/?originalSubdomain=nl</a></li></ul><p><strong>Papers or resources mentioned in this episode:</strong></p><ul><li>Onaolapo, J., Mariconti, E., & Stringhini, G. (2016). <i>What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild.</i> Proceedings of the 2016 Internet Measurement Conference. <a href="https://doi.org/10.1145/2987443.2987475">https://doi.org/10.1145/2987443.2987475</a></li><li>Europol (2023). <i>Operation Cookie Monster: Genesis Market taken down in coordinated international action.</i><a href="https://www.europol.europa.eu/media-press/newsroom/news/operation-cookie-monster-genesis-market-taken-down-in-coordinated-international-action">https://www.europol.europa.eu/media-press/newsroom/news/operation-cookie-monster-genesis-market-taken-down-in-coordinated-international-action</a></li><li>Oxford Handbook of Criminal Decision Making (2016). Eds. Bruinsma & Weisburd. Oxford University Press.</li></ul><p><strong>Other</strong>:</p><p>The open science framework <a href="https://osf.io">https://osf.io</a></p><p> </p>
]]></content:encoded>
      <enclosure length="29699013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/5684ee9a-48f1-49f1-af8b-51ac205878d8/audio/11890998-d3c4-4e63-96ec-3cabd931a414/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Follow the Honey: Experiments in Cybercriminal Decision-Making</itunes:title>
      <itunes:author>Daniëlle Stibbe</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/3a53e482-4afa-4b6a-a9c8-82cf29aeda2c/3000x3000/ep121.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:54</itunes:duration>
      <itunes:summary>How do cybercriminals decide which targets to pursue, and how can researchers study these decisions in real time? In this episode, we talk with **Daniëlle Stibbe** a PhD Candidate and researcher at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR). Daniëlle shares her journey from psychology to criminology and explains her work using honeypots, leaked credentials, and online experiments to examine offender behaviour.

We also discuss the challenges of running experiments in  digital environments, and what her work on the impact of large-scale police operations like *Operation Cookie Monster* reveal about risk perception and adaptation in online criminal forums.</itunes:summary>
      <itunes:subtitle>How do cybercriminals decide which targets to pursue, and how can researchers study these decisions in real time? In this episode, we talk with **Daniëlle Stibbe** a PhD Candidate and researcher at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR). Daniëlle shares her journey from psychology to criminology and explains her work using honeypots, leaked credentials, and online experiments to examine offender behaviour.

We also discuss the challenges of running experiments in  digital environments, and what her work on the impact of large-scale police operations like *Operation Cookie Monster* reveal about risk perception and adaptation in online criminal forums.</itunes:subtitle>
      <itunes:keywords>hacker forums, research, cybercrime, cookie monster, hackers, law enforcement, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77d386e5-a741-4032-9b63-58dc39f8f89a</guid>
      <title>Crime Online: Hashtag Like and Subscribe, or don&apos;t</title>
      <description><![CDATA[<h3><strong>Episode Notes</strong></h3><h3><strong>About our guest:</strong></h3><p><strong>Dr. Francesco Carlo Campisi</strong></p><p>PhD in Criminology, Université de Montréal</p><p>Researcher, International Centre for Comparative Criminology</p><p>🔗 <a href="https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/carlo-campisi">https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/carlo-campisi</a></p><p>🔗 <a href="https://www.linkedin.com/in/francesco-carlo-campisi-aa3576125/">https://www.linkedin.com/in/francesco-carlo-campisi-aa3576125/</a></p><h3><strong>Topics discussed in this episode:</strong></h3><ul><li>From street gangs to digital deviance: a research trajectory</li><li>Why “recruitment” doesn’t fit how modern movements grow</li><li>How groups like QAnon and Anonymous influence participation online</li><li>Using social media metrics to measure engagement</li><li>Emotional capital, visibility, and symbolic participation</li><li>Updating resource mobilization theory for digital contexts</li><li>Hashtag hijacking and online visibility strategies</li><li>Stochastic terrorism and the challenge of lone-wolf violence</li></ul><h3><strong>Papers or resources mentioned in this episode:</strong></h3><ul><li>Campisi, F. (2024). <i>Unveiling the digital underworld – Exploring cyberbanging and recruitment of Canadian street gang members on social media</i>. <i>Canadian Journal of Criminology and Criminal Justice</i>, 66. <a href="https://doi.org/10.3138/cjccj-2023-0033">https://doi.org/10.3138/cjccj-2023-0033</a></li><li>Campisi, F., Fortin, F., & Néron, M.-E. (2022). <i>Hacktivists from the inside: Collective identity, target selection and tactical use of media during the Quebec Maple Spring protests</i>. Presented at the ICCC Symposium. <a href="https://www.researchgate.net/profile/Francesco_Campisi2">Available on ResearchGate</a></li><li>Campisi, F., & Beauregard, E. (2025). <i>QAnon’s use of hashtag hijacking on X and its impact on online engagement</i>. SSRN preprint. Link</li><li>McCarthy, J. D., & Zald, M. N. (1977). <i>Resource mobilization and social movements: A partial theory</i>. <i>American Journal of Sociology</i>, 82(6), 1212–1241.</li><li>Vigil, J. D. (1988). <i>Barrio gangs: Street life and identity in Southern California</i>. University of Texas Press. <a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/barrio-gangs-street-life-and-identity-southern-california-0">https://www.ojp.gov/ncjrs/virtual-library/abstracts/barrio-gangs-street-life-and-identity-southern-california-0</a></li></ul><p>Other:</p><p>If you are curious about the video that was taken down, you should watch this video.</p><p><a href="https://www.youtube.com/watch?v=PIyrzMThHq8">https://www.youtube.com/watch?v=PIyrzMThHq8</a></p>
]]></description>
      <pubDate>Fri, 1 Aug 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/crime-online-like-and-subscribe-or-dont-Egi2ze7r</link>
      <content:encoded><![CDATA[<h3><strong>Episode Notes</strong></h3><h3><strong>About our guest:</strong></h3><p><strong>Dr. Francesco Carlo Campisi</strong></p><p>PhD in Criminology, Université de Montréal</p><p>Researcher, International Centre for Comparative Criminology</p><p>🔗 <a href="https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/carlo-campisi">https://www.cicc-iccc.org/fr/personnes/etudiants-supervises/carlo-campisi</a></p><p>🔗 <a href="https://www.linkedin.com/in/francesco-carlo-campisi-aa3576125/">https://www.linkedin.com/in/francesco-carlo-campisi-aa3576125/</a></p><h3><strong>Topics discussed in this episode:</strong></h3><ul><li>From street gangs to digital deviance: a research trajectory</li><li>Why “recruitment” doesn’t fit how modern movements grow</li><li>How groups like QAnon and Anonymous influence participation online</li><li>Using social media metrics to measure engagement</li><li>Emotional capital, visibility, and symbolic participation</li><li>Updating resource mobilization theory for digital contexts</li><li>Hashtag hijacking and online visibility strategies</li><li>Stochastic terrorism and the challenge of lone-wolf violence</li></ul><h3><strong>Papers or resources mentioned in this episode:</strong></h3><ul><li>Campisi, F. (2024). <i>Unveiling the digital underworld – Exploring cyberbanging and recruitment of Canadian street gang members on social media</i>. <i>Canadian Journal of Criminology and Criminal Justice</i>, 66. <a href="https://doi.org/10.3138/cjccj-2023-0033">https://doi.org/10.3138/cjccj-2023-0033</a></li><li>Campisi, F., Fortin, F., & Néron, M.-E. (2022). <i>Hacktivists from the inside: Collective identity, target selection and tactical use of media during the Quebec Maple Spring protests</i>. Presented at the ICCC Symposium. <a href="https://www.researchgate.net/profile/Francesco_Campisi2">Available on ResearchGate</a></li><li>Campisi, F., & Beauregard, E. (2025). <i>QAnon’s use of hashtag hijacking on X and its impact on online engagement</i>. SSRN preprint. Link</li><li>McCarthy, J. D., & Zald, M. N. (1977). <i>Resource mobilization and social movements: A partial theory</i>. <i>American Journal of Sociology</i>, 82(6), 1212–1241.</li><li>Vigil, J. D. (1988). <i>Barrio gangs: Street life and identity in Southern California</i>. University of Texas Press. <a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/barrio-gangs-street-life-and-identity-southern-california-0">https://www.ojp.gov/ncjrs/virtual-library/abstracts/barrio-gangs-street-life-and-identity-southern-california-0</a></li></ul><p>Other:</p><p>If you are curious about the video that was taken down, you should watch this video.</p><p><a href="https://www.youtube.com/watch?v=PIyrzMThHq8">https://www.youtube.com/watch?v=PIyrzMThHq8</a></p>
]]></content:encoded>
      <enclosure length="28740145" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c4d42658-0a3d-4e67-a96e-ca42b9c641ee/audio/4cb3e042-b2ba-46bb-b602-9e90e6c293af/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Crime Online: Hashtag Like and Subscribe, or don&apos;t</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/8ae90274-d57b-4eb5-88dc-2dcdf6631625/3000x3000/ep120.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:54</itunes:duration>
      <itunes:summary>What does influence look like when there are no formal memberships, no application processes, and no leaders? In this episode, Dr. Francesco Carlo Campisi shares insights from his doctoral research on how deviant online movements like Anonymous and QAnon mobilize participation using social media. We talk about emotional engagement, visibility as a resource, and how theory can help us understand participation in loosely organized but powerful digital collectives.</itunes:summary>
      <itunes:subtitle>What does influence look like when there are no formal memberships, no application processes, and no leaders? In this episode, Dr. Francesco Carlo Campisi shares insights from his doctoral research on how deviant online movements like Anonymous and QAnon mobilize participation using social media. We talk about emotional engagement, visibility as a resource, and how theory can help us understand participation in loosely organized but powerful digital collectives.</itunes:subtitle>
      <itunes:keywords>crime, gangs, research, hactivism, cybercrime, academic, manosphere, groups, education, influence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8cecc3e6-18d0-48ad-b5ec-07cfb3673d61</guid>
      <title>The Human in_security - deception, weapons, crime &amp; culture</title>
      <description><![CDATA[<p><strong>About our guest:</strong></p><p>Dr. Iain Reid</p><p>Senior Lecturer in Cybercrime</p><p>University of Portsmouth</p><p><a href="https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid">https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid</a></p><p> </p><p><strong>Topics discussed in this episode:</strong></p><ul><li>How principles of military deception map onto cybersecurity</li><li>Why the phrase <i>“the human is the weakest link”</i> oversimplifies risk</li><li>What it’s like to research developer perspectives on secure software</li><li>The psychology of decision-making in phishing attacks</li><li>How time pressure influences risky digital behaviour</li><li>The limits of “security culture” as an organizational solution</li><li>How cyber deception fits within defence-in-depth</li></ul><p> </p><p><strong>Papers or resources mentioned:</strong></p><p>Reid, I., Okeke-Ramos, A., & Serafin, M. (2024). Exploring the ethics of cyber deception technologies for defensive cyber deception. In P. Bednar, J. Kävrestad, E. Bergström, M. Rajanen, H. V. Hult, A. M. Braccini, A. S. Islind, & F. Zaghloul (Eds.), Proceedings of the 10th International Conference on Socio-Technical Perspectives in Information Systems (STPIS 2024) (pp. 140-148). (CEUR Workshop Proceedings). <a href="https://ceur-ws.org/Vol-3857">https://ceur-ws.org/Vol-3857</a></p><p>Whaley, B. (2007). <i>Stratagem: deception and surprise in war</i>. Artech.</p><p>Rowe, N.C., Rrushi, J. (2016). Measuring Deception. In: Introduction to Cyberdeception. Springer, Cham. <a href="https://doi.org/10.1007/978-3-319-41187-3_11">https://doi.org/10.1007/978-3-319-41187-3_11</a></p><p>Ashenden, D., Ollis, G., & Reid, I. (2022, October). Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. In <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering</i> (pp. 1-9).</p><p>Paris Call for Trust and Security in Cyberspace</p><p><a href="https://pariscall.international/">https://pariscall.international</a></p><p> </p><p><strong>Other</strong></p><p>I would like to thank Dudley the French Bulldog for the invaluable (unavoidable) contribution to this episode.</p>
]]></description>
      <pubDate>Tue, 1 Jul 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/the-human-in-security-deception-weapons-crime-culture-7NBb6hrH</link>
      <content:encoded><![CDATA[<p><strong>About our guest:</strong></p><p>Dr. Iain Reid</p><p>Senior Lecturer in Cybercrime</p><p>University of Portsmouth</p><p><a href="https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid">https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/iain-reid</a></p><p> </p><p><strong>Topics discussed in this episode:</strong></p><ul><li>How principles of military deception map onto cybersecurity</li><li>Why the phrase <i>“the human is the weakest link”</i> oversimplifies risk</li><li>What it’s like to research developer perspectives on secure software</li><li>The psychology of decision-making in phishing attacks</li><li>How time pressure influences risky digital behaviour</li><li>The limits of “security culture” as an organizational solution</li><li>How cyber deception fits within defence-in-depth</li></ul><p> </p><p><strong>Papers or resources mentioned:</strong></p><p>Reid, I., Okeke-Ramos, A., & Serafin, M. (2024). Exploring the ethics of cyber deception technologies for defensive cyber deception. In P. Bednar, J. Kävrestad, E. Bergström, M. Rajanen, H. V. Hult, A. M. Braccini, A. S. Islind, & F. Zaghloul (Eds.), Proceedings of the 10th International Conference on Socio-Technical Perspectives in Information Systems (STPIS 2024) (pp. 140-148). (CEUR Workshop Proceedings). <a href="https://ceur-ws.org/Vol-3857">https://ceur-ws.org/Vol-3857</a></p><p>Whaley, B. (2007). <i>Stratagem: deception and surprise in war</i>. Artech.</p><p>Rowe, N.C., Rrushi, J. (2016). Measuring Deception. In: Introduction to Cyberdeception. Springer, Cham. <a href="https://doi.org/10.1007/978-3-319-41187-3_11">https://doi.org/10.1007/978-3-319-41187-3_11</a></p><p>Ashenden, D., Ollis, G., & Reid, I. (2022, October). Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. In <i>Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering</i> (pp. 1-9).</p><p>Paris Call for Trust and Security in Cyberspace</p><p><a href="https://pariscall.international/">https://pariscall.international</a></p><p> </p><p><strong>Other</strong></p><p>I would like to thank Dudley the French Bulldog for the invaluable (unavoidable) contribution to this episode.</p>
]]></content:encoded>
      <enclosure length="26543652" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/da1b8164-efec-4a5a-bc09-49c6eee6afbe/audio/d89427b7-c2be-4098-ab6f-858681cae81d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Human in_security - deception, weapons, crime &amp; culture</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9da35686-624b-4c0e-8a4b-8fbd0bbe2f08/3000x3000/ep119.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:37</itunes:duration>
      <itunes:summary>In this episode we have a wide ranging discussion on the human in cybersecurity with Dr. Iain Reid from the University of Portsmouth. We get into the application of psychology to cybersecurity including  deception, risk perception, and responsibility  We talk about who carries the burden of defence, how software developers think about security, and what deception looks like in both cybercrime and cyberwarfare. </itunes:summary>
      <itunes:subtitle>In this episode we have a wide ranging discussion on the human in cybersecurity with Dr. Iain Reid from the University of Portsmouth. We get into the application of psychology to cybersecurity including  deception, risk perception, and responsibility  We talk about who carries the burden of defence, how software developers think about security, and what deception looks like in both cybercrime and cyberwarfare. </itunes:subtitle>
      <itunes:keywords>academia, human-factor, deception, research, phishing, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec04b080-9ac4-4998-bd6e-b71480876c83</guid>
      <title>Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques</title>
      <description><![CDATA[<h3><strong>In this episode:</strong></h3><ul><li>How Estelle became involved in ransomware research between degrees</li><li>The scale and origin of the ContiLeaks dataset</li><li>Using machine learning and topic modelling to analyse criminal group communications</li><li>What the internal chat data revealed about the organizational structure of Conti</li><li>Surprising insights about roles, specializations, and tasking within a criminal enterprise</li><li>Why making cybercrime research accessible through data visualization matters</li></ul><h3><strong>About our guest:</strong></h3><p><strong>Estelle Ruellan</strong></p><ul><li><a href="https://www.linkedin.com/in/estelle-ruellan/">https://www.linkedin.com/in/estelle-ruellan/</a></li></ul><h3><strong>Papers or resources mentioned in this episode:</strong></h3><p><strong>Ruellan, E., Paquet-Clouston, M., & Garcia, S. (2024).</strong><i>Conti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning</i>. <strong>Crime Science, 13</strong>, 16. <a href="https://doi.org/10.1186/s40163-024-00212-y">https://doi.org/10.1186/s40163-024-00212-y</a></p><p><strong>Flare Data Explorer</strong> – Explore cybercrime datasets visually:</p><p><a href="https://flare.io/flare-data-explorer/">https://flare.io/flare-data-explorer/</a></p><h3><strong>Other:</strong></h3><ul><li>Wikipedia – Conti (ransomware): <a href="https://en.wikipedia.org/wiki/Conti_(ransomware)">https://en.wikipedia.org/wiki/Conti_(ransomware)</a></li><li>Wikipedia – Topic model: <a href="https://en.wikipedia.org/wiki/Topic_model">https://en.wikipedia.org/wiki/Topic_model</a></li></ul>
]]></description>
      <pubDate>Sun, 1 Jun 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Estelle Ruellan)</author>
      <link>https://cybercrimeology.com/episodes/visualizing-conti-revealing-the-business-of-ransomware-as-a-service-through-new-analytical-techniques-Q36UDCkt</link>
      <content:encoded><![CDATA[<h3><strong>In this episode:</strong></h3><ul><li>How Estelle became involved in ransomware research between degrees</li><li>The scale and origin of the ContiLeaks dataset</li><li>Using machine learning and topic modelling to analyse criminal group communications</li><li>What the internal chat data revealed about the organizational structure of Conti</li><li>Surprising insights about roles, specializations, and tasking within a criminal enterprise</li><li>Why making cybercrime research accessible through data visualization matters</li></ul><h3><strong>About our guest:</strong></h3><p><strong>Estelle Ruellan</strong></p><ul><li><a href="https://www.linkedin.com/in/estelle-ruellan/">https://www.linkedin.com/in/estelle-ruellan/</a></li></ul><h3><strong>Papers or resources mentioned in this episode:</strong></h3><p><strong>Ruellan, E., Paquet-Clouston, M., & Garcia, S. (2024).</strong><i>Conti Inc.: understanding the internal discussions of a large ransomware-as-a-service operator with machine learning</i>. <strong>Crime Science, 13</strong>, 16. <a href="https://doi.org/10.1186/s40163-024-00212-y">https://doi.org/10.1186/s40163-024-00212-y</a></p><p><strong>Flare Data Explorer</strong> – Explore cybercrime datasets visually:</p><p><a href="https://flare.io/flare-data-explorer/">https://flare.io/flare-data-explorer/</a></p><h3><strong>Other:</strong></h3><ul><li>Wikipedia – Conti (ransomware): <a href="https://en.wikipedia.org/wiki/Conti_(ransomware)">https://en.wikipedia.org/wiki/Conti_(ransomware)</a></li><li>Wikipedia – Topic model: <a href="https://en.wikipedia.org/wiki/Topic_model">https://en.wikipedia.org/wiki/Topic_model</a></li></ul>
]]></content:encoded>
      <enclosure length="26755204" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/6e517258-6e62-4994-8fc1-fb04a3a2b77c/audio/92b01188-245a-45f2-bb84-09f2365684df/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques</itunes:title>
      <itunes:author>Estelle Ruellan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/21a3b9a9-e993-40aa-b13e-09c3d956ebe7/3000x3000/ep118.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:50</itunes:duration>
      <itunes:summary>What can leaked internal messages from a ransomware group reveal about how cybercrime operations really work? In this episode, Estelle Ruellan discusses the analysis of the tens of thousands of chat messages leaked from the Conti ransomware group she created with colleagues. They to mapped the internal roles and communication patterns of this group using natural language processing and Latent Dirichlet Allocation analysis to better understand this notorious ransomware-as-a-service outfits. We explore this interesting analysis method, what it uncovered, and howMs Ruellan’s quest to make cybercrime more understandable with data visualization.</itunes:summary>
      <itunes:subtitle>What can leaked internal messages from a ransomware group reveal about how cybercrime operations really work? In this episode, Estelle Ruellan discusses the analysis of the tens of thousands of chat messages leaked from the Conti ransomware group she created with colleagues. They to mapped the internal roles and communication patterns of this group using natural language processing and Latent Dirichlet Allocation analysis to better understand this notorious ransomware-as-a-service outfits. We explore this interesting analysis method, what it uncovered, and howMs Ruellan’s quest to make cybercrime more understandable with data visualization.</itunes:subtitle>
      <itunes:keywords>conti, research, cybercrime, organized crime, ransomware, cybersecurity, raas, education, research methods</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">80cf02fe-9b20-48ff-a3f4-473ce93a13ba</guid>
      <title>Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><ul><li>Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.</li><li>Sarah Eaton and Sabina Alam first collaborated through COPE (Committee on Publication Ethics) and later worked together in United2Act, an international initiative focused on tackling paper mills.</li><li>The conversation draws parallels between scientific paper mills and contract cheating in higher education, both of which undermine academic integrity for financial gain.</li><li>Eaton and Alam discuss how metrics-based performance systems in universities and publishing environments create conditions ripe for abuse.</li><li>Publishers and universities historically avoided transparency, but the scale of the problem has led to greater collaboration between stakeholders.</li><li>The duo share insights into early warning signs of fraudulent submissions and describe the development of technological and administrative countermeasures.</li><li>Particular attention is given to the harm paper mills cause: from corrupting citation networks to potentially endangering lives with fabricated data in medical journals.</li><li>The “Andrew Vickers Curse” is discussed as a case study illustrating how citation manipulation by paper mills can entangle innocent researchers.</li><li>The episode closes with a call for broader participation in the second phase of United2Act, particularly from research funders, IT specialists, and institutional stakeholders.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Sarah Elaine Eaton</p><p><a href="https://profiles.ucalgary.ca/sarah-eaton">https://profiles.ucalgary.ca/sarah-eaton</a></p><p><a href="https://drsaraheaton.com/about/">https://drsaraheaton.com/about/</a></p><p><strong>Dr. Sabina Alam</strong></p><p><a href="https://www.taylorandfrancis.com/about/ethics-integrity/"><strong>https://www.taylorandfrancis.com/about/ethics-integrity/</strong></a></p><p><a href="https://www.csescienceeditor.org/article/dr-sabina-alam-shaping-critical-thinking-about-science/"><strong>https://www.csescienceeditor.org/article/dr-sabina-alam-shaping-critical-thinking-about-science/</strong></a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>United2Act initiative: <a href="https://united2act.org/">https://united2act.org</a></p><p>Magazinov, Alexander. (2023). <i>The Andrew Vickers Curse: secret revealed!, For Better Science</i></p><p>https://forbetterscience.com/2023/07/31/the-vickers-curse-secret-revealed/</p><p> </p><p><strong>Other:</strong></p><p><strong>Glossary of terms and acronyms:</strong></p><ul><li><strong>COPE</strong> – <i>Committee on Publication Ethics</i>: An international body that provides advice to editors and publishers on all aspects of publication ethics.</li><li><strong>STM</strong> – <i>International Association of Scientific, Technical and Medical Publishers</i>: A global trade association supporting academic publishing and information dissemination.</li><li><strong>Q1/Q2 Journal</strong> – Journals ranked in the top (Q1) or second (Q2) quartile based on impact metrics such as citation counts or journal reputation.</li><li><strong>Term paper mill</strong> – A business that sells pre-written or custom academic papers, often used in contract cheating by students.</li><li><strong>Contract cheating</strong> – A form of academic dishonesty where students outsource assessments to third parties.</li><li><strong>Retraction</strong> – The removal of a published article from the scientific record, typically due to error or misconduct.</li><li><strong>Desk reject</strong> – When a manuscript is rejected by a journal editor before it is sent out for peer review.</li><li><strong>Citation ring</strong> – A group of papers or authors who cite each other extensively to artificially inflate citation metrics.</li><li><strong>Paper Mills -</strong> Organisations or individuals that aim to profit from the creation, sale, peer review and/or citation of manuscripts at scale which contain low value or fraudulent content and/or authorship, with the aim of publication in scholarly journals.</li></ul><p>A big thank you to the United2Act people for coming out of their comfort zone and chatting to me about this.  This bravery is how science as an interdisciplinary pursuit driven by curiosity and collaboration happens.  </p>
]]></description>
      <pubDate>Thu, 1 May 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Sarah Eaton, Sabina Alam)</author>
      <link>https://cybercrimeology.com/episodes/fake-it-until-you-break-it-the-pay-to-publish-paper-mills-exploiting-the-over-metrification-of-science-taDBZw8g</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><ul><li>Paper mills are fraudulent commercial enterprises that fabricate scientific papers and sell authorship, citations, and other academic credentials—often at scale.</li><li>Sarah Eaton and Sabina Alam first collaborated through COPE (Committee on Publication Ethics) and later worked together in United2Act, an international initiative focused on tackling paper mills.</li><li>The conversation draws parallels between scientific paper mills and contract cheating in higher education, both of which undermine academic integrity for financial gain.</li><li>Eaton and Alam discuss how metrics-based performance systems in universities and publishing environments create conditions ripe for abuse.</li><li>Publishers and universities historically avoided transparency, but the scale of the problem has led to greater collaboration between stakeholders.</li><li>The duo share insights into early warning signs of fraudulent submissions and describe the development of technological and administrative countermeasures.</li><li>Particular attention is given to the harm paper mills cause: from corrupting citation networks to potentially endangering lives with fabricated data in medical journals.</li><li>The “Andrew Vickers Curse” is discussed as a case study illustrating how citation manipulation by paper mills can entangle innocent researchers.</li><li>The episode closes with a call for broader participation in the second phase of United2Act, particularly from research funders, IT specialists, and institutional stakeholders.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Sarah Elaine Eaton</p><p><a href="https://profiles.ucalgary.ca/sarah-eaton">https://profiles.ucalgary.ca/sarah-eaton</a></p><p><a href="https://drsaraheaton.com/about/">https://drsaraheaton.com/about/</a></p><p><strong>Dr. Sabina Alam</strong></p><p><a href="https://www.taylorandfrancis.com/about/ethics-integrity/"><strong>https://www.taylorandfrancis.com/about/ethics-integrity/</strong></a></p><p><a href="https://www.csescienceeditor.org/article/dr-sabina-alam-shaping-critical-thinking-about-science/"><strong>https://www.csescienceeditor.org/article/dr-sabina-alam-shaping-critical-thinking-about-science/</strong></a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>United2Act initiative: <a href="https://united2act.org/">https://united2act.org</a></p><p>Magazinov, Alexander. (2023). <i>The Andrew Vickers Curse: secret revealed!, For Better Science</i></p><p>https://forbetterscience.com/2023/07/31/the-vickers-curse-secret-revealed/</p><p> </p><p><strong>Other:</strong></p><p><strong>Glossary of terms and acronyms:</strong></p><ul><li><strong>COPE</strong> – <i>Committee on Publication Ethics</i>: An international body that provides advice to editors and publishers on all aspects of publication ethics.</li><li><strong>STM</strong> – <i>International Association of Scientific, Technical and Medical Publishers</i>: A global trade association supporting academic publishing and information dissemination.</li><li><strong>Q1/Q2 Journal</strong> – Journals ranked in the top (Q1) or second (Q2) quartile based on impact metrics such as citation counts or journal reputation.</li><li><strong>Term paper mill</strong> – A business that sells pre-written or custom academic papers, often used in contract cheating by students.</li><li><strong>Contract cheating</strong> – A form of academic dishonesty where students outsource assessments to third parties.</li><li><strong>Retraction</strong> – The removal of a published article from the scientific record, typically due to error or misconduct.</li><li><strong>Desk reject</strong> – When a manuscript is rejected by a journal editor before it is sent out for peer review.</li><li><strong>Citation ring</strong> – A group of papers or authors who cite each other extensively to artificially inflate citation metrics.</li><li><strong>Paper Mills -</strong> Organisations or individuals that aim to profit from the creation, sale, peer review and/or citation of manuscripts at scale which contain low value or fraudulent content and/or authorship, with the aim of publication in scholarly journals.</li></ul><p>A big thank you to the United2Act people for coming out of their comfort zone and chatting to me about this.  This bravery is how science as an interdisciplinary pursuit driven by curiosity and collaboration happens.  </p>
]]></content:encoded>
      <enclosure length="38314050" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/ecd27e2c-beec-4658-a41b-aa9228ea4fde/audio/07c4f24c-4f6b-4f4f-8d70-695fa7e80c82/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science</itunes:title>
      <itunes:author>Sarah Eaton, Sabina Alam</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/d4d92c35-f0c2-49e9-adb3-815afc4d261b/3000x3000/ep117.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:53</itunes:duration>
      <itunes:summary>When fake science can be bought, what happens to the value of real research? Dr. Sarah Eaton from the University of Calgary and Dr. Sabina Alam from Taylor &amp; Francis discuss the collaborative efforts of United2Act.org to combat the global threat of scientific paper mills. We explore what these organizations are, how they operate, and what can be done to push back against fraudulent publishing in the digital age.</itunes:summary>
      <itunes:subtitle>When fake science can be bought, what happens to the value of real research? Dr. Sarah Eaton from the University of Calgary and Dr. Sabina Alam from Taylor &amp; Francis discuss the collaborative efforts of United2Act.org to combat the global threat of scientific paper mills. We explore what these organizations are, how they operate, and what can be done to push back against fraudulent publishing in the digital age.</itunes:subtitle>
      <itunes:keywords>academia, publish or perish, research, cybercrime, ethics, science, publishing, research integrity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f427b7f5-444d-4882-8640-7141dbe4c625</guid>
      <title>DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design</title>
      <description><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li><strong>Dr. Reeves’ Background</strong> – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.</li><li><strong>Cybersecurity Fatigue Defined</strong> – A form of disengagement where employees lose motivation to follow security practices due to overload and conflicting advice.</li><li><strong>Not Just Apathy</strong> – Fatigue often affects people who initially cared about cybersecurity but were worn down by excessive or ineffective interventions.</li><li><strong>Training Shortcomings</strong> – Lecture-style, one-way training is frequently perceived as boring, irrelevant, or contradictory to users' experiences.</li><li><strong>Compliance vs. Effectiveness</strong> – Many organizations implement security training to meet legal requirements, even if it fails to change behavior.</li><li><strong>Reactance in Security</strong> – Users may intentionally ignore advice or rules to assert control, especially when training feels micromanaging or patronizing.</li><li><strong>Better Through Design</strong> – Reeves argues that secure systems should reduce the need for user decisions by simplifying or removing risky options altogether.</li><li><strong>Remove Rather Than Train</strong> – Limiting administrative rights is often more effective than trying to educate users out of risky behaviors.</li><li><strong>Mismatch With Reality</strong> – Generic training that conflicts with real policies or system restrictions can confuse or alienate users.</li><li><strong>Cognitive Load and Decision-Making</strong> – Under stress or fatigue, users rely on mental shortcuts (heuristics), which attackers exploit.</li><li><strong>Personal Example of Being Fooled</strong> – Reeves recounts nearly falling for a scam due to time pressure, illustrating how stress weakens judgment.</li><li><strong>Cybersecurity Buddy System</strong> – Recommends encouraging users to consult peers when making sensitive decisions, especially under pressure.</li><li><strong>Cyber Deception Strategies</strong> – Reeves now researches ways to mislead and trap attackers inside systems using decoys and tripwires.</li><li><strong>Applying Psychology to Attackers</strong> – The same behavioral models used to study users can help predict and manipulate attacker behavior.</li><li><strong>Empowering Defenders</strong> – Deception technologies can help security teams regain a sense of agency, shifting from reactive defense to proactive engagemen</li></ul><p><strong>About our guest:</strong></p><p>Dr. Andrew Reeves</p><ul><li><a href="https://www.linkedin.com/in/andrewreevescyber/">https://www.linkedin.com/in/andrewreevescyber/</a></li><li><a href="https://research.unsw.edu.au/people/dr-andrew-reeves">https://research.unsw.edu.au/people/dr-andrew-reeves</a></li><li><a href="https://www.unsw.edu.au/research/ifcyber">https://www.unsw.edu.au/research/ifcyber</a></li></ul><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Reeves, A., Delfabbro, P., & Calic, D. (2021). <i>Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue</i>. SAGE Open, 11(1).</p><p><a href="https://doi.org/10.1177/21582440211000049">https://doi.org/10.1177/21582440211000049</a></p><p>Reeves, A., Calic, D., & Delfabbro, P. (2023). <i>Generic and unusable: Understanding employee perceptions of cybersecurity training and measuring advice fatigue</i>. Computers & Security, 128, 103137.</p><p><a href="https://doi.org/10.1016/j.cose.2023.103137">https://doi.org/10.1016/j.cose.2023.103137</a></p><p>Reeves, A., & Ashenden, D. (2023). <i>Understanding decision making in security operations centres: Building the case for cyber deception technology</i>. Frontiers in Psychology, 14, 1165705.</p><p><a href="https://doi.org/10.3389/fpsyg.2023.1165705">https://doi.org/10.3389/fpsyg.2023.1165705</a></p><p><strong>Other:</strong></p><p>UNSW Institute for Cyber Security (IFCYBER)</p><p><a href="https://www.unsw.edu.au/research/ifcyber">https://www.unsw.edu.au/research/ifcyber</a></p>
]]></description>
      <pubDate>Tue, 1 Apr 2025 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Andrew Reeves)</author>
      <link>https://cybercrimeology.com/episodes/dereact-defatigue-and-deceive-psychology-for-better-cybersecurity-design-rUQHn0vq</link>
      <content:encoded><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li><strong>Dr. Reeves’ Background</strong> – Trained as a psychologist, his interest in cybersecurity emerged from a talk connecting human error to security breaches.</li><li><strong>Cybersecurity Fatigue Defined</strong> – A form of disengagement where employees lose motivation to follow security practices due to overload and conflicting advice.</li><li><strong>Not Just Apathy</strong> – Fatigue often affects people who initially cared about cybersecurity but were worn down by excessive or ineffective interventions.</li><li><strong>Training Shortcomings</strong> – Lecture-style, one-way training is frequently perceived as boring, irrelevant, or contradictory to users' experiences.</li><li><strong>Compliance vs. Effectiveness</strong> – Many organizations implement security training to meet legal requirements, even if it fails to change behavior.</li><li><strong>Reactance in Security</strong> – Users may intentionally ignore advice or rules to assert control, especially when training feels micromanaging or patronizing.</li><li><strong>Better Through Design</strong> – Reeves argues that secure systems should reduce the need for user decisions by simplifying or removing risky options altogether.</li><li><strong>Remove Rather Than Train</strong> – Limiting administrative rights is often more effective than trying to educate users out of risky behaviors.</li><li><strong>Mismatch With Reality</strong> – Generic training that conflicts with real policies or system restrictions can confuse or alienate users.</li><li><strong>Cognitive Load and Decision-Making</strong> – Under stress or fatigue, users rely on mental shortcuts (heuristics), which attackers exploit.</li><li><strong>Personal Example of Being Fooled</strong> – Reeves recounts nearly falling for a scam due to time pressure, illustrating how stress weakens judgment.</li><li><strong>Cybersecurity Buddy System</strong> – Recommends encouraging users to consult peers when making sensitive decisions, especially under pressure.</li><li><strong>Cyber Deception Strategies</strong> – Reeves now researches ways to mislead and trap attackers inside systems using decoys and tripwires.</li><li><strong>Applying Psychology to Attackers</strong> – The same behavioral models used to study users can help predict and manipulate attacker behavior.</li><li><strong>Empowering Defenders</strong> – Deception technologies can help security teams regain a sense of agency, shifting from reactive defense to proactive engagemen</li></ul><p><strong>About our guest:</strong></p><p>Dr. Andrew Reeves</p><ul><li><a href="https://www.linkedin.com/in/andrewreevescyber/">https://www.linkedin.com/in/andrewreevescyber/</a></li><li><a href="https://research.unsw.edu.au/people/dr-andrew-reeves">https://research.unsw.edu.au/people/dr-andrew-reeves</a></li><li><a href="https://www.unsw.edu.au/research/ifcyber">https://www.unsw.edu.au/research/ifcyber</a></li></ul><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Reeves, A., Delfabbro, P., & Calic, D. (2021). <i>Encouraging employee engagement with cybersecurity: How to tackle cyber fatigue</i>. SAGE Open, 11(1).</p><p><a href="https://doi.org/10.1177/21582440211000049">https://doi.org/10.1177/21582440211000049</a></p><p>Reeves, A., Calic, D., & Delfabbro, P. (2023). <i>Generic and unusable: Understanding employee perceptions of cybersecurity training and measuring advice fatigue</i>. Computers & Security, 128, 103137.</p><p><a href="https://doi.org/10.1016/j.cose.2023.103137">https://doi.org/10.1016/j.cose.2023.103137</a></p><p>Reeves, A., & Ashenden, D. (2023). <i>Understanding decision making in security operations centres: Building the case for cyber deception technology</i>. Frontiers in Psychology, 14, 1165705.</p><p><a href="https://doi.org/10.3389/fpsyg.2023.1165705">https://doi.org/10.3389/fpsyg.2023.1165705</a></p><p><strong>Other:</strong></p><p>UNSW Institute for Cyber Security (IFCYBER)</p><p><a href="https://www.unsw.edu.au/research/ifcyber">https://www.unsw.edu.au/research/ifcyber</a></p>
]]></content:encoded>
      <enclosure length="37014746" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/7dd76839-1912-4824-879b-9adcc9347c08/audio/09017e29-9079-4e79-ac8d-5b58dd6d38de/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design</itunes:title>
      <itunes:author>Andrew Reeves</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/0dff572f-3f2b-4db8-b20c-4f26c3e080be/3000x3000/ep116.jpg?aid=rss_feed"/>
      <itunes:duration>00:38:32</itunes:duration>
      <itunes:summary>What happens when people get tired of cybersecurity? Dr. Andrew Reeves from the UNSW Institute for Cyber Security joins us to explore how psychological principles—like fatigue, reactance, and decision-making under pressure—shape both how users engage with cybersecurity and how attackers and defenders can exploit them.
We talk about what goes wrong with security training, why users push back against well-meaning policies, and how simple design choices can reduce cognitive load and increase compliance. Dr. Reeves also shares his work on cyber deception and how defenders can turn the tables, using stress, uncertainty, and time pressure to mislead attackers inside networks. This episode weaves together user behavior, system design, and attacker psychology into a broader conversation about how we shape—and are shaped by—the security systems we live with.</itunes:summary>
      <itunes:subtitle>What happens when people get tired of cybersecurity? Dr. Andrew Reeves from the UNSW Institute for Cyber Security joins us to explore how psychological principles—like fatigue, reactance, and decision-making under pressure—shape both how users engage with cybersecurity and how attackers and defenders can exploit them.
We talk about what goes wrong with security training, why users push back against well-meaning policies, and how simple design choices can reduce cognitive load and increase compliance. Dr. Reeves also shares his work on cyber deception and how defenders can turn the tables, using stress, uncertainty, and time pressure to mislead attackers inside networks. This episode weaves together user behavior, system design, and attacker psychology into a broader conversation about how we shape—and are shaped by—the security systems we live with.</itunes:subtitle>
      <itunes:keywords>fatigue, deception, research, cybercrime, training, cybersecurity, cybersecurity awareness, education, awareness, psychology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3d74a05a-f979-4054-b9a4-7f190bc3b451</guid>
      <title>Wake up Calling: Impacting businesses by communicating cybersecurity risk</title>
      <description><![CDATA[<h3><strong>Episode Notes</strong></h3><ul><li><strong>SMEs struggle with cybersecurity</strong> due to time, cost, and lack of expertise, despite recognizing its importance.</li><li><strong>An automated cybersecurity scan</strong> was developed to assess SME websites and email security without requiring them to opt-in.</li><li><strong>Physical reports were mailed</strong> instead of emailed to avoid phishing concerns and increase credibility.</li><li><strong>Reports included security ratings</strong> on ten key areas and recommendations for improvement.</li><li><strong>Businesses were encouraged to consult their existing IT providers</strong> for fixes rather than relying on external services.</li><li><strong>Different risk communication strategies were tested</strong> to encourage SMEs to act on the findings.</li><li><strong>“Anticipated Regret” messaging (“Fix it now or regret it later”)</strong> led to the highest cybersecurity improvements.</li><li><strong>All groups, including the control group, showed some improvement</strong>, suggesting broader awareness of cybersecurity issues.</li><li><strong>Engagement was low</strong>, with only a small number of businesses reaching out after receiving the report.</li><li><strong>Legal concerns about scanning businesses without consent</strong> were addressed—publicly available cybersecurity data can be legally assessed.</li><li><strong>Ethical approval confirmed</strong> the project was non-commercial and aimed solely at helping businesses improve security.</li><li><strong>A follow-up version of the project</strong> will introduce an <strong>opt-out option</strong> before scanning businesses.</li><li><strong>Industry associations may partner with the project</strong> to increase credibility and adoption.</li><li><strong>The intervention will be scaled up</strong>, with more businesses included and a longer time frame for assessing impact.</li><li><strong>Future plans include adapting the intervention internationally</strong>, using lessons learned to assist SMEs in other regions.</li></ul><h3> </h3><h3><strong>About Our Guest</strong></h3><p>Dr. Susanne van ’t Hoff-de Goede</p><p><a href="https://www.linkedin.com/in/susanne-van-t-hoff-de-goede/">https://www.linkedin.com/in/susanne-van-t-hoff-de-goede/</a></p><p><a href="https://www.thuas.com/research/centre-expertise/team-cyber-security">https://www.thuas.com/research/centre-expertise/team-cyber-security</a></p><h3> </h3><h3><strong>Resources and Research Mentioned</strong></h3><p><strong>Examining Ransomware Payment Decision-making Among SMEs</strong></p><p><i>Matthijsse, S. R., Moneva, A., van ’t Hoff-de Goede, M. S., & Leukfeldt, E. R.</i></p><p>European Journal of Criminology.</p><p><strong>Explaining Cybercrime Victimization Using a Longitudinal Population-based Survey Experiment</strong></p><p><i>van ’t Hoff-de Goede, M. S., van de Weijer, S., & Leukfeldt, R.</i></p><p>Journal of Crime and Justice, <i>47</i>(4), 472-491 (2024).</p><p><strong>How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens</strong></p><p><i>van der Kleij, R., van ’t Hoff-de Goede, S., van de Weijer, S., & Leukfeldt, R.</i></p><p><i>In:</i> International Conference on Applied Human Factors and Ergonomics (2021), pp. 238-246.</p><p><strong>The Online Behaviour and Victimization Study</strong></p><p><i>van ’t Hoff-de Goede, M. S., Leukfeldt, E. R., van der Kleij, R., …</i></p><p><i>In:Cybercrime in Context: The human factor in victimization, offending, and …</i> (2021).</p><h3> </h3><h3><strong>Other</strong></h3><p><strong>Dutch Government Cybersecurity Resource</strong></p><p><a href="https://english.ncsc.nl/">https://english.ncsc.nl</a></p><p>(English-language site for the Netherlands’ National Cyber Security Centre)</p><p><strong>Secure Internetting (in Dutch)</strong></p><p><a href="https://veiliginternetten.nl/">https://veiliginternetten.nl/</a></p>
]]></description>
      <pubDate>Sat, 1 Mar 2025 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/wake-up-calling-impacting-businesses-by-communicating-cybersecurity-risk-wgG4YJHy</link>
      <content:encoded><![CDATA[<h3><strong>Episode Notes</strong></h3><ul><li><strong>SMEs struggle with cybersecurity</strong> due to time, cost, and lack of expertise, despite recognizing its importance.</li><li><strong>An automated cybersecurity scan</strong> was developed to assess SME websites and email security without requiring them to opt-in.</li><li><strong>Physical reports were mailed</strong> instead of emailed to avoid phishing concerns and increase credibility.</li><li><strong>Reports included security ratings</strong> on ten key areas and recommendations for improvement.</li><li><strong>Businesses were encouraged to consult their existing IT providers</strong> for fixes rather than relying on external services.</li><li><strong>Different risk communication strategies were tested</strong> to encourage SMEs to act on the findings.</li><li><strong>“Anticipated Regret” messaging (“Fix it now or regret it later”)</strong> led to the highest cybersecurity improvements.</li><li><strong>All groups, including the control group, showed some improvement</strong>, suggesting broader awareness of cybersecurity issues.</li><li><strong>Engagement was low</strong>, with only a small number of businesses reaching out after receiving the report.</li><li><strong>Legal concerns about scanning businesses without consent</strong> were addressed—publicly available cybersecurity data can be legally assessed.</li><li><strong>Ethical approval confirmed</strong> the project was non-commercial and aimed solely at helping businesses improve security.</li><li><strong>A follow-up version of the project</strong> will introduce an <strong>opt-out option</strong> before scanning businesses.</li><li><strong>Industry associations may partner with the project</strong> to increase credibility and adoption.</li><li><strong>The intervention will be scaled up</strong>, with more businesses included and a longer time frame for assessing impact.</li><li><strong>Future plans include adapting the intervention internationally</strong>, using lessons learned to assist SMEs in other regions.</li></ul><h3> </h3><h3><strong>About Our Guest</strong></h3><p>Dr. Susanne van ’t Hoff-de Goede</p><p><a href="https://www.linkedin.com/in/susanne-van-t-hoff-de-goede/">https://www.linkedin.com/in/susanne-van-t-hoff-de-goede/</a></p><p><a href="https://www.thuas.com/research/centre-expertise/team-cyber-security">https://www.thuas.com/research/centre-expertise/team-cyber-security</a></p><h3> </h3><h3><strong>Resources and Research Mentioned</strong></h3><p><strong>Examining Ransomware Payment Decision-making Among SMEs</strong></p><p><i>Matthijsse, S. R., Moneva, A., van ’t Hoff-de Goede, M. S., & Leukfeldt, E. R.</i></p><p>European Journal of Criminology.</p><p><strong>Explaining Cybercrime Victimization Using a Longitudinal Population-based Survey Experiment</strong></p><p><i>van ’t Hoff-de Goede, M. S., van de Weijer, S., & Leukfeldt, R.</i></p><p>Journal of Crime and Justice, <i>47</i>(4), 472-491 (2024).</p><p><strong>How Safely Do We Behave Online? An Explanatory Study into the Cybersecurity Behaviors of Dutch Citizens</strong></p><p><i>van der Kleij, R., van ’t Hoff-de Goede, S., van de Weijer, S., & Leukfeldt, R.</i></p><p><i>In:</i> International Conference on Applied Human Factors and Ergonomics (2021), pp. 238-246.</p><p><strong>The Online Behaviour and Victimization Study</strong></p><p><i>van ’t Hoff-de Goede, M. S., Leukfeldt, E. R., van der Kleij, R., …</i></p><p><i>In:Cybercrime in Context: The human factor in victimization, offending, and …</i> (2021).</p><h3> </h3><h3><strong>Other</strong></h3><p><strong>Dutch Government Cybersecurity Resource</strong></p><p><a href="https://english.ncsc.nl/">https://english.ncsc.nl</a></p><p>(English-language site for the Netherlands’ National Cyber Security Centre)</p><p><strong>Secure Internetting (in Dutch)</strong></p><p><a href="https://veiliginternetten.nl/">https://veiliginternetten.nl/</a></p>
]]></content:encoded>
      <enclosure length="21029294" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/2707cdf0-75ec-4c9c-8bf8-0b261c233dd8/audio/89450077-2ce1-4342-9e22-ff22c12e5e5a/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Wake up Calling: Impacting businesses by communicating cybersecurity risk</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/f4e99a65-dac1-4829-a75a-5ce5690b80e7/3000x3000/ep115.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:52</itunes:duration>
      <itunes:summary>How can we encourage businesses to tackle cybersecurity? In this episode, we speak with Dr. Susanne van ’t Hoff-de Goede, Associate Professor at the Centre of Expertise Cyber Security in The Hague University of Applied Sciences. Susanne’s work focuses on the human factor in cybercrime—whether examining online victims, offenders, or the law enforcement response. Here, she introduces an innovative “low-threshold” cybersecurity intervention experiment that scanned company websites and sent tailored risk reports through traditional mail. We explore what worked, what didn’t, and how she plans to refine the approach to get more businesses proactively engaged in their cybersecurity.</itunes:summary>
      <itunes:subtitle>How can we encourage businesses to tackle cybersecurity? In this episode, we speak with Dr. Susanne van ’t Hoff-de Goede, Associate Professor at the Centre of Expertise Cyber Security in The Hague University of Applied Sciences. Susanne’s work focuses on the human factor in cybercrime—whether examining online victims, offenders, or the law enforcement response. Here, she introduces an innovative “low-threshold” cybersecurity intervention experiment that scanned company websites and sent tailored risk reports through traditional mail. We explore what worked, what didn’t, and how she plans to refine the approach to get more businesses proactively engaged in their cybersecurity.</itunes:subtitle>
      <itunes:keywords>prevention, experiment, research, cybercrime, sme, cybersecurity, policy, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8ded6d26-af9e-46cb-973c-16ee703d41a0</guid>
      <title>Anomie.exe: Geography, Strain and the Motivated Cyber Offender</title>
      <description><![CDATA[<h3><strong>Episode Summary (Dot Points)</strong></h3><ul><li><strong>Understanding Cybercrime through Strain and Anomie Theories</strong><ul><li>Dr. Dearden explains how <strong>strain theory</strong> and <strong>anomie theory</strong> provide insights into cybercriminal motivations.</li><li>Discussion on <strong>economic and social pressures</strong> that push individuals toward cybercrime, including <strong>unemployment, inequality, and lack of upward mobility</strong>.</li></ul></li><li><strong>The Role of Honeypots in Cybercrime Research</strong><ul><li>Overview of <strong>honeypots</strong>—deceptive systems designed to attract cyber attackers.</li><li>How honeypots help researchers <strong>observe and analyze hacker behaviors</strong> in real-world settings.</li><li>Differences in <strong>hacking techniques and motivations</strong> across different regions.</li></ul></li><li><strong>Regional Variations in Cybercriminal Activities</strong><ul><li>Why cybercrime is <strong>not uniformly distributed worldwide</strong> despite the internet being a global network.</li><li>Case studies on <strong>West African romance scams, Russian cyber operations, and Indian call center frauds</strong>.</li><li>The <strong>interplay between legitimate and illegitimate economies</strong> in cybercrime hotspots.</li></ul></li><li><strong>Cybercrime and Economic Opportunity</strong><ul><li>Findings from recent research on <strong>how financial strain vs. greed influences cybercrime</strong>.</li><li>The role of <strong>cryptocurrency in enabling financial cybercrimes</strong> and providing anonymity to offenders.</li><li>Discussion on how <strong>cybercrime prevention strategies need to address offender motivations, not just security vulnerabilities</strong>.</li></ul></li><li><strong>Future Research and Policy Implications</strong><ul><li>The <strong>need for broader, structural changes</strong> to mitigate cybercrime, rather than relying solely on reactive security measures.</li><li>How <strong>cross-national studies</strong> and <strong>criminological data collection</strong> can improve cybercrime prevention strategies.</li><li>Upcoming projects on <strong>measuring cyber-offending patterns and regional differences in hacking behavior</strong>.</li></ul></li></ul><h3><strong>About Our Guest</strong></h3><p><strong>Dr. Thomas Dearden</strong></p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><h3><strong>Papers and Resources Mentioned in This Episode</strong></h3><p><strong>Dearden, T. E., & Gottschalk, P. (2024).</strong><i>Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyberoffending.Deviant Behavior.</i><a href="https://doi.org/10.1080/01639625.2023.2246626">DOI Link</a></p><p><strong>Parti, K., & Dearden, T. (2024).</strong><i>Cybercrime and Strain Theory: An Examination of Online Crime and Gender.International Journal of Criminology and Sociology. </i><a href="https://doi.org/10.6000/1929-4409.2024.13.19">https://doi.org/10.6000/1929-4409.2024.13.19</a></p><p><strong>Dearden, T. E., Parti, K., & Hawdon, J. (2022).</strong><i>Institutional Anomie Theory and Cybercrime: Cybercrime and the American Dream.Journal of Contemporary Criminal Justice. </i><a href="https://doi.org/10.1177/10439862211001590">https://doi.org/10.1177/10439862211001590</a></p><h3> </h3><h3><strong>Related Episodes Featuring Dr. Dearden</strong></h3><p><strong>Episode 39 : Strained Dreams: Cybercrime and Institutional Anomie</strong></p><p><a href="https://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie?utm_source=chatgpt.com">https://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie</a></p><p> </p><h3><strong>Other:</strong></h3><p>The Human Factors in cybercrime Conference: <a href="https://www.hfc-conference.com/">https://www.hfc-conference.com</a></p><p>We had a chat in a room with a bunch of people just outside having their own great conversations. Kind of nice to get a little bit of that vibe into the mix.  Conferences can be a lot of fun ;)/.</p><p>To the best of my knowledge, no bovines were harmed during the recording of this episode. </p>
]]></description>
      <pubDate>Sat, 1 Feb 2025 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Thomas Dearden)</author>
      <link>https://cybercrimeology.com/episodes/anomieexe-geography-strain-and-the-motivated-cyber-offender-Czj8EntC</link>
      <content:encoded><![CDATA[<h3><strong>Episode Summary (Dot Points)</strong></h3><ul><li><strong>Understanding Cybercrime through Strain and Anomie Theories</strong><ul><li>Dr. Dearden explains how <strong>strain theory</strong> and <strong>anomie theory</strong> provide insights into cybercriminal motivations.</li><li>Discussion on <strong>economic and social pressures</strong> that push individuals toward cybercrime, including <strong>unemployment, inequality, and lack of upward mobility</strong>.</li></ul></li><li><strong>The Role of Honeypots in Cybercrime Research</strong><ul><li>Overview of <strong>honeypots</strong>—deceptive systems designed to attract cyber attackers.</li><li>How honeypots help researchers <strong>observe and analyze hacker behaviors</strong> in real-world settings.</li><li>Differences in <strong>hacking techniques and motivations</strong> across different regions.</li></ul></li><li><strong>Regional Variations in Cybercriminal Activities</strong><ul><li>Why cybercrime is <strong>not uniformly distributed worldwide</strong> despite the internet being a global network.</li><li>Case studies on <strong>West African romance scams, Russian cyber operations, and Indian call center frauds</strong>.</li><li>The <strong>interplay between legitimate and illegitimate economies</strong> in cybercrime hotspots.</li></ul></li><li><strong>Cybercrime and Economic Opportunity</strong><ul><li>Findings from recent research on <strong>how financial strain vs. greed influences cybercrime</strong>.</li><li>The role of <strong>cryptocurrency in enabling financial cybercrimes</strong> and providing anonymity to offenders.</li><li>Discussion on how <strong>cybercrime prevention strategies need to address offender motivations, not just security vulnerabilities</strong>.</li></ul></li><li><strong>Future Research and Policy Implications</strong><ul><li>The <strong>need for broader, structural changes</strong> to mitigate cybercrime, rather than relying solely on reactive security measures.</li><li>How <strong>cross-national studies</strong> and <strong>criminological data collection</strong> can improve cybercrime prevention strategies.</li><li>Upcoming projects on <strong>measuring cyber-offending patterns and regional differences in hacking behavior</strong>.</li></ul></li></ul><h3><strong>About Our Guest</strong></h3><p><strong>Dr. Thomas Dearden</strong></p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><h3><strong>Papers and Resources Mentioned in This Episode</strong></h3><p><strong>Dearden, T. E., & Gottschalk, P. (2024).</strong><i>Convenience Theory and Cybercrime Opportunity: An Analysis of Online Cyberoffending.Deviant Behavior.</i><a href="https://doi.org/10.1080/01639625.2023.2246626">DOI Link</a></p><p><strong>Parti, K., & Dearden, T. (2024).</strong><i>Cybercrime and Strain Theory: An Examination of Online Crime and Gender.International Journal of Criminology and Sociology. </i><a href="https://doi.org/10.6000/1929-4409.2024.13.19">https://doi.org/10.6000/1929-4409.2024.13.19</a></p><p><strong>Dearden, T. E., Parti, K., & Hawdon, J. (2022).</strong><i>Institutional Anomie Theory and Cybercrime: Cybercrime and the American Dream.Journal of Contemporary Criminal Justice. </i><a href="https://doi.org/10.1177/10439862211001590">https://doi.org/10.1177/10439862211001590</a></p><h3> </h3><h3><strong>Related Episodes Featuring Dr. Dearden</strong></h3><p><strong>Episode 39 : Strained Dreams: Cybercrime and Institutional Anomie</strong></p><p><a href="https://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie?utm_source=chatgpt.com">https://www.cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie</a></p><p> </p><h3><strong>Other:</strong></h3><p>The Human Factors in cybercrime Conference: <a href="https://www.hfc-conference.com/">https://www.hfc-conference.com</a></p><p>We had a chat in a room with a bunch of people just outside having their own great conversations. Kind of nice to get a little bit of that vibe into the mix.  Conferences can be a lot of fun ;)/.</p><p>To the best of my knowledge, no bovines were harmed during the recording of this episode. </p>
]]></content:encoded>
      <enclosure length="21143773" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1722718a-9125-4544-b055-370286175e3d/audio/2b55ea9d-7c90-4585-9704-8b2c9a2a35fa/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Anomie.exe: Geography, Strain and the Motivated Cyber Offender</itunes:title>
      <itunes:author>Thomas Dearden</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/93717931-4c2a-4164-87e8-ed2b4e04dea2/3000x3000/ep114.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:00</itunes:duration>
      <itunes:summary>In this episode we have a conversation with Dr. Thomas Dearden from  Virginia Tech to delve into the sociological underpinnings of cybercrime, discussing how strain and anomie theories interact with the motivations behind online offending. We talk about the nuances of these theories, how they can shed light on cybercrime, the their potential for cybercrime prevention. Recorded at the Human Factors in Cybercrime Conference, the discussion also touches on some ongoing work focusing on the use of honeypots to study cybercriminal behaviour.</itunes:summary>
      <itunes:subtitle>In this episode we have a conversation with Dr. Thomas Dearden from  Virginia Tech to delve into the sociological underpinnings of cybercrime, discussing how strain and anomie theories interact with the motivations behind online offending. We talk about the nuances of these theories, how they can shed light on cybercrime, the their potential for cybercrime prevention. Recorded at the Human Factors in Cybercrime Conference, the discussion also touches on some ongoing work focusing on the use of honeypots to study cybercriminal behaviour.</itunes:subtitle>
      <itunes:keywords>crime, strain theory, opportunity, research, cybercrime, honeypots, theory, anomie, cybersecurity, geography, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02061163-dc4e-428d-96e0-5b892a3e493f</guid>
      <title>The Ethical Hacker Pathway: Exploring Positive Cyber Behavior</title>
      <description><![CDATA[<h3>Key Points Discussed:</h3><ul><li><strong>Defining Ethical Hacking:</strong> Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.</li><li><strong>Research Focus:</strong> Dr. Weulen Kranenbarg’s studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.</li><li><strong>Ethical Hacking as a Pathway:</strong><ul><li>Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.</li><li>Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.</li></ul></li><li><strong>Challenges in Defining Ethics:</strong><ul><li>Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.</li><li>The term "ethical hacker" is often contentious within the community.</li></ul></li><li><strong>Role of Education:</strong> Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.</li><li><strong>Future Research Directions:</strong> Dr. Weulen Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.</li></ul><h3>About our Guest:</h3><p>Dr Marleen Weulen Kranenbarg</p><p><a href="https://research.vu.nl/en/persons/marleen-weulen-kranenbarg">https://research.vu.nl/en/persons/marleen-weulen-kranenbarg</a></p><h3> </h3><h3><strong>Papers or Resources Mentioned:</strong></h3><ul><li>Weulen Kranenbarg, M. (2018). <i>Cyber-offenders versus traditional offenders: An empirical comparison</i>. Vrije Universiteit Amsterdam. Retrieved from <a href="https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparison">https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparison</a></li><li>Weulen Kranenbarg, M., Ruiter, S., & Nieuwbeerta, P. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. <i>Crime & Delinquency, 64</i>(10), 1270–1292. <a href="https://doi.org/10.1177/0011128718763134">https://doi.org/10.1177/0011128718763134</a></li><li>Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2021). Contrasting cyber-dependent and traditional offenders: A comparison on criminological explanations and potential prevention methods. In J. van Gelder, H. Elffers, D. Reynald, & D. Nagin (Eds.), <i>Routledge International Handbook of Criminology and Criminal Justice Studies</i> (pp. 234–249). Routledge. Retrieved from <a href="https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-compariso">https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-compariso</a></li><li>Weulen Kranenbarg, M., & Noordegraaf, J. (2023). Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. <i>Criminology & Public Policy, 22</i>(3), 465–490. <a href="https://doi.org/10.1111/1745-9133.12640">https://doi.org/10.1111/1745-9133.12640</a></li></ul><h3><strong>Additional Resources:</strong></h3><h3>Capture the Flag (CTF) events:</h3><p><strong>Hack the Box - </strong>A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.</p><p><a href="https://www.hackthebox.com/">https://www.hackthebox.com</a></p><p><strong>NorthSec - </strong>A popular  in-person CTF competition designed for everyone excited about cybersecurity.</p><p><a href="https://nsec.io/">https://nsec.io</a></p><h3>Bug Bounty Programs:</h3><p><strong>HackerOne - </strong>A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.</p><p><a href="https://www.hackerone.com/">https://www.hackerone.com</a></p><p><strong>Bugcrowd - </strong>A platform that hosts bug bounty programs for a wide range of companies and industries.</p><p><a href="https://www.bugcrowd.com/">https://www.bugcrowd.com</a></p>
]]></description>
      <pubDate>Wed, 1 Jan 2025 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Marleen Weulen Kranenbarg)</author>
      <link>https://cybercrimeology.com/episodes/the-ethical-hacker-pathway-exploring-positive-cyber-behavior-BQCb3qVT</link>
      <content:encoded><![CDATA[<h3>Key Points Discussed:</h3><ul><li><strong>Defining Ethical Hacking:</strong> Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.</li><li><strong>Research Focus:</strong> Dr. Weulen Kranenbarg’s studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.</li><li><strong>Ethical Hacking as a Pathway:</strong><ul><li>Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.</li><li>Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.</li></ul></li><li><strong>Challenges in Defining Ethics:</strong><ul><li>Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.</li><li>The term "ethical hacker" is often contentious within the community.</li></ul></li><li><strong>Role of Education:</strong> Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.</li><li><strong>Future Research Directions:</strong> Dr. Weulen Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.</li></ul><h3>About our Guest:</h3><p>Dr Marleen Weulen Kranenbarg</p><p><a href="https://research.vu.nl/en/persons/marleen-weulen-kranenbarg">https://research.vu.nl/en/persons/marleen-weulen-kranenbarg</a></p><h3> </h3><h3><strong>Papers or Resources Mentioned:</strong></h3><ul><li>Weulen Kranenbarg, M. (2018). <i>Cyber-offenders versus traditional offenders: An empirical comparison</i>. Vrije Universiteit Amsterdam. Retrieved from <a href="https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparison">https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparison</a></li><li>Weulen Kranenbarg, M., Ruiter, S., & Nieuwbeerta, P. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. <i>Crime & Delinquency, 64</i>(10), 1270–1292. <a href="https://doi.org/10.1177/0011128718763134">https://doi.org/10.1177/0011128718763134</a></li><li>Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2021). Contrasting cyber-dependent and traditional offenders: A comparison on criminological explanations and potential prevention methods. In J. van Gelder, H. Elffers, D. Reynald, & D. Nagin (Eds.), <i>Routledge International Handbook of Criminology and Criminal Justice Studies</i> (pp. 234–249). Routledge. Retrieved from <a href="https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-compariso">https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-compariso</a></li><li>Weulen Kranenbarg, M., & Noordegraaf, J. (2023). Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. <i>Criminology & Public Policy, 22</i>(3), 465–490. <a href="https://doi.org/10.1111/1745-9133.12640">https://doi.org/10.1111/1745-9133.12640</a></li></ul><h3><strong>Additional Resources:</strong></h3><h3>Capture the Flag (CTF) events:</h3><p><strong>Hack the Box - </strong>A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.</p><p><a href="https://www.hackthebox.com/">https://www.hackthebox.com</a></p><p><strong>NorthSec - </strong>A popular  in-person CTF competition designed for everyone excited about cybersecurity.</p><p><a href="https://nsec.io/">https://nsec.io</a></p><h3>Bug Bounty Programs:</h3><p><strong>HackerOne - </strong>A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.</p><p><a href="https://www.hackerone.com/">https://www.hackerone.com</a></p><p><strong>Bugcrowd - </strong>A platform that hosts bug bounty programs for a wide range of companies and industries.</p><p><a href="https://www.bugcrowd.com/">https://www.bugcrowd.com</a></p>
]]></content:encoded>
      <enclosure length="22444478" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/9f17b49c-f55e-4842-916f-9ad3f19ea7cd/audio/431860c3-1ab3-47d6-8cd3-08b6d6c04751/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Ethical Hacker Pathway: Exploring Positive Cyber Behavior</itunes:title>
      <itunes:author>Marleen Weulen Kranenbarg</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/e6daf1e9-5312-44c2-a997-0f628429eafa/3000x3000/ep113.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:21</itunes:duration>
      <itunes:summary>What is an ethical hacker, what do they do and how does their journey to this point unfold? Dr. Marleen Weulen Kranenbarg joins us to discuss her research towards discovering the overlaps in pathways to  the positive and negative cyber behaviors among ethical hackers. We explore the nuances of ethical hacking, the factors influencing the choice of a positive path, and the challenges faced by schools and organizations in supporting ethical cybersecurity practices.</itunes:summary>
      <itunes:subtitle>What is an ethical hacker, what do they do and how does their journey to this point unfold? Dr. Marleen Weulen Kranenbarg joins us to discuss her research towards discovering the overlaps in pathways to  the positive and negative cyber behaviors among ethical hackers. We explore the nuances of ethical hacking, the factors influencing the choice of a positive path, and the challenges faced by schools and organizations in supporting ethical cybersecurity practices.</itunes:subtitle>
      <itunes:keywords>crime, life-course, research, cybercrime, hackers, education, ethical hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e84c6cb6-bbd3-4493-8b32-c8cca2bf6d0d</guid>
      <title>Building the Basics: Preparing Officers for the Present and Researching Training for the Future</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr. Tom Holt</p><p><a href="https://cj.msu.edu/directory/holt-tom.html">https://cj.msu.edu/directory/holt-tom.html</a></p><p><strong>Key Topics Discussed:</strong></p><ul><li>Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcement, pointing out disparities in how local agencies handle these crimes.</li><li>He highlighted the challenges agencies face in responding to cyber-enabled and cyber-dependent crimes, particularly in rural areas.</li><li>Dr. Holt discussed the development of training modules covering both basic digital evidence handling and specialized topics tailored to agency needs.</li><li>The conversation underscored the importance of bridging resource gaps between rural and urban agencies.</li><li>Dr. Holt explained how police leadership’s support is crucial for improving the adoption and effectiveness of training programs.</li><li>The prevalence of interpersonal cybercrimes like sextortion and fraud, often encountered by local officers, was addressed.</li><li>Dr. Holt elaborated on long-term evaluation plans for these training programs, aiming to measure their impact on officers and agencies.</li><li>He also discussed the potential for a national standard curriculum to bring consistency to cybercrime training across the U.S.</li></ul><p><strong>Papers and Resources Mentioned:</strong></p><ol><li><strong>Articles on the Training Center Initiative</strong>:<ul><li>Cybercrime Training at MSU –<a href="https://cj.msu.edu/community/cyber-center/cyber-center-home.html">https://cj.msu.edu/community/cyber-center/cyber-center-home.html</a></li><li>Program announcement - <a href="https://msutoday.msu.edu/news/2024/msu-receives-$1M-to-create-center-for-cyber-security-training">https://msutoday.msu.edu/news/2024/msu-receives-$1M-to-create-center-for-cyber-security-training</a></li></ul></li></ol><p><strong>Other:</strong></p><p>This episode was recorded on location in at HEC Montreal. The occasional background noise from students only adds to the vibrant atmosphere of the discussion. So you can’t complain about the noise being distracting, consider it an authentic experience!</p>
]]></description>
      <pubDate>Sun, 1 Dec 2024 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Tom Holt)</author>
      <link>https://cybercrimeology.com/episodes/building-the-basics-preparing-officers-for-the-present-and-researching-training-for-the-future-qJkt8fQ8</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr. Tom Holt</p><p><a href="https://cj.msu.edu/directory/holt-tom.html">https://cj.msu.edu/directory/holt-tom.html</a></p><p><strong>Key Topics Discussed:</strong></p><ul><li>Dr. Tom Holt emphasized the urgent need for consistent and evidence-based cybercrime training in law enforcement, pointing out disparities in how local agencies handle these crimes.</li><li>He highlighted the challenges agencies face in responding to cyber-enabled and cyber-dependent crimes, particularly in rural areas.</li><li>Dr. Holt discussed the development of training modules covering both basic digital evidence handling and specialized topics tailored to agency needs.</li><li>The conversation underscored the importance of bridging resource gaps between rural and urban agencies.</li><li>Dr. Holt explained how police leadership’s support is crucial for improving the adoption and effectiveness of training programs.</li><li>The prevalence of interpersonal cybercrimes like sextortion and fraud, often encountered by local officers, was addressed.</li><li>Dr. Holt elaborated on long-term evaluation plans for these training programs, aiming to measure their impact on officers and agencies.</li><li>He also discussed the potential for a national standard curriculum to bring consistency to cybercrime training across the U.S.</li></ul><p><strong>Papers and Resources Mentioned:</strong></p><ol><li><strong>Articles on the Training Center Initiative</strong>:<ul><li>Cybercrime Training at MSU –<a href="https://cj.msu.edu/community/cyber-center/cyber-center-home.html">https://cj.msu.edu/community/cyber-center/cyber-center-home.html</a></li><li>Program announcement - <a href="https://msutoday.msu.edu/news/2024/msu-receives-$1M-to-create-center-for-cyber-security-training">https://msutoday.msu.edu/news/2024/msu-receives-$1M-to-create-center-for-cyber-security-training</a></li></ul></li></ol><p><strong>Other:</strong></p><p>This episode was recorded on location in at HEC Montreal. The occasional background noise from students only adds to the vibrant atmosphere of the discussion. So you can’t complain about the noise being distracting, consider it an authentic experience!</p>
]]></content:encoded>
      <enclosure length="24104936" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/f84ae597-f222-4ba6-9265-53ce93adc6e0/audio/6cdce16f-37cb-4ac8-a67b-484ed02a50e0/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Building the Basics: Preparing Officers for the Present and Researching Training for the Future</itunes:title>
      <itunes:author>Tom Holt</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/643c632e-4932-4202-a029-f0e3d94a60ec/3000x3000/ep112.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:05</itunes:duration>
      <itunes:summary>What does it take to improve law enforcement’s response to cybercrime? Dr. Tom Holt from Michigan State University discusses his efforts to develop an evidence-based training center for police officers tackling cyber-enabled and cyber-dependent crimes. From identifying gaps in local law enforcement training to bridging the divide between academic research and real-world needs, Dr. Holt shares the challenges and opportunities in this critical area.</itunes:summary>
      <itunes:subtitle>What does it take to improve law enforcement’s response to cybercrime? Dr. Tom Holt from Michigan State University discusses his efforts to develop an evidence-based training center for police officers tackling cyber-enabled and cyber-dependent crimes. From identifying gaps in local law enforcement training to bridging the divide between academic research and real-world needs, Dr. Holt shares the challenges and opportunities in this critical area.</itunes:subtitle>
      <itunes:keywords>capacity building, research, cybercrime, training, implementation, policing, policy, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">285fdf40-1be6-4484-9220-e675c7593485</guid>
      <title>The Open Science Revolution: Building Trust with Transparency</title>
      <description><![CDATA[<h3>Episode Notes</h3><p>Episode Summary</p><ul><li><strong>Introduction to Open Science</strong> – Asier Moneva introduces open science, emphasizing transparency and replicability as essential to modern research.</li><li><strong>Importance of Transparency</strong> – He explains how transparency builds trust, enabling other researchers to assess rigor and replicate findings accurately.</li><li><strong>Preregistration and Registered Reports</strong> – Asier discusses these practices, which require researchers to specify methodologies and hypotheses before data collection to reduce bias.</li><li><strong>Challenges in Adoption</strong> – He notes that implementing open science practices can be challenging due to academic pressures and resource limitations.</li><li><strong>The “Publish or Perish” Culture</strong> – We highlight how the pressure to publish quickly can conflict with the time-intensive requirements of open science.</li><li><strong>Academic Incentives and Misaligned Goals</strong> – We critique the academic reward system that often favors quantity over quality, which can detract from scientific rigor.</li><li><strong>Advantages for Public Accessibility</strong> – Open science also enhances public accessibility, making research available beyond academia and helping inform public policy.</li><li><strong>Ethical Considerations in Research</strong> – Asier emphasizes that open science fosters ethical research practices by reducing questionable practices like p-hacking and selective reporting.</li><li><strong>Benefits of Open Science for Collaboration</strong> – The approach encourages collaboration across disciplines and institutions, providing a more comprehensive understanding of complex issues.</li><li><strong>Real-World Example of Retraction</strong> – He mentions a case where a research paper was retracted due to lack of transparency, illustrating the importance of open science practices.</li><li><strong>Role of Preprints in Open Science</strong> – Asier advocates for preprints as a way to share research and receive feedback before formal publication.</li><li><strong>Challenges with Platform Fragmentation</strong> – He observes that the proliferation of research-sharing platforms can hinder accessibility if findings are scattered across multiple sources.</li><li><strong>Future of Registered Reports</strong> – Asier sees registered reports as a future standard, as they align research design with ethical and rigorous science.</li><li><strong>Open Science as a Solution to Publication Bias</strong> – Open science practices help address publication bias by promoting the dissemination of all research findings, regardless of outcomes.</li><li><strong>Closing Thoughts on Transparency</strong> – Open science is about ensuring reproducibility and holding science accountable, aiming to make research as transparent and accessible as possible.</li></ul><p><strong>About Our Guest:</strong></p><p><strong>Asier Moneva</strong></p><p><a href="https://asiermoneva.com">https://asiermoneva.com</a></p><p><a href="https://nscr.nl/en/medewerker/asier-moneva/">https://nscr.nl/en/medewerker/asier-moneva/</a></p><p><a href="https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity">https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity</a></p><p><a href="https://github.com/amoneva">https://github.com/amoneva</a></p><p><a href="https://osf.io/7ce24/">https://osf.io/7ce24/</a></p><p><strong>Resources and References Mentioned in This Episode:</strong></p><p><strong>The Open Science Framework (OSF)</strong></p><p>The OSF is an open-source platform supporting transparent and reproducible research across disciplines.</p><p>The Open Science Framework:</p><p><a href="https://osf.io/">https://osf.io/</a></p><p><strong>Paper Introducing Registered Reports</strong></p><p>This foundational paper outlines the concept of registered reports, a publishing model aimed at reducing bias and enhancing research rigor.</p><p>Paper introducing "registered reports":</p><p><a href="https://psycnet.apa.org/fulltext/2014-20922-001.html">https://psycnet.apa.org/fulltext/2014-20922-001.html</a></p><p><strong>Retraction Case Study</strong></p><p>A recent retraction of a notable article on the replicability of social-behavioral research findings offers insights into challenges within open science practices.</p><p>RETRACTED ARTICLE: High replicability of newly discovered social-behavioural findings is achievable:</p><p><a href="https://www.nature.com/articles/s41562-023-01749-9">https://www.nature.com/articles/s41562-023-01749-9</a></p><p>Retraction Note: High replicability of newly discovered social-behavioural findings is achievable:</p><p><a href="https://www.nature.com/articles/s41562-024-01997-3">https://www.nature.com/articles/s41562-024-01997-3</a></p><p>Podcast episode discussing the retraction in depth:</p><p><a href="https://open.spotify.com/episode/3rygrbUNocfCEEGd1Byn0V?si=vJDuzQT3S7yJqDEUMycF1w&t=178">https://open.spotify.com/episode/3rygrbUNocfCEEGd1Byn0V?si=vJDuzQT3S7yJqDEUMycF1w&t=178</a></p><p><strong>Other:</strong></p><p>This episode was recorded in a hotel lobby corner with music playing in the background. If the audio sounds a little unusual at times it is because of the noise removal being used to remove that noise being combined with other ‘sound enhancement’ features. I had to go back in and play around with the audio directly before I was even a little happy.  The tools work well but they are a little unpredictable.  I am increasingly wary of ‘it just works’ audio editing tools. I would have left it in, but the bots chasing copyright infringement are ravenous and indiscriminate. </p>
]]></description>
      <pubDate>Fri, 1 Nov 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Asier Moneva)</author>
      <link>https://cybercrimeology.com/episodes/the-open-science-revolution-building-trust-with-transparency-3Wg4zTjX</link>
      <content:encoded><![CDATA[<h3>Episode Notes</h3><p>Episode Summary</p><ul><li><strong>Introduction to Open Science</strong> – Asier Moneva introduces open science, emphasizing transparency and replicability as essential to modern research.</li><li><strong>Importance of Transparency</strong> – He explains how transparency builds trust, enabling other researchers to assess rigor and replicate findings accurately.</li><li><strong>Preregistration and Registered Reports</strong> – Asier discusses these practices, which require researchers to specify methodologies and hypotheses before data collection to reduce bias.</li><li><strong>Challenges in Adoption</strong> – He notes that implementing open science practices can be challenging due to academic pressures and resource limitations.</li><li><strong>The “Publish or Perish” Culture</strong> – We highlight how the pressure to publish quickly can conflict with the time-intensive requirements of open science.</li><li><strong>Academic Incentives and Misaligned Goals</strong> – We critique the academic reward system that often favors quantity over quality, which can detract from scientific rigor.</li><li><strong>Advantages for Public Accessibility</strong> – Open science also enhances public accessibility, making research available beyond academia and helping inform public policy.</li><li><strong>Ethical Considerations in Research</strong> – Asier emphasizes that open science fosters ethical research practices by reducing questionable practices like p-hacking and selective reporting.</li><li><strong>Benefits of Open Science for Collaboration</strong> – The approach encourages collaboration across disciplines and institutions, providing a more comprehensive understanding of complex issues.</li><li><strong>Real-World Example of Retraction</strong> – He mentions a case where a research paper was retracted due to lack of transparency, illustrating the importance of open science practices.</li><li><strong>Role of Preprints in Open Science</strong> – Asier advocates for preprints as a way to share research and receive feedback before formal publication.</li><li><strong>Challenges with Platform Fragmentation</strong> – He observes that the proliferation of research-sharing platforms can hinder accessibility if findings are scattered across multiple sources.</li><li><strong>Future of Registered Reports</strong> – Asier sees registered reports as a future standard, as they align research design with ethical and rigorous science.</li><li><strong>Open Science as a Solution to Publication Bias</strong> – Open science practices help address publication bias by promoting the dissemination of all research findings, regardless of outcomes.</li><li><strong>Closing Thoughts on Transparency</strong> – Open science is about ensuring reproducibility and holding science accountable, aiming to make research as transparent and accessible as possible.</li></ul><p><strong>About Our Guest:</strong></p><p><strong>Asier Moneva</strong></p><p><a href="https://asiermoneva.com">https://asiermoneva.com</a></p><p><a href="https://nscr.nl/en/medewerker/asier-moneva/">https://nscr.nl/en/medewerker/asier-moneva/</a></p><p><a href="https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity">https://www.thuas.com/research/research-groups/team-cybercrime-cybersecurity</a></p><p><a href="https://github.com/amoneva">https://github.com/amoneva</a></p><p><a href="https://osf.io/7ce24/">https://osf.io/7ce24/</a></p><p><strong>Resources and References Mentioned in This Episode:</strong></p><p><strong>The Open Science Framework (OSF)</strong></p><p>The OSF is an open-source platform supporting transparent and reproducible research across disciplines.</p><p>The Open Science Framework:</p><p><a href="https://osf.io/">https://osf.io/</a></p><p><strong>Paper Introducing Registered Reports</strong></p><p>This foundational paper outlines the concept of registered reports, a publishing model aimed at reducing bias and enhancing research rigor.</p><p>Paper introducing "registered reports":</p><p><a href="https://psycnet.apa.org/fulltext/2014-20922-001.html">https://psycnet.apa.org/fulltext/2014-20922-001.html</a></p><p><strong>Retraction Case Study</strong></p><p>A recent retraction of a notable article on the replicability of social-behavioral research findings offers insights into challenges within open science practices.</p><p>RETRACTED ARTICLE: High replicability of newly discovered social-behavioural findings is achievable:</p><p><a href="https://www.nature.com/articles/s41562-023-01749-9">https://www.nature.com/articles/s41562-023-01749-9</a></p><p>Retraction Note: High replicability of newly discovered social-behavioural findings is achievable:</p><p><a href="https://www.nature.com/articles/s41562-024-01997-3">https://www.nature.com/articles/s41562-024-01997-3</a></p><p>Podcast episode discussing the retraction in depth:</p><p><a href="https://open.spotify.com/episode/3rygrbUNocfCEEGd1Byn0V?si=vJDuzQT3S7yJqDEUMycF1w&t=178">https://open.spotify.com/episode/3rygrbUNocfCEEGd1Byn0V?si=vJDuzQT3S7yJqDEUMycF1w&t=178</a></p><p><strong>Other:</strong></p><p>This episode was recorded in a hotel lobby corner with music playing in the background. If the audio sounds a little unusual at times it is because of the noise removal being used to remove that noise being combined with other ‘sound enhancement’ features. I had to go back in and play around with the audio directly before I was even a little happy.  The tools work well but they are a little unpredictable.  I am increasingly wary of ‘it just works’ audio editing tools. I would have left it in, but the bots chasing copyright infringement are ravenous and indiscriminate. </p>
]]></content:encoded>
      <enclosure length="27280948" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/f69a829b-0787-43ca-aaeb-4862e2d1d3ca/audio/19beb304-2f56-41ea-91a6-fed5575f558f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Open Science Revolution: Building Trust with Transparency</itunes:title>
      <itunes:author>Asier Moneva</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/372cde22-bda3-4f48-b8ab-41bb9d22f2ed/3000x3000/ep111.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:24</itunes:duration>
      <itunes:summary>In this episode, Asier Moneva, a cybercrime researcher at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and the Center of Expertise Cyber Security at The Hague University of Applied Sciences, discusses the transformative principles of open science. Asier explores how transparency and replicability can shape a more credible and collaborative research environment, sharing his experience with open science practices such as preregistration, registered reports, and open-access data. We discuss the challenges in open science such as those posed by academic pressures, like the &apos;publish or perish&apos; culture, and highlight how open science practices benefit both researchers and the public.</itunes:summary>
      <itunes:subtitle>In this episode, Asier Moneva, a cybercrime researcher at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and the Center of Expertise Cyber Security at The Hague University of Applied Sciences, discusses the transformative principles of open science. Asier explores how transparency and replicability can shape a more credible and collaborative research environment, sharing his experience with open science practices such as preregistration, registered reports, and open-access data. We discuss the challenges in open science such as those posed by academic pressures, like the &apos;publish or perish&apos; culture, and highlight how open science practices benefit both researchers and the public.</itunes:subtitle>
      <itunes:keywords>academia, research, cybercrime, science, publishing, open data, open science</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b0a724ed-cafe-422b-9991-54597e027a80</guid>
      <title>Cinematic Cybersecurity: What are movies teaching us about passwords?</title>
      <description><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>The research focuses on analyzing the representation of passwords and cyber threats in films, particularly how password guessing and hacking scenes influence public perceptions of security.</li><li>Movies both reflect societal attitudes towards cybersecurity and shape them, as many viewers learn about cyber behaviors through entertainment rather than formal education.</li><li>The research indicates that films often oversimplify or dramatize hacking scenes, leading to unrealistic expectations about password security.</li><li>A key finding from the research is that while weak passwords (e.g., “12345”) are mocked in films, even strong passwords are often guessed or hacked with ease, sending the wrong message to audiences about the value of strong security practices.</li><li>There may be value to educating the public about cybersecurity in the same way people are taught first aid in Germany—everyone should know the basics.</li><li>One of the challenges of using crowd-sourced subtitle data for academic research was that it required additional work to assure reviewers that the research is ethical.</li></ul><p><strong>About our Guest:</strong></p><p>Maike Raphael</p><p><a href="https://www.itsec.uni-hannover.de/en/usec/team/raphael">https://www.itsec.uni-hannover.de/en/usec/team/raphael</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Raphael, M. M., Kanta, A., Seebonn, R., Dürmuth, M., & Cobb, C. (2024). <i>Batman hacked my password: A subtitle-based analysis of password depiction in movies</i>. In <i>Proceedings of the Twentieth Symposium on Usable Privacy and Security</i> (pp. 199-211). USENIX Association. <a href="https://www.usenix.org/conference/soups2024/presentation/raphael">https://www.usenix.org/conference/soups2024/presentation/raphael</a></p><p> </p><p><strong>Other relevant resources:</strong></p><p>Information and supplementary materials on the paper "Batman Hacked My Password"</p><p><a href="https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies">https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies</a></p><p>If you are interested in the right to download the subtitles.  </p><p>The data source (opensubtitles.org) statement regarding copyright.</p><p><a href="https://www.opensubtitles.org/en/dmca">https://www.opensubtitles.org/en/dmca</a></p><p>The website has an API with the no limit to the total number of subitles that can be downloaded, only rate limiting. The research team didn't obtain the subtitles this way, but the source they got them from may have.  In either case it shows opensubtitles.org views about how their service can be used.  </p><p><a href="https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started">https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started</a></p><p><strong>Other:</strong></p><p>I had a bunch of movie clips that I was going to include as examples, but with the way that platforms handle DMCA I just don't want to have to bother with trying to assert a claim to fair use.  If you are interested I would recommend having a look at the password scene from Horse Feathers (1932) with Groucho Marx, and there is a scene in Iron Man 3 (2013) where Tony Stark asks James Rhodes for his password, and everyone laughs at the bad password.  I recommend you watch Kung Fury from 2015 for their parody treatment of the "hackerman". It is actually on YouTube <a href="https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081">https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081 </a></p><p> </p>
]]></description>
      <pubDate>Tue, 1 Oct 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/cinematic-cybersecurity-what-are-movies-teaching-us-about-passwords-0o2knmpr</link>
      <content:encoded><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>The research focuses on analyzing the representation of passwords and cyber threats in films, particularly how password guessing and hacking scenes influence public perceptions of security.</li><li>Movies both reflect societal attitudes towards cybersecurity and shape them, as many viewers learn about cyber behaviors through entertainment rather than formal education.</li><li>The research indicates that films often oversimplify or dramatize hacking scenes, leading to unrealistic expectations about password security.</li><li>A key finding from the research is that while weak passwords (e.g., “12345”) are mocked in films, even strong passwords are often guessed or hacked with ease, sending the wrong message to audiences about the value of strong security practices.</li><li>There may be value to educating the public about cybersecurity in the same way people are taught first aid in Germany—everyone should know the basics.</li><li>One of the challenges of using crowd-sourced subtitle data for academic research was that it required additional work to assure reviewers that the research is ethical.</li></ul><p><strong>About our Guest:</strong></p><p>Maike Raphael</p><p><a href="https://www.itsec.uni-hannover.de/en/usec/team/raphael">https://www.itsec.uni-hannover.de/en/usec/team/raphael</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Raphael, M. M., Kanta, A., Seebonn, R., Dürmuth, M., & Cobb, C. (2024). <i>Batman hacked my password: A subtitle-based analysis of password depiction in movies</i>. In <i>Proceedings of the Twentieth Symposium on Usable Privacy and Security</i> (pp. 199-211). USENIX Association. <a href="https://www.usenix.org/conference/soups2024/presentation/raphael">https://www.usenix.org/conference/soups2024/presentation/raphael</a></p><p> </p><p><strong>Other relevant resources:</strong></p><p>Information and supplementary materials on the paper "Batman Hacked My Password"</p><p><a href="https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies">https://www.itsec.uni-hannover.de/de/usec/forschung/medien/password-depiction-in-movies</a></p><p>If you are interested in the right to download the subtitles.  </p><p>The data source (opensubtitles.org) statement regarding copyright.</p><p><a href="https://www.opensubtitles.org/en/dmca">https://www.opensubtitles.org/en/dmca</a></p><p>The website has an API with the no limit to the total number of subitles that can be downloaded, only rate limiting. The research team didn't obtain the subtitles this way, but the source they got them from may have.  In either case it shows opensubtitles.org views about how their service can be used.  </p><p><a href="https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started">https://opensubtitles.stoplight.io/docs/opensubtitles-api/e3750fd63a100-getting-started</a></p><p><strong>Other:</strong></p><p>I had a bunch of movie clips that I was going to include as examples, but with the way that platforms handle DMCA I just don't want to have to bother with trying to assert a claim to fair use.  If you are interested I would recommend having a look at the password scene from Horse Feathers (1932) with Groucho Marx, and there is a scene in Iron Man 3 (2013) where Tony Stark asks James Rhodes for his password, and everyone laughs at the bad password.  I recommend you watch Kung Fury from 2015 for their parody treatment of the "hackerman". It is actually on YouTube <a href="https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081">https://youtu.be/bS5P_LAqiVg?si=-OL8Mr1OLY9Dd081 </a></p><p> </p>
]]></content:encoded>
      <enclosure length="27385952" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/68f6f4a3-c3b6-4420-aa4b-5bef50613f42/audio/286c07a2-7418-45d0-b74e-789d93a98bf1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cinematic Cybersecurity: What are movies teaching us about passwords?</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/f40758c7-f2bb-4ed9-bd26-b023aacba9db/3000x3000/ep110.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:30</itunes:duration>
      <itunes:summary>Ever wonder how much influence movies have on your cybersecurity habits? In this episode, Maike Raphael, a PhD student and researcher at the University of Hannover, joins us to discuss her fascinating research into how films depict passwords and cybersecurity. We explore the impact of these depictions on public understanding, what makes a good password (and what doesn&apos;t), and how media shapes our perceptions of cyber risks. Raphael’s analysis covers a dataset of over 97,000 movies and reveals some surprising trends about the intersection of film and cybersecurity awareness.</itunes:summary>
      <itunes:subtitle>Ever wonder how much influence movies have on your cybersecurity habits? In this episode, Maike Raphael, a PhD student and researcher at the University of Hannover, joins us to discuss her fascinating research into how films depict passwords and cybersecurity. We explore the impact of these depictions on public understanding, what makes a good password (and what doesn&apos;t), and how media shapes our perceptions of cyber risks. Raphael’s analysis covers a dataset of over 97,000 movies and reveals some surprising trends about the intersection of film and cybersecurity awareness.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">05a22b88-2cbf-45ff-ace6-3acba57eed24</guid>
      <title>Signals, Deception, and AI: Navigating Trust in the Digital World</title>
      <description><![CDATA[<p><strong>About our Guest</strong>:</p><p>Judith Donath</p><p><a href="https://cyber.harvard.edu/people/jdonath">https://cyber.harvard.edu/people/jdonath</a></p><p><strong>Key Discussion Points</strong>:</p><ul><li><strong>Understanding Signaling Theory:</strong><ul><li>The foundation of signaling theory in communication.</li><li>The balance between honest and deceptive signals.</li></ul></li><li><strong>Evolutionary Biology and Communication:</strong><ul><li>Darwin's insights on animal communication.</li><li>Zahavi's Handicap Principle and its role in ensuring signal honesty.</li><li>Maynard Smith's Index Signals and their reliability without cost.</li></ul></li><li><strong>AI and the Evolution of Communication:</strong><ul><li>The impact of AI on the reliability of communication signals.</li><li>Challenges posed by deepfakes in video and audio.</li><li>The arms race between deception technologies and verification methods.</li></ul></li><li><strong>Cultural and Institutional Roles:</strong><ul><li>How culture and institutions uphold the reliability of signals.</li><li>The interplay between technological advancements and societal norms.</li></ul></li><li><strong>Future of Communication in the Digital Age:</strong><ul><li>Strategies for developing secure communication channels.</li><li>Balancing privacy with the need for verification.</li><li>The role of trusted sources in maintaining signal integrity.</li></ul></li></ul><p><strong>Papers and Books Mentioned</strong>:</p><p>Turing, A. M. (1950). Computing machinery and intelligence. <i>Mind</i>, <i>59</i>(236), 433-460. <a href="https://doi.org/10.1093/mind/LIX.236.433">https://doi.org/10.1093/mind/LIX.236.433</a></p><p>Zahavi, A. (1975). Mate selection—a selection for a handicap. <i>Journal of Theoretical Biology</i>, <i>53</i>(1), 205-214. <a href="https://doi.org/10.1016/0022-5193(75)90111-3">https://doi.org/10.1016/0022-5193(75)90111-3</a></p><p>Veblen, T. (1899). <i>The Theory of the Leisure Class</i>. New York: Macmillan.</p><p><a href="https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdf">https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdf</a></p><p><a href="https://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdf">https://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdf</a></p><p>Weizenbaum, J. (1966). ELIZA—A computer program for the study of natural language communication between man and machine. <i>Communications of the ACM</i>, <i>9</i>(1), 36-45. <a href="https://doi.org/10.1145/365153.365168">https://doi.org/10.1145/365153.365168</a></p><p>Donath, J. S. (2002). Identity and deception in the virtual community. In <i>Communities in cyberspace</i> (pp. 37-68). Routledge.</p><p><a href="https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdf">https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdf</a></p><p>Current Progress on the forthcoming book: Signals, Truth & Design</p><p><a href="https://vivatropolis.com/judith/signalsTruthDesign.html">https://vivatropolis.com/judith/signalsTruthDesign.html</a></p><p>Donath, J. (2014). <i>The social machine: designs for living online</i>. MIT Press.<a href="https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-Online">https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-Online</a></p><p><strong>Other:</strong></p><p>The Story about the Ferrari executive Deepfake attempt</p><p><a href="https://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/">https://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/</a></p><p>We geeked out for a moment on Programming languages. Learn about them here.</p><p>The C language</p><p><a href="https://en.wikipedia.org/wiki/C_(programming_language)">https://en.wikipedia.org/wiki/C_(programming_language)</a></p><p>Introduction to C</p><p><a href="https://www.w3schools.com/c/c_intro.php">https://www.w3schools.com/c/c_intro.php</a></p><p>APL Language</p><p><a href="https://en.wikipedia.org/wiki/APL_(programming_language)">https://en.wikipedia.org/wiki/APL_(programming_language)</a></p><p>Learn APL</p><p><a href="https://xpqz.github.io/learnapl/intro.html">https://xpqz.github.io/learnapl/intro.html</a></p><p>Try APL</p><p><a href="https://tryapl.org/">https://tryapl.org</a></p><p>LISP Language</p><p><a href="https://en.wikipedia.org/wiki/Lisp_(programming_language)">https://en.wikipedia.org/wiki/Lisp_(programming_language)</a></p><p>Learn LISP</p><p><a href="https://www.geeksforgeeks.org/introduction-to-lisp/">https://www.geeksforgeeks.org/introduction-to-lisp/</a></p>
]]></description>
      <pubDate>Sun, 1 Sep 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Judith Donath)</author>
      <link>https://cybercrimeology.com/episodes/signals-deception-and-ai-navigating-trust-in-the-digital-world-WphnescW</link>
      <content:encoded><![CDATA[<p><strong>About our Guest</strong>:</p><p>Judith Donath</p><p><a href="https://cyber.harvard.edu/people/jdonath">https://cyber.harvard.edu/people/jdonath</a></p><p><strong>Key Discussion Points</strong>:</p><ul><li><strong>Understanding Signaling Theory:</strong><ul><li>The foundation of signaling theory in communication.</li><li>The balance between honest and deceptive signals.</li></ul></li><li><strong>Evolutionary Biology and Communication:</strong><ul><li>Darwin's insights on animal communication.</li><li>Zahavi's Handicap Principle and its role in ensuring signal honesty.</li><li>Maynard Smith's Index Signals and their reliability without cost.</li></ul></li><li><strong>AI and the Evolution of Communication:</strong><ul><li>The impact of AI on the reliability of communication signals.</li><li>Challenges posed by deepfakes in video and audio.</li><li>The arms race between deception technologies and verification methods.</li></ul></li><li><strong>Cultural and Institutional Roles:</strong><ul><li>How culture and institutions uphold the reliability of signals.</li><li>The interplay between technological advancements and societal norms.</li></ul></li><li><strong>Future of Communication in the Digital Age:</strong><ul><li>Strategies for developing secure communication channels.</li><li>Balancing privacy with the need for verification.</li><li>The role of trusted sources in maintaining signal integrity.</li></ul></li></ul><p><strong>Papers and Books Mentioned</strong>:</p><p>Turing, A. M. (1950). Computing machinery and intelligence. <i>Mind</i>, <i>59</i>(236), 433-460. <a href="https://doi.org/10.1093/mind/LIX.236.433">https://doi.org/10.1093/mind/LIX.236.433</a></p><p>Zahavi, A. (1975). Mate selection—a selection for a handicap. <i>Journal of Theoretical Biology</i>, <i>53</i>(1), 205-214. <a href="https://doi.org/10.1016/0022-5193(75)90111-3">https://doi.org/10.1016/0022-5193(75)90111-3</a></p><p>Veblen, T. (1899). <i>The Theory of the Leisure Class</i>. New York: Macmillan.</p><p><a href="https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdf">https://moglen.law.columbia.edu/LCS/theoryleisureclass.pdf</a></p><p><a href="https://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdf">https://dn720401.ca.archive.org/0/items/theoryofleisurec01vebl/theoryofleisurec01vebl.pdf</a></p><p>Weizenbaum, J. (1966). ELIZA—A computer program for the study of natural language communication between man and machine. <i>Communications of the ACM</i>, <i>9</i>(1), 36-45. <a href="https://doi.org/10.1145/365153.365168">https://doi.org/10.1145/365153.365168</a></p><p>Donath, J. S. (2002). Identity and deception in the virtual community. In <i>Communities in cyberspace</i> (pp. 37-68). Routledge.</p><p><a href="https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdf">https://vivatropolis.com/papers/Donath/IdentityDeception/IdentityDeception.pdf</a></p><p>Current Progress on the forthcoming book: Signals, Truth & Design</p><p><a href="https://vivatropolis.com/judith/signalsTruthDesign.html">https://vivatropolis.com/judith/signalsTruthDesign.html</a></p><p>Donath, J. (2014). <i>The social machine: designs for living online</i>. MIT Press.<a href="https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-Online">https://direct.mit.edu/books/monograph/4037/The-Social-MachineDesigns-for-Living-Online</a></p><p><strong>Other:</strong></p><p>The Story about the Ferrari executive Deepfake attempt</p><p><a href="https://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/">https://www.carscoops.com/2024/07/ferrari-ceo-impersonator-uncovered-by-colleague-in-deepfake-call/</a></p><p>We geeked out for a moment on Programming languages. Learn about them here.</p><p>The C language</p><p><a href="https://en.wikipedia.org/wiki/C_(programming_language)">https://en.wikipedia.org/wiki/C_(programming_language)</a></p><p>Introduction to C</p><p><a href="https://www.w3schools.com/c/c_intro.php">https://www.w3schools.com/c/c_intro.php</a></p><p>APL Language</p><p><a href="https://en.wikipedia.org/wiki/APL_(programming_language)">https://en.wikipedia.org/wiki/APL_(programming_language)</a></p><p>Learn APL</p><p><a href="https://xpqz.github.io/learnapl/intro.html">https://xpqz.github.io/learnapl/intro.html</a></p><p>Try APL</p><p><a href="https://tryapl.org/">https://tryapl.org</a></p><p>LISP Language</p><p><a href="https://en.wikipedia.org/wiki/Lisp_(programming_language)">https://en.wikipedia.org/wiki/Lisp_(programming_language)</a></p><p>Learn LISP</p><p><a href="https://www.geeksforgeeks.org/introduction-to-lisp/">https://www.geeksforgeeks.org/introduction-to-lisp/</a></p>
]]></content:encoded>
      <enclosure length="42423695" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/91b57ac2-4adf-49aa-b7a9-e73fd7f5bcd9/audio/d26bc1de-8fb7-43dc-861f-44f62639fa90/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Signals, Deception, and AI: Navigating Trust in the Digital World</itunes:title>
      <itunes:author>Judith Donath</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/b3cfd0fe-9397-4d73-92a6-7588f9d54cd2/3000x3000/ep109.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:09</itunes:duration>
      <itunes:summary>In this episode, we dive into the fascinating world of signaling theory with Judith Donath, a faculty advisor at the Berkman Klein Center for Internet &amp; Society at Harvard University and author of The Social Machine. We explore  signaling theory and its roots in biology and human communication and how it applies to today&apos;s digital ecosystems. With the rapid advancement of AI, deep fakes, and machine learning, the integrity of communication and signals is more crucial than ever. How can we distinguish between genuine signals and those designed to deceive us?</itunes:summary>
      <itunes:subtitle>In this episode, we dive into the fascinating world of signaling theory with Judith Donath, a faculty advisor at the Berkman Klein Center for Internet &amp; Society at Harvard University and author of The Social Machine. We explore  signaling theory and its roots in biology and human communication and how it applies to today&apos;s digital ecosystems. With the rapid advancement of AI, deep fakes, and machine learning, the integrity of communication and signals is more crucial than ever. How can we distinguish between genuine signals and those designed to deceive us?</itunes:subtitle>
      <itunes:keywords>ai, communication, research, cybercrime, signals, signalling theory, elections, cybersecurity, fraud, education, artificial intelligence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">36b41747-3106-4361-a7bf-394773817fca</guid>
      <title>Mapping the Digital Threat: The Geography of Cybercrime</title>
      <description><![CDATA[<p>Notes:</p><ul><li><strong>Background in Sociology</strong>: Dr. Miranda Bruce started in sociology, focusing on the dynamics of power and institutions.</li><li><strong>PhD Research</strong>: Her PhD explored the Internet of Things (IoT) using post-structuralist French theory to understand technological reality.</li><li><strong>Transition to Cybercrime</strong>: Transitioned from IoT research to a project on the geography of cybercrime, partnering with a local Australian university and the University of Oxford.</li><li><strong>Cybercrime as a Local Phenomenon</strong>: Emphasized that cybercrime is not just a global issue but has significant local dimensions.</li><li><strong>Mapping Cybercrime</strong>: Developed methods to map cybercrime hotspots to understand where cybercrime is coming from and why.</li><li><strong>Importance of Local Factors</strong>: Identified that local factors play a crucial role in the proliferation of cybercrime in specific areas.</li><li><strong>Intervention Strategies</strong>: Stressed that intervention strategies must be tailored to local conditions as one-size-fits-all approaches are ineffective.</li><li><strong>Challenges in Measuring Cybercrime</strong>: Discussed the difficulties in accurately measuring where cybercrime originates due to technical limitations.</li><li><strong>Survey of Experts</strong>: Utilized expert surveys from cybercrime intelligence and investigations to gather data on cybercrime hotspots.</li><li><strong>Bias in Data Collection</strong>: Addressed potential biases in the data collection process and took steps to ensure diverse and reliable sources.</li><li><strong>Use of Proxy Data</strong>: Chose expert survey data over technical measures or legal cases to get more accurate insights into cybercrime geography.</li><li><strong>Findings</strong>: Key findings indicated that countries like Russia, Ukraine, China, the United States, and Nigeria are significant sources of cybercrime.</li><li><strong>Analysis of Results</strong>: Plans to analyze the collected data to create theoretical models explaining why cybercrime is prevalent in certain areas.</li><li><strong>Future Research Directions</strong>: Aims to develop detailed case studies and collaborate with policymakers to use the data for effective interventions.</li><li><strong>Open Data</strong>: Highlighted the importance of making the data open source to enable further research and collaboration across disciplines.</li></ul><p><strong>About our guests:</strong></p><p>Dr Miranda Bruce:</p><p><a href="https://www.sociology.ox.ac.uk/people/miranda-bruce">https://www.sociology.ox.ac.uk/people/miranda-bruce</a></p><p><a href="https://www.unsw.edu.au/staff/miranda-bruce">https://www.unsw.edu.au/staff/miranda-bruce</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><ul><li>Bruce, M., Lusthaus, J., Kashyap, R., Phair, N., & Varese, F. (2024). Mapping the global geography of cybercrime with the World Cybercrime Index. <i>PLOS ONE</i>. <a href="https://doi.org/10.1371/journal.pone.0249850">https://doi.org/10.1371/journal.pone.0249850</a></li><li>Bruce, M., & Phair, N. (2020). Mapping the geography of cybercrime: A review of indices of digital offending by country. <i>IEEE European Symposium on Security and Privacy</i>. <a href="https://doi.org/10.1109/EuroSPW51379.2020.00013">https://doi.org/10.1109/EuroSPW51379.2020.00013</a></li></ul><p><strong>Other:</strong></p><p>If you were interested in the topic of this episode, you might also enjoy episode 36 "Cyber criminals are people too". </p>
]]></description>
      <pubDate>Thu, 1 Aug 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Miranda Bruce)</author>
      <link>https://cybercrimeology.com/episodes/mapping-the-digital-threat-the-geography-of-cybercrime-lR8SMjCQ</link>
      <content:encoded><![CDATA[<p>Notes:</p><ul><li><strong>Background in Sociology</strong>: Dr. Miranda Bruce started in sociology, focusing on the dynamics of power and institutions.</li><li><strong>PhD Research</strong>: Her PhD explored the Internet of Things (IoT) using post-structuralist French theory to understand technological reality.</li><li><strong>Transition to Cybercrime</strong>: Transitioned from IoT research to a project on the geography of cybercrime, partnering with a local Australian university and the University of Oxford.</li><li><strong>Cybercrime as a Local Phenomenon</strong>: Emphasized that cybercrime is not just a global issue but has significant local dimensions.</li><li><strong>Mapping Cybercrime</strong>: Developed methods to map cybercrime hotspots to understand where cybercrime is coming from and why.</li><li><strong>Importance of Local Factors</strong>: Identified that local factors play a crucial role in the proliferation of cybercrime in specific areas.</li><li><strong>Intervention Strategies</strong>: Stressed that intervention strategies must be tailored to local conditions as one-size-fits-all approaches are ineffective.</li><li><strong>Challenges in Measuring Cybercrime</strong>: Discussed the difficulties in accurately measuring where cybercrime originates due to technical limitations.</li><li><strong>Survey of Experts</strong>: Utilized expert surveys from cybercrime intelligence and investigations to gather data on cybercrime hotspots.</li><li><strong>Bias in Data Collection</strong>: Addressed potential biases in the data collection process and took steps to ensure diverse and reliable sources.</li><li><strong>Use of Proxy Data</strong>: Chose expert survey data over technical measures or legal cases to get more accurate insights into cybercrime geography.</li><li><strong>Findings</strong>: Key findings indicated that countries like Russia, Ukraine, China, the United States, and Nigeria are significant sources of cybercrime.</li><li><strong>Analysis of Results</strong>: Plans to analyze the collected data to create theoretical models explaining why cybercrime is prevalent in certain areas.</li><li><strong>Future Research Directions</strong>: Aims to develop detailed case studies and collaborate with policymakers to use the data for effective interventions.</li><li><strong>Open Data</strong>: Highlighted the importance of making the data open source to enable further research and collaboration across disciplines.</li></ul><p><strong>About our guests:</strong></p><p>Dr Miranda Bruce:</p><p><a href="https://www.sociology.ox.ac.uk/people/miranda-bruce">https://www.sociology.ox.ac.uk/people/miranda-bruce</a></p><p><a href="https://www.unsw.edu.au/staff/miranda-bruce">https://www.unsw.edu.au/staff/miranda-bruce</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><ul><li>Bruce, M., Lusthaus, J., Kashyap, R., Phair, N., & Varese, F. (2024). Mapping the global geography of cybercrime with the World Cybercrime Index. <i>PLOS ONE</i>. <a href="https://doi.org/10.1371/journal.pone.0249850">https://doi.org/10.1371/journal.pone.0249850</a></li><li>Bruce, M., & Phair, N. (2020). Mapping the geography of cybercrime: A review of indices of digital offending by country. <i>IEEE European Symposium on Security and Privacy</i>. <a href="https://doi.org/10.1109/EuroSPW51379.2020.00013">https://doi.org/10.1109/EuroSPW51379.2020.00013</a></li></ul><p><strong>Other:</strong></p><p>If you were interested in the topic of this episode, you might also enjoy episode 36 "Cyber criminals are people too". </p>
]]></content:encoded>
      <enclosure length="31296000" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/868e7ce2-8b42-402b-bad0-8240558d0de2/audio/268c704f-302e-4c47-9de1-794dd68ba5b5/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Mapping the Digital Threat: The Geography of Cybercrime</itunes:title>
      <itunes:author>Miranda Bruce</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/69d6ba64-2bcb-4292-b5d4-c434ab3006bf/3000x3000/ep108.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:34</itunes:duration>
      <itunes:summary>In this episode, we sit down with Dr. Miranda Bruce, to discuss research mapping the global landscape of cybercrime and the importance of understanding local factors that contribute to digital offenses. She discusses the challenges of measuring cybercrime, the innovative use of expert surveys, and the development of the World Cybercrime Index. </itunes:summary>
      <itunes:subtitle>In this episode, we sit down with Dr. Miranda Bruce, to discuss research mapping the global landscape of cybercrime and the importance of understanding local factors that contribute to digital offenses. She discusses the challenges of measuring cybercrime, the innovative use of expert surveys, and the development of the World Cybercrime Index. </itunes:subtitle>
      <itunes:keywords>digital geography, innovative research, global landscape, research, cybercrime, miranda bruce, data mapping, world cybercrime index, local factors, criminology, cybercrime measurement, cyber security, cyber threats, geography, expert surveys, law enforcement, cybercriminal activity, digital offenses, education, policy-making, cybercrime hotspots, research methods, cybercrimeology podcast.</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">982bc790-32da-4cbe-b790-cb1e1a15061b</guid>
      <title>Policing Street Trolls: Navigating Cop Baiting and Digital Extremism</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><p> </p><ul><li><strong>Dual Research Focus</strong>: Dr. Huey historically focused on policing and victimization, particularly in marginalized communities.</li><li><strong>Burnout and Shift</strong>: Burnout from trauma research led her to shift focus to applied policing research around 2012-2013.</li><li><strong>Economics of Policing</strong>: The federal government's focus on the costs of policing and the "economics of policing" initiative influenced her new research direction.</li><li><strong>Research Gaps</strong>: Realized that existing policing research in Canada had little practical value for informing policing practice and policy.</li><li><strong>Evidence-Based Policing</strong>: Joined the Society for Evidence-Based Policing (SEBP) in the UK to produce actionable research for police and policymakers.</li><li><strong>Right-Wing Extremism</strong>: Discussed the rise of right-wing extremism and its new tactic of targeting police officers, including cop baiting.</li><li><strong>Cop Baiting Incidents</strong>: Examples include interventions by Romana Didulo at the Peterborough Police Service and incidents in Vancouver during trans rights celebrations.</li><li><strong>Operational Stress</strong>: Emphasized the operational stress injuries faced by police officers due to regular exposure to horrific incidents.</li><li><strong>Public Misconceptions</strong>: Highlighted the issue of public and media criticism of police without a full understanding of the complexities involved.</li><li><strong>Misinformation</strong>: Explained how misinformation and disinformation spread about police actions, leading to doxxing and harassment of officers.</li><li><strong>Cyber Sleuths</strong>: Described incidents where online activists exposed personal information about police officers, increasing the risks they face.</li><li><strong>Convoy Protests</strong>: Referenced research on convoy protests and the targeting of police, emphasizing the reality versus media portrayal.</li><li><strong>False Narratives</strong>: Pointed out the persistence of false narratives, such as those surrounding the death of Regis Korchinski-Paquet, which continue to spread online despite being disproven.</li><li><strong>Call for Applied Research</strong>: Called for more applied research to address specific issues in policing and cyber-security rather than broad theoretical studies, stressing the need for better public education to combat misinformation.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Laura Huey</p><p><a href="https://sociology.uwo.ca/people/profiles/Huey.html">https://sociology.uwo.ca/people/profiles/Huey.html</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Huey, L., & Ferguson, L. (2024). ‘No one wants to end up on YouTube’: sousveillance and ‘cop-baiting’ in Canadian policing. <i>Policing and Society</i>, 1–18. <a href="https://doi.org/10.1080/10439463.2024.2329239">https://doi.org/10.1080/10439463.2024.2329239</a></p><p>Huey, L., & Ferguson, L. (2024). “All These Crazies”: Right-Wing Anti-Authoritarian Politics and the Targeting of Public Police. <i>Deviant Behavior</i>, 1–20. <a href="https://doi.org/10.1080/01639625.2024.2338890">https://doi.org/10.1080/01639625.2024.2338890</a></p><p>Huey, L. (2024) The Cascade Effect: An Oral History of the Policing of the Convoy Protests, Independant: <strong>979-8882979859</strong></p><p><strong>Other:</strong></p><p>Dr Huey provided her own ‘bleep’ noises for this episode to save me the work of having to add them in post production.</p>
]]></description>
      <pubDate>Mon, 1 Jul 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Laura Huey)</author>
      <link>https://cybercrimeology.com/episodes/policing-street-trolls-navigating-cop-baiting-and-digital-extremism-QrAurDU5</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><p> </p><ul><li><strong>Dual Research Focus</strong>: Dr. Huey historically focused on policing and victimization, particularly in marginalized communities.</li><li><strong>Burnout and Shift</strong>: Burnout from trauma research led her to shift focus to applied policing research around 2012-2013.</li><li><strong>Economics of Policing</strong>: The federal government's focus on the costs of policing and the "economics of policing" initiative influenced her new research direction.</li><li><strong>Research Gaps</strong>: Realized that existing policing research in Canada had little practical value for informing policing practice and policy.</li><li><strong>Evidence-Based Policing</strong>: Joined the Society for Evidence-Based Policing (SEBP) in the UK to produce actionable research for police and policymakers.</li><li><strong>Right-Wing Extremism</strong>: Discussed the rise of right-wing extremism and its new tactic of targeting police officers, including cop baiting.</li><li><strong>Cop Baiting Incidents</strong>: Examples include interventions by Romana Didulo at the Peterborough Police Service and incidents in Vancouver during trans rights celebrations.</li><li><strong>Operational Stress</strong>: Emphasized the operational stress injuries faced by police officers due to regular exposure to horrific incidents.</li><li><strong>Public Misconceptions</strong>: Highlighted the issue of public and media criticism of police without a full understanding of the complexities involved.</li><li><strong>Misinformation</strong>: Explained how misinformation and disinformation spread about police actions, leading to doxxing and harassment of officers.</li><li><strong>Cyber Sleuths</strong>: Described incidents where online activists exposed personal information about police officers, increasing the risks they face.</li><li><strong>Convoy Protests</strong>: Referenced research on convoy protests and the targeting of police, emphasizing the reality versus media portrayal.</li><li><strong>False Narratives</strong>: Pointed out the persistence of false narratives, such as those surrounding the death of Regis Korchinski-Paquet, which continue to spread online despite being disproven.</li><li><strong>Call for Applied Research</strong>: Called for more applied research to address specific issues in policing and cyber-security rather than broad theoretical studies, stressing the need for better public education to combat misinformation.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Laura Huey</p><p><a href="https://sociology.uwo.ca/people/profiles/Huey.html">https://sociology.uwo.ca/people/profiles/Huey.html</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Huey, L., & Ferguson, L. (2024). ‘No one wants to end up on YouTube’: sousveillance and ‘cop-baiting’ in Canadian policing. <i>Policing and Society</i>, 1–18. <a href="https://doi.org/10.1080/10439463.2024.2329239">https://doi.org/10.1080/10439463.2024.2329239</a></p><p>Huey, L., & Ferguson, L. (2024). “All These Crazies”: Right-Wing Anti-Authoritarian Politics and the Targeting of Public Police. <i>Deviant Behavior</i>, 1–20. <a href="https://doi.org/10.1080/01639625.2024.2338890">https://doi.org/10.1080/01639625.2024.2338890</a></p><p>Huey, L. (2024) The Cascade Effect: An Oral History of the Policing of the Convoy Protests, Independant: <strong>979-8882979859</strong></p><p><strong>Other:</strong></p><p>Dr Huey provided her own ‘bleep’ noises for this episode to save me the work of having to add them in post production.</p>
]]></content:encoded>
      <enclosure length="32183281" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/31e7f29f-b609-418a-bccb-9d51e5be7bde/audio/26736647-d8b7-4c15-b412-038cb2f4df6d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Policing Street Trolls: Navigating Cop Baiting and Digital Extremism</itunes:title>
      <itunes:author>Laura Huey</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/1d020089-1b92-4f2e-a3ac-85b0b6ff7d08/3000x3000/ep107.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:29</itunes:duration>
      <itunes:summary>In this episode of Cybercrimeology, we speak with Dr. Laura Huey, Professor of Sociology at the University of Western Ontario, about the rising phenomenon of cyber cop baiting and its impact on law enforcement. Dr. Huey delves into the difficulties faced by police officers, the spread of misinformation, and the role of right-wing extremism in targeting police offline for online. Join us as we explore the complexities of policing in the digital age and the importance of evidence-based research in addressing these challenges.</itunes:summary>
      <itunes:subtitle>In this episode of Cybercrimeology, we speak with Dr. Laura Huey, Professor of Sociology at the University of Western Ontario, about the rising phenomenon of cyber cop baiting and its impact on law enforcement. Dr. Huey delves into the difficulties faced by police officers, the spread of misinformation, and the role of right-wing extremism in targeting police offline for online. Join us as we explore the complexities of policing in the digital age and the importance of evidence-based research in addressing these challenges.</itunes:subtitle>
      <itunes:keywords>society for evidence-based policing, viral media, right-wing extremism, dr. laura huey, evidence-based policing, public policy and policing, internet-based attacks, digital security, social media harassment, cop-baiting, research, cybercrime, victimization research, doxxing, criminology, canadian policing practices, misinformation, public misconceptions of police, operational stress injuries, cyber threats, convoy protests, cyber cop baiting, social media impact on policing, digital extremism, police stress, law enforcement, policing research, online radicalization, cyber extremism, cyber harassment, shadowy figures, education, social media, policing challenges</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02d1914b-765b-401a-a0eb-77fd079ea57a</guid>
      <title>Timing is Everything: Context-Based Cybersecurity Training</title>
      <description><![CDATA[<p><strong>Notes</strong>:</p><ul><li>Joakim Kävrestad is an Assistant Professor of Computer Science at Jönköping University, with a background in networking and cybersecurity.</li><li>He shifted his focus to the societal and psychological aspects of cybersecurity, emphasizing human behavior.</li><li>Joakim developed Context-Based Micro-Training (CBMT) to provide cybersecurity training at relevant moments, improving user engagement and retention.</li><li>CBMT integrates training into real-world scenarios, such as reading emails or creating passwords, to address common cyberattack methods.</li><li>Traditional cybersecurity training methods are critiqued for their lack of effectiveness in retaining user attention and knowledge.</li><li>Joakim used a design science approach to refine CBMT, involving over 1800 survey participants and 300 experiment participants in the process.</li><li>Evaluations show that CBMT supports secure user behavior and is well-received by users.</li><li>The importance of usability in security practices is emphasized, highlighting that user-friendly training increases adoption and compliance.</li><li>CBMT provides a guide for practitioners on implementing effective cybersecurity training and supports procurement decisions.</li><li>Future research should explore the interplay between training and other support mechanisms, as training alone is insufficient to ensure comprehensive cybersecurity.</li></ul><p><strong>About our guests:</strong></p><p>Joakim Kävrestad</p><p><a href="https://ju.se/personinfo.html?sign=KAVJOA">https://ju.se/personinfo.html?sign=KAVJOA</a></p><p><a href="https://www.linkedin.com/in/joakimkavrestad/">https://www.linkedin.com/in/joakimkavrestad/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><ol><li>Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., & Furnell, S. (2022). Evaluation of Contextual and Game-Based Training for Phishing Detection. <i>Future Internet, 14</i>(4), 104. <a href="https://doi.org/10.3390/fi14040104">https://doi.org/10.3390/fi14040104</a></li><li>Kävrestad, J. (2022). <i>Context-Based Micro-Training: Enhancing Cybersecurity Training for End-Users</i> (Doctoral dissertation). University of Skövde. ISBN 978-91-984919-9-9. <a href="https://his.diva-portal.org/smash/record.jsf?pid=diva2:1645965">Link to dissertation</a></li><li>Kävrestad, J., & Nohlberg, M. (2020). Context-Based Micro-Training: A Framework for Information Security Training. <i>14th International Symposium on Human Aspects of Information Security and Assurance (HAISA)</i>, Mytilene, Lesbos, Greece, 71-81. <a href="https://doi.org/10.1007/978-3-030-57404-8_6">https://doi.org/10.1007/978-3-030-57404-8_6</a></li></ol><p><strong>Other:</strong></p><p>The button that makes a noise at a street crossing is called a “pedestrian call button” Interestingly they work differently in different countries, They look different, they feel different, they make different noises, some of them have haptic indicators, some call for the lights to change, some don’t, some make sound all the time others just provide more accessible indicators when pressed.</p>
]]></description>
      <pubDate>Sat, 1 Jun 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Joakim Kävrestad)</author>
      <link>https://cybercrimeology.com/episodes/timing-is-everything-context-based-cybersecurity-training-Q_1Tzdo6</link>
      <content:encoded><![CDATA[<p><strong>Notes</strong>:</p><ul><li>Joakim Kävrestad is an Assistant Professor of Computer Science at Jönköping University, with a background in networking and cybersecurity.</li><li>He shifted his focus to the societal and psychological aspects of cybersecurity, emphasizing human behavior.</li><li>Joakim developed Context-Based Micro-Training (CBMT) to provide cybersecurity training at relevant moments, improving user engagement and retention.</li><li>CBMT integrates training into real-world scenarios, such as reading emails or creating passwords, to address common cyberattack methods.</li><li>Traditional cybersecurity training methods are critiqued for their lack of effectiveness in retaining user attention and knowledge.</li><li>Joakim used a design science approach to refine CBMT, involving over 1800 survey participants and 300 experiment participants in the process.</li><li>Evaluations show that CBMT supports secure user behavior and is well-received by users.</li><li>The importance of usability in security practices is emphasized, highlighting that user-friendly training increases adoption and compliance.</li><li>CBMT provides a guide for practitioners on implementing effective cybersecurity training and supports procurement decisions.</li><li>Future research should explore the interplay between training and other support mechanisms, as training alone is insufficient to ensure comprehensive cybersecurity.</li></ul><p><strong>About our guests:</strong></p><p>Joakim Kävrestad</p><p><a href="https://ju.se/personinfo.html?sign=KAVJOA">https://ju.se/personinfo.html?sign=KAVJOA</a></p><p><a href="https://www.linkedin.com/in/joakimkavrestad/">https://www.linkedin.com/in/joakimkavrestad/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><ol><li>Kävrestad, J., Hagberg, A., Nohlberg, M., Rambusch, J., Roos, R., & Furnell, S. (2022). Evaluation of Contextual and Game-Based Training for Phishing Detection. <i>Future Internet, 14</i>(4), 104. <a href="https://doi.org/10.3390/fi14040104">https://doi.org/10.3390/fi14040104</a></li><li>Kävrestad, J. (2022). <i>Context-Based Micro-Training: Enhancing Cybersecurity Training for End-Users</i> (Doctoral dissertation). University of Skövde. ISBN 978-91-984919-9-9. <a href="https://his.diva-portal.org/smash/record.jsf?pid=diva2:1645965">Link to dissertation</a></li><li>Kävrestad, J., & Nohlberg, M. (2020). Context-Based Micro-Training: A Framework for Information Security Training. <i>14th International Symposium on Human Aspects of Information Security and Assurance (HAISA)</i>, Mytilene, Lesbos, Greece, 71-81. <a href="https://doi.org/10.1007/978-3-030-57404-8_6">https://doi.org/10.1007/978-3-030-57404-8_6</a></li></ol><p><strong>Other:</strong></p><p>The button that makes a noise at a street crossing is called a “pedestrian call button” Interestingly they work differently in different countries, They look different, they feel different, they make different noises, some of them have haptic indicators, some call for the lights to change, some don’t, some make sound all the time others just provide more accessible indicators when pressed.</p>
]]></content:encoded>
      <enclosure length="33314682" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/843ae995-8c29-4f69-b1a9-b05f01f8ed3e/audio/b86568fc-a9b0-4c59-85ec-82269c51561f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Timing is Everything: Context-Based Cybersecurity Training</itunes:title>
      <itunes:author>Joakim Kävrestad</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/a099a768-3165-4cf7-82fa-250d6084a191/3000x3000/ep106.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:40</itunes:duration>
      <itunes:summary>In this episode of Cybercrimeology, we are joined by Joakim Kävrestad, an Assistant Professor of Computer Science at the School of Engineering, Jönköping University in Sweden. Joakim shares his journey from a technical background in networking and cybersecurity to focusing on the societal and psychological aspects of security. He discusses his innovative work on Context-Based Micro-Training (CBMT), a method that enhances cybersecurity training by delivering relevant information to users at the precise moment they need it. We discuss the design science approach to research and compare our favourite pieces of bad cybersecurity advice.  </itunes:summary>
      <itunes:subtitle>In this episode of Cybercrimeology, we are joined by Joakim Kävrestad, an Assistant Professor of Computer Science at the School of Engineering, Jönköping University in Sweden. Joakim shares his journey from a technical background in networking and cybersecurity to focusing on the societal and psychological aspects of security. He discusses his innovative work on Context-Based Micro-Training (CBMT), a method that enhances cybersecurity training by delivering relevant information to users at the precise moment they need it. We discuss the design science approach to research and compare our favourite pieces of bad cybersecurity advice.  </itunes:subtitle>
      <itunes:keywords>passwords, cybercrime training, usable security, research, cybercrime, training, phishing, seta, cybersecurity awareness, context-based micro-training, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d247ae01-e37b-4dbf-bfb9-def36dc862fa</guid>
      <title>Hackting Out: Defacement and Hate Online amid Global Conflicts</title>
      <description><![CDATA[<p><strong> Notes:</strong></p><ul><li><strong>Introduction to Cybercrime Research</strong>: Dr. Hutchings and Ahn Vu introduce their work at the Cambridge Cybercrime Centre.</li><li><strong>Global Conflicts and Cyber Activities</strong>: Discussion on how global conflicts, such as those in Ukraine and Israel-Gaza, spur cybercrime activities like website defacements and DDoS attacks.</li><li><strong>Cyber Tactics During Warfare</strong>: Insights into how cyber tactics are employed quickly after conflicts start, with a focus on how these activities serve both political propaganda and cybercriminal interests.</li><li><strong>Deplatforming Hate Groups</strong>: In-depth analysis of the challenges faced when deplatforming hate groups, specifically referencing the Kiwi Farms case.</li><li><strong>Temporary Effects of Cyber Attacks</strong>: Observations on the short-lived nature of heightened cyber activities post-conflict, with a decline in interest and activities after initial spikes.</li><li><strong>Challenges of Cybercrime Research</strong>: Discussion on the difficulties in tracking and attributing cyber attacks, particularly those by decentralized and loosely organized groups.</li><li><strong>Unintended Consequences of Deplatforming</strong>: Exploration of how attempts to silence harmful online communities can lead to increased attention and unintended reinforcement of these groups.</li><li><strong>Closing Thoughts</strong>: Dr. Hutchings and Ahn Vu summarize the ongoing challenges and the evolving landscape of cybercrime in the context of international security and online governance.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Alice Hutchings:</p><p><a href="https://www.cl.cam.ac.uk/~ah793/">https://www.cl.cam.ac.uk/~ah793/</a></p><p>Anh V. Vu</p><p><a href="https://www.cst.cam.ac.uk/people/vv301">https://www.cst.cam.ac.uk/people/vv301</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Anh V. Vu, Alice Hutchings, Ross Anderson. <a href="https://can01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fanhvvcs.github.io%2Fstatic%2Fmedia%2Fvu2024no.pdf&data=05%7C02%7Cmichael.joyce%40umontreal.ca%7Ce056fbc785874d2a073908dc69dc21a8%7Cd27eefec2a474be7981e0f8977fa31d8%7C1%7C0%7C638501642055483052%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=444fmOY%2BE%2BC6aboepTVvXAAkhjvQVWZ3HHCO39Be9Qg%3D&reserved=0">No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment</a>. In Proceedings of the IEEE Symposium on Security and Privacy (S&P'24)</p><p>Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross Anderson. <a href="https://can01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fanhvvcs.github.io%2Fstatic%2Fmedia%2Fvu2024getting.pdf&data=05%7C02%7Cmichael.joyce%40umontreal.ca%7Ce056fbc785874d2a073908dc69dc21a8%7Cd27eefec2a474be7981e0f8977fa31d8%7C1%7C0%7C638501642055495526%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=MyvdgouovmIr4BXaJmicfpk5Eun5rIFWZGKIz36P4QA%3D&reserved=0">Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict</a>. In Proceedings of the ACM World Wide Web Conference (WWW'24)</p><p><strong>Other</strong>:</p><ul><li>No AI's were harmed during the creation of this episode, however they were definitely involved in the work of editing and drafting copy.</li><li>If you want to hear more from Dr. Hutchings, you can find her way back on episode 4 .... 101 episodes ago ....</li><li>Apologies if the end of the episode seemed a little loud.</li></ul><p> </p><p> </p><p> </p><p> </p>
]]></description>
      <pubDate>Wed, 1 May 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Ahn V. Vu, Alice Hutchings)</author>
      <link>https://cybercrimeology.com/episodes/hackting-out-defacement-and-hate-online-amid-global-conflicts-dI01gmt8</link>
      <content:encoded><![CDATA[<p><strong> Notes:</strong></p><ul><li><strong>Introduction to Cybercrime Research</strong>: Dr. Hutchings and Ahn Vu introduce their work at the Cambridge Cybercrime Centre.</li><li><strong>Global Conflicts and Cyber Activities</strong>: Discussion on how global conflicts, such as those in Ukraine and Israel-Gaza, spur cybercrime activities like website defacements and DDoS attacks.</li><li><strong>Cyber Tactics During Warfare</strong>: Insights into how cyber tactics are employed quickly after conflicts start, with a focus on how these activities serve both political propaganda and cybercriminal interests.</li><li><strong>Deplatforming Hate Groups</strong>: In-depth analysis of the challenges faced when deplatforming hate groups, specifically referencing the Kiwi Farms case.</li><li><strong>Temporary Effects of Cyber Attacks</strong>: Observations on the short-lived nature of heightened cyber activities post-conflict, with a decline in interest and activities after initial spikes.</li><li><strong>Challenges of Cybercrime Research</strong>: Discussion on the difficulties in tracking and attributing cyber attacks, particularly those by decentralized and loosely organized groups.</li><li><strong>Unintended Consequences of Deplatforming</strong>: Exploration of how attempts to silence harmful online communities can lead to increased attention and unintended reinforcement of these groups.</li><li><strong>Closing Thoughts</strong>: Dr. Hutchings and Ahn Vu summarize the ongoing challenges and the evolving landscape of cybercrime in the context of international security and online governance.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Alice Hutchings:</p><p><a href="https://www.cl.cam.ac.uk/~ah793/">https://www.cl.cam.ac.uk/~ah793/</a></p><p>Anh V. Vu</p><p><a href="https://www.cst.cam.ac.uk/people/vv301">https://www.cst.cam.ac.uk/people/vv301</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Anh V. Vu, Alice Hutchings, Ross Anderson. <a href="https://can01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fanhvvcs.github.io%2Fstatic%2Fmedia%2Fvu2024no.pdf&data=05%7C02%7Cmichael.joyce%40umontreal.ca%7Ce056fbc785874d2a073908dc69dc21a8%7Cd27eefec2a474be7981e0f8977fa31d8%7C1%7C0%7C638501642055483052%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=444fmOY%2BE%2BC6aboepTVvXAAkhjvQVWZ3HHCO39Be9Qg%3D&reserved=0">No Easy Way Out: the Effectiveness of Deplatforming an Extremist Forum to Suppress Hate and Harassment</a>. In Proceedings of the IEEE Symposium on Security and Privacy (S&P'24)</p><p>Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross Anderson. <a href="https://can01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fanhvvcs.github.io%2Fstatic%2Fmedia%2Fvu2024getting.pdf&data=05%7C02%7Cmichael.joyce%40umontreal.ca%7Ce056fbc785874d2a073908dc69dc21a8%7Cd27eefec2a474be7981e0f8977fa31d8%7C1%7C0%7C638501642055495526%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=MyvdgouovmIr4BXaJmicfpk5Eun5rIFWZGKIz36P4QA%3D&reserved=0">Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict</a>. In Proceedings of the ACM World Wide Web Conference (WWW'24)</p><p><strong>Other</strong>:</p><ul><li>No AI's were harmed during the creation of this episode, however they were definitely involved in the work of editing and drafting copy.</li><li>If you want to hear more from Dr. Hutchings, you can find her way back on episode 4 .... 101 episodes ago ....</li><li>Apologies if the end of the episode seemed a little loud.</li></ul><p> </p><p> </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="24021311" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/8932dec7-dafa-4cd2-abf1-02f7dbdb4973/audio/d22f229a-c445-4f36-ab25-99a8e5f12346/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Hackting Out: Defacement and Hate Online amid Global Conflicts</itunes:title>
      <itunes:author>Ahn V. Vu, Alice Hutchings</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/566a5207-b063-4223-9dc4-49e667531e82/3000x3000/ep105.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:59</itunes:duration>
      <itunes:summary>In this episode of the podcast, Dr. Alice Hutchings and her PhD student, Anh Vu, from the University of Cambridge, delve into the intricate world of cybercrime amidst global conflicts, with a special focus on the challenges of deplatforming hate groups. They discuss their research at the Cambridge Cybercrime Centre, focusing on the surge of hacker defacements and DDoS attacks in response to international tensions, notably the conflicts in Ukraine and Israel-Gaza. Additionally, they explore the complexities of deplatforming online hate groups, using the case of Kiwi Farms as an example of how difficult it can be to mitigate the activities of these groups without unintended consequences. Dr. Hutchings and Anh Vu highlight how these cyber incidents reflect broader geopolitical dynamics and the persistent challenge of controlling harmful online behavior while respecting free speech. Their analysis provides a comprehensive view of the cyber dimensions of warfare and online community management.</itunes:summary>
      <itunes:subtitle>In this episode of the podcast, Dr. Alice Hutchings and her PhD student, Anh Vu, from the University of Cambridge, delve into the intricate world of cybercrime amidst global conflicts, with a special focus on the challenges of deplatforming hate groups. They discuss their research at the Cambridge Cybercrime Centre, focusing on the surge of hacker defacements and DDoS attacks in response to international tensions, notably the conflicts in Ukraine and Israel-Gaza. Additionally, they explore the complexities of deplatforming online hate groups, using the case of Kiwi Farms as an example of how difficult it can be to mitigate the activities of these groups without unintended consequences. Dr. Hutchings and Anh Vu highlight how these cyber incidents reflect broader geopolitical dynamics and the persistent challenge of controlling harmful online behavior while respecting free speech. Their analysis provides a comprehensive view of the cyber dimensions of warfare and online community management.</itunes:subtitle>
      <itunes:keywords>hate, crime, study, kiwi farms, website defacement, research, cybercrime, deplatforming, conflict, cybersecurity, education, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">45adc31c-b18b-470e-bdbd-520d6f9c78ef</guid>
      <title>Bridging realities: The Convergence of Ideology and Cybercrime</title>
      <description><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>Dr. Tom Holt discussed the nascent stages of cybercrime research during his doctoral studies, highlighting its evolution into a more recognized and competitive field.</li><li>He emphasized the growth of cybercrime studies and the challenges of carving a niche within an expanding academic and professional landscape.</li><li>Dr. Holt pointed out the potential of interdisciplinary collaboration between social sciences and computer science as crucial for advancing cybercrime research.</li><li>The importance of online subcultures and ideological spaces in cybercrime dynamics was discussed, noting their influence on criminal activities and group formations.</li><li>He delved into the realm of ideologically motivated cyber attacks, underscoring the need for better legal and enforcement frameworks to address such threats.</li><li>Dr. Holt provided examples of cyber attacks by extremist groups, showing a strategic shift towards cyber tactics for ideological, not financial, reasons.</li><li>The conversation highlighted the critical role of comprehensive data in understanding the scope and nature of cyberterrorism and ideological cyber attacks.</li><li>Reflecting on his career, Dr. Holt offered insights on the importance of continuous learning and interdisciplinary collaboration for researchers in the cybercrime field.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Tom Holt</p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p><a href="https://www.linkedin.com/in/tom-holt-3242a322/">https://www.linkedin.com/in/tom-holt-3242a322/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Cassandra Cross & Thomas J. Holt (2023) More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime, Global Crime, 24:2, 107-121, DOI: <a href="https://doi.org/10.1080/17440572.2023.2185607">10.1080/17440572.2023.2185607</a></p><p>Holt, T. J., Turner, N. D., Freilich, J. D., & Chermak, S. M. (2022). Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory. Social Science Computer Review, 40(6), 1614-1630. <a href="https://doi.org/10.1177/08944393211023324">https://doi.org/10.1177/08944393211023324</a></p><p>Thomas J. Holt, Jin Ree Lee, Joshua D. Freilich, Steven M. Chermak, Johannes M. Bauer, Ruth Shillair& Arun Ross (2022) An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks, Terrorism and Political Violence, 34:7, 1305-1320, DOI: <a href="https://doi.org/10.1080/09546553.2020.1777987">10.1080/09546553.2020.1777987</a></p><p>Thomas J. Holt, Joshua D. Freilich & Steven M. Chermak (2022) Examining the Online Expression of Ideology among Far-Right Extremist Forum Users, Terrorism and Political Violence, 34:2, 364-384,DOI: <a href="https://doi.org/10.1080/09546553.2019.1701446">10.1080/09546553.2019.1701446</a></p><p><strong>Other:</strong></p><p>Wait for wisdom, Learn to listen, Succession is Success.</p>
]]></description>
      <pubDate>Mon, 1 Apr 2024 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Tom Holt)</author>
      <link>https://cybercrimeology.com/episodes/bridging-realities-the-convergence-of-ideology-and-cybercrime-kA7eVlsQ</link>
      <content:encoded><![CDATA[<p><strong>Episode Notes:</strong></p><ul><li>Dr. Tom Holt discussed the nascent stages of cybercrime research during his doctoral studies, highlighting its evolution into a more recognized and competitive field.</li><li>He emphasized the growth of cybercrime studies and the challenges of carving a niche within an expanding academic and professional landscape.</li><li>Dr. Holt pointed out the potential of interdisciplinary collaboration between social sciences and computer science as crucial for advancing cybercrime research.</li><li>The importance of online subcultures and ideological spaces in cybercrime dynamics was discussed, noting their influence on criminal activities and group formations.</li><li>He delved into the realm of ideologically motivated cyber attacks, underscoring the need for better legal and enforcement frameworks to address such threats.</li><li>Dr. Holt provided examples of cyber attacks by extremist groups, showing a strategic shift towards cyber tactics for ideological, not financial, reasons.</li><li>The conversation highlighted the critical role of comprehensive data in understanding the scope and nature of cyberterrorism and ideological cyber attacks.</li><li>Reflecting on his career, Dr. Holt offered insights on the importance of continuous learning and interdisciplinary collaboration for researchers in the cybercrime field.</li></ul><p><strong>About our guests:</strong></p><p>Dr. Tom Holt</p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p><a href="https://www.linkedin.com/in/tom-holt-3242a322/">https://www.linkedin.com/in/tom-holt-3242a322/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Cassandra Cross & Thomas J. Holt (2023) More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime, Global Crime, 24:2, 107-121, DOI: <a href="https://doi.org/10.1080/17440572.2023.2185607">10.1080/17440572.2023.2185607</a></p><p>Holt, T. J., Turner, N. D., Freilich, J. D., & Chermak, S. M. (2022). Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory. Social Science Computer Review, 40(6), 1614-1630. <a href="https://doi.org/10.1177/08944393211023324">https://doi.org/10.1177/08944393211023324</a></p><p>Thomas J. Holt, Jin Ree Lee, Joshua D. Freilich, Steven M. Chermak, Johannes M. Bauer, Ruth Shillair& Arun Ross (2022) An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks, Terrorism and Political Violence, 34:7, 1305-1320, DOI: <a href="https://doi.org/10.1080/09546553.2020.1777987">10.1080/09546553.2020.1777987</a></p><p>Thomas J. Holt, Joshua D. Freilich & Steven M. Chermak (2022) Examining the Online Expression of Ideology among Far-Right Extremist Forum Users, Terrorism and Political Violence, 34:2, 364-384,DOI: <a href="https://doi.org/10.1080/09546553.2019.1701446">10.1080/09546553.2019.1701446</a></p><p><strong>Other:</strong></p><p>Wait for wisdom, Learn to listen, Succession is Success.</p>
]]></content:encoded>
      <enclosure length="30166943" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/732b8f3e-d10a-408c-996d-398999bb1cb1/audio/029af3f3-2410-42a6-ac98-e5ef7df12e82/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Bridging realities: The Convergence of Ideology and Cybercrime</itunes:title>
      <itunes:author>Tom Holt</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/fad595d8-80f1-49fd-aa85-1f5484365f63/3000x3000/ep104.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:23</itunes:duration>
      <itunes:summary>We host Dr. Tom Holt from the School of Criminal Justice at Michigan State University, to talk about his current research and the problems of getting research into practice .  Dr. Holt explaines the intricate dynamics of online ideological spaces and the rise of ideologically driven cyber attacks, emphasizing the critical need for interdisciplinary efforts between social sciences and computer science. </itunes:summary>
      <itunes:subtitle>We host Dr. Tom Holt from the School of Criminal Justice at Michigan State University, to talk about his current research and the problems of getting research into practice .  Dr. Holt explaines the intricate dynamics of online ideological spaces and the rise of ideologically driven cyber attacks, emphasizing the critical need for interdisciplinary efforts between social sciences and computer science. </itunes:subtitle>
      <itunes:keywords>academia, crime, extremism, online crime, research, cybercrime, sub-cultures, ideology, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3bb967e2-7d06-4d13-aac8-47e33710d480</guid>
      <title>Caught in the Web: Virtual Kidnapping and Digital Scams</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><ul><li>Dr Chang's background in law and sociology led him to specialize in criminology, particularly cybercrime, after observing its emerging relevance.</li><li>He chose to pursue his PhD in Australia due to scholarship opportunities and the chance to work with a leading cybercrime researcher.</li><li>Dr Chang discusses virtual kidnapping, a scam where victims are manipulated into isolating themselves, enabling scammers to demand ransom from their families.</li><li>He highlights the challenges of combating cybercrime, including jurisdictional issues and the need for international police collaboration.</li><li>Dr Chang emphasizes the importance of public awareness and education to prevent scams, as well as better victim support systems.</li><li>The interview also touches on the role of financial institutions in preventing scams and the potential future threats posed by technologies like AI and ChatGPT in cybercrime.</li></ul><p><strong>About our guests:</strong></p><p>Dr Lennon Chang</p><p><a href="https://www.deakin.edu.au/about-deakin/people/lennon-chang">https://www.deakin.edu.au/about-deakin/people/lennon-chang</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><ol><li>Chang, L. Y.-C., Zhong, L.-Y., & Grabosky, P. (2020). Virtual Kidnapping: Online Scams with ‘Asian Characteristics’ During the Pandemic. In <i>Crime and Justice in Digital Society</i> (pp. 112-113). ResearchGate. Note: APA format typically requires publisher information, which is not provided in this excerpt.</li></ol><p><strong>Other:</strong></p><p>The intro an outro was drafted using generative AI. I think it gave a different flavour.</p>
]]></description>
      <pubDate>Fri, 1 Mar 2024 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/caught-in-the-web-lnZXRmqJ</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><ul><li>Dr Chang's background in law and sociology led him to specialize in criminology, particularly cybercrime, after observing its emerging relevance.</li><li>He chose to pursue his PhD in Australia due to scholarship opportunities and the chance to work with a leading cybercrime researcher.</li><li>Dr Chang discusses virtual kidnapping, a scam where victims are manipulated into isolating themselves, enabling scammers to demand ransom from their families.</li><li>He highlights the challenges of combating cybercrime, including jurisdictional issues and the need for international police collaboration.</li><li>Dr Chang emphasizes the importance of public awareness and education to prevent scams, as well as better victim support systems.</li><li>The interview also touches on the role of financial institutions in preventing scams and the potential future threats posed by technologies like AI and ChatGPT in cybercrime.</li></ul><p><strong>About our guests:</strong></p><p>Dr Lennon Chang</p><p><a href="https://www.deakin.edu.au/about-deakin/people/lennon-chang">https://www.deakin.edu.au/about-deakin/people/lennon-chang</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><ol><li>Chang, L. Y.-C., Zhong, L.-Y., & Grabosky, P. (2020). Virtual Kidnapping: Online Scams with ‘Asian Characteristics’ During the Pandemic. In <i>Crime and Justice in Digital Society</i> (pp. 112-113). ResearchGate. Note: APA format typically requires publisher information, which is not provided in this excerpt.</li></ol><p><strong>Other:</strong></p><p>The intro an outro was drafted using generative AI. I think it gave a different flavour.</p>
]]></content:encoded>
      <enclosure length="23801843" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/376243c7-f8b1-468a-91cf-d713fed5c4c0/audio/faf8c450-0f04-4d23-87e1-6ed62ffaff37/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Caught in the Web: Virtual Kidnapping and Digital Scams</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/7aad8e44-edb7-43d9-b877-8dd2a1a2cde6/3000x3000/ep103.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:46</itunes:duration>
      <itunes:summary>In this episode, Dr. Lennon Chang from Deakin University provides an academic exploration into the mechanisms and implications of virtual kidnapping and online scams. Dr. Chang discusses the sophisticated tactics employed by cybercriminals to exploit victims and the significant challenges in international law enforcement collaboration. He underscores the importance of enhancing public education about scams and the available support systems for victims, providing a personal example to highlighting the limitations of education in preventing scams but how it can aid with recovering. The discussion also ventures into the potential future challenges posed by emerging technologies, offering insights into the evolving landscape of cybercrime prevention and the critical role of academic research in informing policy and practice.</itunes:summary>
      <itunes:subtitle>In this episode, Dr. Lennon Chang from Deakin University provides an academic exploration into the mechanisms and implications of virtual kidnapping and online scams. Dr. Chang discusses the sophisticated tactics employed by cybercriminals to exploit victims and the significant challenges in international law enforcement collaboration. He underscores the importance of enhancing public education about scams and the available support systems for victims, providing a personal example to highlighting the limitations of education in preventing scams but how it can aid with recovering. The discussion also ventures into the potential future challenges posed by emerging technologies, offering insights into the evolving landscape of cybercrime prevention and the critical role of academic research in informing policy and practice.</itunes:subtitle>
      <itunes:keywords>virtual kidnapping, digital fraud, cybercrime, online fraud, cybersecurity, fraud, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">92ea40c5-83f8-4a5f-9b88-7c0334854b90</guid>
      <title>Automating CSAM Investigation: Research to Practice</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><ol><li>The software developed by Bryce Westlake, Russell Brewer and colleagues aims to assist law enforcement agencies in identifying perpetrators of child sexual abuse material (CSAM) offences by using multiple biometric markers.</li><li>The unique function of the software is its capability to synthesize, triage, and systematically review all evidence holdings that law enforcement might seize, thereby automating the process and speeding up investigations.</li><li>The software can ingest a variety of media files, extract multiple biometric features from those files, and identify subjects contained within, matching them across data sets, reducing investigator exposure to CSAM and speeding up the investigative process.</li><li>One of the key aspects addressed by the software is the ability to identify new content, overcoming the limitations of current reactive methods used in combating CSAM (i.e. matching file hashes).</li><li>The software is leverages social networking analysis and other techniques to assist investigators to identify links between offenders, victims, places and objects, potentially opening new avenues or focusing detective work.</li><li>The project aims to connect law enforcement agencies nationally and globally, enabling them to share information and collaborate on cases, despite the challenges posed by different laws and data transmission regulations.</li><li>The software's ability to systematically catalog and review all available data provides a more comprehensive and unbiased  investigative process as choices about which media is reviewed, reducing the impact of investigator intuition and fragmented intelligence.</li><li>The software has received funding for research and development, leading to the creation of a functional prototype for law enforcement  in Australia and they are now looking at having it implemented by police more widely. </li><li>The development of AI technology has a positive impact on the  technology, as new matching tools are "plug and play".</li><li>One of the challenges faced in implementing the software is convincing law enforcement to adopt new technologies and methods, as they may be hesitant to change from established routines, despite the potential benefits of the new system.</li></ol><p><strong>About our guests:</strong></p><p>Russell Brewer</p><p><a href="https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities">https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities</a></p><p>Bryce Westlake</p><p><a href="https://www.brycewestlake.com/">https://www.brycewestlake.com</a></p><p><a href="https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php">https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Brewer R <i>et al.</i> 2023. Advancing child sexual abuse investigations using biometrics and social network analysis. <i>Trends & issues in crime and criminal justice</i> no. 668. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti78948">https://doi.org/10.52922/ti78948</a></p><p>Westlake B <i>et al.</i> 2022. Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. <i>Trends & issues in crime and criminal justice</i> no. 648. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti78566">https://doi.org/10.52922/ti78566</a></p><p>DEVELOPING AUTOMATED SOFTWARE TOOLS: To Detect Child Sexual Abuse Material Online.</p><p><a href="https://adelaidecybercrime.org/software">https://adelaidecybercrime.org/software</a></p><p><strong>Other:</strong></p><p>This interview</p>
]]></description>
      <pubDate>Thu, 1 Feb 2024 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Russell Brewer, Bryce Westlake)</author>
      <link>https://cybercrimeology.com/episodes/automating-csam-investigation-bWdtUNa8</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><ol><li>The software developed by Bryce Westlake, Russell Brewer and colleagues aims to assist law enforcement agencies in identifying perpetrators of child sexual abuse material (CSAM) offences by using multiple biometric markers.</li><li>The unique function of the software is its capability to synthesize, triage, and systematically review all evidence holdings that law enforcement might seize, thereby automating the process and speeding up investigations.</li><li>The software can ingest a variety of media files, extract multiple biometric features from those files, and identify subjects contained within, matching them across data sets, reducing investigator exposure to CSAM and speeding up the investigative process.</li><li>One of the key aspects addressed by the software is the ability to identify new content, overcoming the limitations of current reactive methods used in combating CSAM (i.e. matching file hashes).</li><li>The software is leverages social networking analysis and other techniques to assist investigators to identify links between offenders, victims, places and objects, potentially opening new avenues or focusing detective work.</li><li>The project aims to connect law enforcement agencies nationally and globally, enabling them to share information and collaborate on cases, despite the challenges posed by different laws and data transmission regulations.</li><li>The software's ability to systematically catalog and review all available data provides a more comprehensive and unbiased  investigative process as choices about which media is reviewed, reducing the impact of investigator intuition and fragmented intelligence.</li><li>The software has received funding for research and development, leading to the creation of a functional prototype for law enforcement  in Australia and they are now looking at having it implemented by police more widely. </li><li>The development of AI technology has a positive impact on the  technology, as new matching tools are "plug and play".</li><li>One of the challenges faced in implementing the software is convincing law enforcement to adopt new technologies and methods, as they may be hesitant to change from established routines, despite the potential benefits of the new system.</li></ol><p><strong>About our guests:</strong></p><p>Russell Brewer</p><p><a href="https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities">https://researchers.adelaide.edu.au/profile/russell.brewer#professional-activities</a></p><p>Bryce Westlake</p><p><a href="https://www.brycewestlake.com/">https://www.brycewestlake.com</a></p><p><a href="https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php">https://www.sjsu.edu/justicestudies/about-us/directory/westlake-bryce.php</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Brewer R <i>et al.</i> 2023. Advancing child sexual abuse investigations using biometrics and social network analysis. <i>Trends & issues in crime and criminal justice</i> no. 668. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti78948">https://doi.org/10.52922/ti78948</a></p><p>Westlake B <i>et al.</i> 2022. Developing automated methods to detect and match face and voice biometrics in child sexual abuse videos. <i>Trends & issues in crime and criminal justice</i> no. 648. Canberra: Australian Institute of Criminology. <a href="https://doi.org/10.52922/ti78566">https://doi.org/10.52922/ti78566</a></p><p>DEVELOPING AUTOMATED SOFTWARE TOOLS: To Detect Child Sexual Abuse Material Online.</p><p><a href="https://adelaidecybercrime.org/software">https://adelaidecybercrime.org/software</a></p><p><strong>Other:</strong></p><p>This interview</p>
]]></content:encoded>
      <enclosure length="34426268" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/45ccc239-017c-4110-a925-de3454d6dc68/audio/703ca1b6-112b-407b-b0fa-3c9ef2e27d46/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Automating CSAM Investigation: Research to Practice</itunes:title>
      <itunes:author>Russell Brewer, Bryce Westlake</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/17bce528-e568-416c-b33d-c1f2372e51f1/3000x3000/ep102.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:50</itunes:duration>
      <itunes:summary>How can we leverage new technologies and research to assist the investigators combating the production of child sexual abuse material online. Dr. Russell Brewer from the University of Adelaide in Australia and Dr. Bryce Westlake from San Jose State University join us to talk about a project that puts research into practice and is providing a software tool that can leverage criminological approaches, forensic techniques and the latest computing technologies to assist law enforcement. We discuss what the tools do, how they can help and the challenges of taking academic findings into the real world. </itunes:summary>
      <itunes:subtitle>How can we leverage new technologies and research to assist the investigators combating the production of child sexual abuse material online. Dr. Russell Brewer from the University of Adelaide in Australia and Dr. Bryce Westlake from San Jose State University join us to talk about a project that puts research into practice and is providing a software tool that can leverage criminological approaches, forensic techniques and the latest computing technologies to assist law enforcement. We discuss what the tools do, how they can help and the challenges of taking academic findings into the real world. </itunes:subtitle>
      <itunes:keywords>csam, child sexual abuse materials, research, cybercrime, sexual abuse, investigations, cyber, policing, law enforcement, child abuse</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16f6cd1c-e060-433d-9e0d-dacae1a2edd3</guid>
      <title>Twenty24: Top Tips &amp; Tricks for Better Presentations</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Russell Brewer</p><p><a href="https://researchers.adelaide.edu.au/profile/russell.brewer">https://researchers.adelaide.edu.au/profile/russell.brewer</a></p><p>Lennon Chang</p><p><a href="https://www.deakin.edu.au/about-deakin/people/lennon-chang">https://www.deakin.edu.au/about-deakin/people/lennon-chang</a></p><p>Benoit Dupont</p><p><a href="https://www.benoitdupont.net/en/">https://www.benoitdupont.net/en/</a></p><p>Steven Kemp</p><p><a href="https://www.udg.edu/ca/directori/pagina-personal?ID=2003705">https://www.udg.edu/ca/directori/pagina-personal?ID=2003705</a></p><p>Rutger Leukfedt</p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1">https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1</a></p><p>Katalin Parti,</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html</a></p><p>Bryce Westlake.</p><p><a href="https://www.brycewestlake.com/">https://www.brycewestlake.com</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Harari, Y. N. (2015). Sapiens. Harper.</p><p><a href="https://www.ynharari.com/book/sapiens-2/">https://www.ynharari.com/book/sapiens-2/</a></p><p><strong>Other:</strong></p><p>I edited this one on the road, apologies if the quality is not quite what you are used to.</p><p>The next episode will be at the start of next month. </p>
]]></description>
      <pubDate>Mon, 1 Jan 2024 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Lennon Chang, Russell Brewer, Bryce Westlake, Rutger Leukfeldt, Benoit Dupont, Steven Kemp, Katalin Parti)</author>
      <link>https://cybercrimeology.com/episodes/twenty24-4D5HLBZ_</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Russell Brewer</p><p><a href="https://researchers.adelaide.edu.au/profile/russell.brewer">https://researchers.adelaide.edu.au/profile/russell.brewer</a></p><p>Lennon Chang</p><p><a href="https://www.deakin.edu.au/about-deakin/people/lennon-chang">https://www.deakin.edu.au/about-deakin/people/lennon-chang</a></p><p>Benoit Dupont</p><p><a href="https://www.benoitdupont.net/en/">https://www.benoitdupont.net/en/</a></p><p>Steven Kemp</p><p><a href="https://www.udg.edu/ca/directori/pagina-personal?ID=2003705">https://www.udg.edu/ca/directori/pagina-personal?ID=2003705</a></p><p>Rutger Leukfedt</p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1">https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1</a></p><p>Katalin Parti,</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html</a></p><p>Bryce Westlake.</p><p><a href="https://www.brycewestlake.com/">https://www.brycewestlake.com</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Harari, Y. N. (2015). Sapiens. Harper.</p><p><a href="https://www.ynharari.com/book/sapiens-2/">https://www.ynharari.com/book/sapiens-2/</a></p><p><strong>Other:</strong></p><p>I edited this one on the road, apologies if the quality is not quite what you are used to.</p><p>The next episode will be at the start of next month. </p>
]]></content:encoded>
      <enclosure length="30922453" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/25e3b8f0-6f01-4710-aaee-d378b5ad4539/audio/b891c0f6-8928-41fa-81f5-d1dc12b4c466/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Twenty24: Top Tips &amp; Tricks for Better Presentations</itunes:title>
      <itunes:author>Lennon Chang, Russell Brewer, Bryce Westlake, Rutger Leukfeldt, Benoit Dupont, Steven Kemp, Katalin Parti</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/532b59d3-be36-4d0a-a4f2-d80efc5a632b/3000x3000/ep101.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:10</itunes:duration>
      <itunes:summary>A new year&apos;s resolution that can benefit all of us is to do better presentations.  A great way to improve yourself is to learn from the experience of others. To help us all get a little better at presenting our ideas we should listen to people who are experienced with communicating research.  So this episode is all about tips for presenting cybercrime research and we hear from Dr. Russell Brewer, Dr. Lennon Chang, Dr. Benoit Dupont, Dr. Steven Kemp, Dr. Katalin Parti, Dr. Rutger Leukfeldt and Dr. Bryce Westlake.  </itunes:summary>
      <itunes:subtitle>A new year&apos;s resolution that can benefit all of us is to do better presentations.  A great way to improve yourself is to learn from the experience of others. To help us all get a little better at presenting our ideas we should listen to people who are experienced with communicating research.  So this episode is all about tips for presenting cybercrime research and we hear from Dr. Russell Brewer, Dr. Lennon Chang, Dr. Benoit Dupont, Dr. Steven Kemp, Dr. Katalin Parti, Dr. Rutger Leukfeldt and Dr. Bryce Westlake.  </itunes:subtitle>
      <itunes:keywords>conference, presentations, tricks, research, cybercrime, research presentations, tips, how-to</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b09549a5-8932-4b2c-82f1-16a7c2aba85d</guid>
      <title>1 Hundred: An AI assisted analysis of Cybercrimeology</title>
      <description><![CDATA[<p><strong>Summary:</strong></p><p>The main points of this episode are:</p><ol><li>Celebrating the 100th episode of cybercrimeology and reflecting on the podcast's journey over the past three years.</li><li>Discussing the use of new technologies, such as AI, for analyzing and understanding the podcast's content.</li><li>Analyzing the podcast's content using natural language processing and summarization techniques to identify recurring themes and research topics.</li><li>Identifying common themes in the podcast, including abuse in relationships, privacy invasion, law enforcement in cybercrime, social engineering, and age-related factors in cybercrime.</li><li>Discussing various research methodologies covered in the podcast, such as technographs, online experiments, and survey research.</li><li>Highlighting the dedication of guests who share their time and research without any financial incentives.</li><li>Answering questions about the process of creating each episode, including research, interviews, editing, and production.</li><li>Discussing the volume of work represented by 99 episodes totaling over 5 hours of content and involving 96 guests.</li><li>Reflecting on the impact of the podcast and its growth over the past three years, including achieving 100,000 downloads.</li><li>Looking forward to the future of the podcast and the potential for new technologies to enhance its content and reach.</li></ol><p><strong>About our guests:</strong></p><p>Alloy:</p><p><a href="https://platform.openai.com/docs/guides/text-to-speech">https://platform.openai.com/docs/guides/text-to-speech</a></p><p>voicing generations from</p><p>ChatGPT</p><p><a href="https://openai.com/blog/chatgpt">https://openai.com/blog/chatgpt</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>The BART model:</p><p><a href="https://huggingface.co/docs/transformers/model_doc/bart">https://huggingface.co/docs/transformers/model_doc/bart</a></p><p>The DistilBERT model:</p><p><a href="https://huggingface.co/docs/transformers/model_doc/distilbert">https://huggingface.co/docs/transformers/model_doc/distilbert</a></p><p> </p><p><strong>Results:</strong></p><p>Which terms were spoken about the most and what was the sentiment around those ? </p><table><tbody><tr><td><strong>Noun</strong></td><td><strong>Occurrences</strong></td><td><strong>FilesOccurredIn</strong></td><td><strong>SentimentScoreSum</strong></td></tr><tr><td>people</td><td>2529</td><td>94</td><td>92.60830581188202</td></tr><tr><td>time</td><td>1133</td><td>83</td><td>79.5210649</td></tr><tr><td>research</td><td>1396</td><td>80</td><td>79.49750900268553</td></tr><tr><td>way</td><td>1005</td><td>74</td><td>73.79837167263031</td></tr><tr><td>things</td><td>1238</td><td>73</td><td>72.45885318517685</td></tr><tr><td>lot</td><td>1117</td><td>71</td><td>70.87118428945543</td></tr><tr><td>data</td><td>903</td><td>46</td><td>44.24124717712402</td></tr><tr><td>kind</td><td>667</td><td>44</td><td>43.9891608</td></tr><tr><td>crime</td><td>885</td><td>43</td><td>42.725725710392005</td></tr><tr><td>cyber</td><td>805</td><td>41</td><td>39.68457114696503</td></tr><tr><td>cybercrime</td><td>481</td><td>38</td><td>36.90566980838775</td></tr><tr><td>thing</td><td>393</td><td>36</td><td>35.59294366836548</td></tr><tr><td>security</td><td>527</td><td>31</td><td>30.89444762468338</td></tr><tr><td>information</td><td>467</td><td>29</td><td>28.87013864517212</td></tr></tbody></table><p> </p><p>Was there a change in the sentiment of the podcast after the end of  pandemic conditions, assuming that the pandemic ended at the end of Q3 2021? </p><p>The model is given by:</p><p>yi∼Normal(μi,σ)<i>yi</i>​∼Normal(<i>μi</i>​,<i>σ</i>)</p><p>where</p><p>μi=β0+βafter_event⋅xi<i>μi</i>​=<i>β</i>0​+<i>β</i>after_event​⋅<i>xi</i>​</p><p>Here, the parameters are defined as follows:</p><ul><li>β0<i>β</i>0​: Intercept, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0.8, and a scale parameter of 2.5.</li><li>βafter_event<i>β</i>after_event​: Coefficient for the predictor variable (after_event), with a flat prior.</li><li>σ<i>σ</i>: Standard deviation of the response variable, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0, and a scale parameter of 2.5.</li></ul><p>This provided the results as follows:</p><p> </p><p>Population-Level Effects:</p><p>           Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS</p><p>Intercept       0.37      0.06     0.26     0.48 1.00     3884     2917</p><p>after_event     0.39      0.08     0.23     0.54 1.00     3561     2976</p><p> </p><p>Family Specific Parameters:</p><p>     Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS</p><p>sigma     0.38      0.03     0.33     0.44 1.00     3608     2817</p><p><strong>Other:</strong></p><p>The model overlooked Mike Levi's contribution to the History series.  That is a bit unfair.  </p><p>Where there were multiple guests, I did not include them all in the database, hence "no specific guest listed"</p><p> </p><p> </p>
]]></description>
      <pubDate>Fri, 15 Dec 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/episode100-DYIFT7_4</link>
      <content:encoded><![CDATA[<p><strong>Summary:</strong></p><p>The main points of this episode are:</p><ol><li>Celebrating the 100th episode of cybercrimeology and reflecting on the podcast's journey over the past three years.</li><li>Discussing the use of new technologies, such as AI, for analyzing and understanding the podcast's content.</li><li>Analyzing the podcast's content using natural language processing and summarization techniques to identify recurring themes and research topics.</li><li>Identifying common themes in the podcast, including abuse in relationships, privacy invasion, law enforcement in cybercrime, social engineering, and age-related factors in cybercrime.</li><li>Discussing various research methodologies covered in the podcast, such as technographs, online experiments, and survey research.</li><li>Highlighting the dedication of guests who share their time and research without any financial incentives.</li><li>Answering questions about the process of creating each episode, including research, interviews, editing, and production.</li><li>Discussing the volume of work represented by 99 episodes totaling over 5 hours of content and involving 96 guests.</li><li>Reflecting on the impact of the podcast and its growth over the past three years, including achieving 100,000 downloads.</li><li>Looking forward to the future of the podcast and the potential for new technologies to enhance its content and reach.</li></ol><p><strong>About our guests:</strong></p><p>Alloy:</p><p><a href="https://platform.openai.com/docs/guides/text-to-speech">https://platform.openai.com/docs/guides/text-to-speech</a></p><p>voicing generations from</p><p>ChatGPT</p><p><a href="https://openai.com/blog/chatgpt">https://openai.com/blog/chatgpt</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>The BART model:</p><p><a href="https://huggingface.co/docs/transformers/model_doc/bart">https://huggingface.co/docs/transformers/model_doc/bart</a></p><p>The DistilBERT model:</p><p><a href="https://huggingface.co/docs/transformers/model_doc/distilbert">https://huggingface.co/docs/transformers/model_doc/distilbert</a></p><p> </p><p><strong>Results:</strong></p><p>Which terms were spoken about the most and what was the sentiment around those ? </p><table><tbody><tr><td><strong>Noun</strong></td><td><strong>Occurrences</strong></td><td><strong>FilesOccurredIn</strong></td><td><strong>SentimentScoreSum</strong></td></tr><tr><td>people</td><td>2529</td><td>94</td><td>92.60830581188202</td></tr><tr><td>time</td><td>1133</td><td>83</td><td>79.5210649</td></tr><tr><td>research</td><td>1396</td><td>80</td><td>79.49750900268553</td></tr><tr><td>way</td><td>1005</td><td>74</td><td>73.79837167263031</td></tr><tr><td>things</td><td>1238</td><td>73</td><td>72.45885318517685</td></tr><tr><td>lot</td><td>1117</td><td>71</td><td>70.87118428945543</td></tr><tr><td>data</td><td>903</td><td>46</td><td>44.24124717712402</td></tr><tr><td>kind</td><td>667</td><td>44</td><td>43.9891608</td></tr><tr><td>crime</td><td>885</td><td>43</td><td>42.725725710392005</td></tr><tr><td>cyber</td><td>805</td><td>41</td><td>39.68457114696503</td></tr><tr><td>cybercrime</td><td>481</td><td>38</td><td>36.90566980838775</td></tr><tr><td>thing</td><td>393</td><td>36</td><td>35.59294366836548</td></tr><tr><td>security</td><td>527</td><td>31</td><td>30.89444762468338</td></tr><tr><td>information</td><td>467</td><td>29</td><td>28.87013864517212</td></tr></tbody></table><p> </p><p>Was there a change in the sentiment of the podcast after the end of  pandemic conditions, assuming that the pandemic ended at the end of Q3 2021? </p><p>The model is given by:</p><p>yi∼Normal(μi,σ)<i>yi</i>​∼Normal(<i>μi</i>​,<i>σ</i>)</p><p>where</p><p>μi=β0+βafter_event⋅xi<i>μi</i>​=<i>β</i>0​+<i>β</i>after_event​⋅<i>xi</i>​</p><p>Here, the parameters are defined as follows:</p><ul><li>β0<i>β</i>0​: Intercept, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0.8, and a scale parameter of 2.5.</li><li>βafter_event<i>β</i>after_event​: Coefficient for the predictor variable (after_event), with a flat prior.</li><li>σ<i>σ</i>: Standard deviation of the response variable, with a Student's t-distribution prior with 3 degrees of freedom, a location parameter of 0, and a scale parameter of 2.5.</li></ul><p>This provided the results as follows:</p><p> </p><p>Population-Level Effects:</p><p>           Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS</p><p>Intercept       0.37      0.06     0.26     0.48 1.00     3884     2917</p><p>after_event     0.39      0.08     0.23     0.54 1.00     3561     2976</p><p> </p><p>Family Specific Parameters:</p><p>     Estimate Est.Error l-95% CI u-95% CI Rhat Bulk_ESS Tail_ESS</p><p>sigma     0.38      0.03     0.33     0.44 1.00     3608     2817</p><p><strong>Other:</strong></p><p>The model overlooked Mike Levi's contribution to the History series.  That is a bit unfair.  </p><p>Where there were multiple guests, I did not include them all in the database, hence "no specific guest listed"</p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="26146105" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/40da0411-6157-45d6-bc5c-2f66a876b0a8/audio/70064b91-7535-48de-ab7c-4695b8805b0c/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>1 Hundred: An AI assisted analysis of Cybercrimeology</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/d45735e5-b6bb-478c-b893-b27689f58d80/3000x3000/ep100.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:12</itunes:duration>
      <itunes:summary>One hundred episodes of cybercrime, its research and its researchers.   We take a look at the podcast, what have we done, what did we talk about, what goes into the production of the podcast and its impact on me as a host.  This episode&apos;s guest is the future, or at least what it might be as we have a combination of AI technologies appearing as our research assistant.  </itunes:summary>
      <itunes:subtitle>One hundred episodes of cybercrime, its research and its researchers.   We take a look at the podcast, what have we done, what did we talk about, what goes into the production of the podcast and its impact on me as a host.  This episode&apos;s guest is the future, or at least what it might be as we have a combination of AI technologies appearing as our research assistant.  </itunes:subtitle>
      <itunes:keywords>knowledge mobilization, chatgpt, analysis, ai, text to speech, research, cybercrime, science, digital assistant, cybersecurity, podcast, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">beeb949a-a369-4174-b4ee-4dac10c8f2e4</guid>
      <title>Hack Righter: Working together to make good things better</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><p>- Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University. </p><p>- The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects. </p><p>- Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt  emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program. </p><p>- Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.</p><p>- Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.</p><p><strong>About our Guest:</strong></p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1">https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1</a></p><p><a href="https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/">https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/</a></p><p><a href="https://www.linkedin.com/in/rutgerleukfeldt">https://www.linkedin.com/in/rutgerleukfeldt</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>J. A. M. Schiks, Susanne van ’t Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: <a href="https://doi.org/10.1080/0735648X.2023.2252394">10.1080/0735648X.2023.2252394</a></p><p>Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. <i>Computer Law & Security Review</i>, <i>52</i>, 105858.</p><p><a href="https://doi.org/10.1016/j.clsr.2023.105858">https://doi.org/10.1016/j.clsr.2023.105858</a></p><p><strong>Other:</strong></p><p>Dutch police send young hackers to intern at IT companies</p><p><a href="https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies">https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies</a></p><p>20 Companies Pledge Support for the Hack_Right Program</p><p><a href="https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/">https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/</a></p>
]]></description>
      <pubDate>Fri, 1 Dec 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rutger Leukfeldt)</author>
      <link>https://cybercrimeology.com/episodes/hack-righter-working-together-to-make-good-things-better-pNiXrPt0</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><p>- Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University. </p><p>- The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects. </p><p>- Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt  emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program. </p><p>- Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.</p><p>- Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.</p><p><strong>About our Guest:</strong></p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1">https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1</a></p><p><a href="https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/">https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/</a></p><p><a href="https://www.linkedin.com/in/rutgerleukfeldt">https://www.linkedin.com/in/rutgerleukfeldt</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>J. A. M. Schiks, Susanne van ’t Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: <a href="https://doi.org/10.1080/0735648X.2023.2252394">10.1080/0735648X.2023.2252394</a></p><p>Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. <i>Computer Law & Security Review</i>, <i>52</i>, 105858.</p><p><a href="https://doi.org/10.1016/j.clsr.2023.105858">https://doi.org/10.1016/j.clsr.2023.105858</a></p><p><strong>Other:</strong></p><p>Dutch police send young hackers to intern at IT companies</p><p><a href="https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies">https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies</a></p><p>20 Companies Pledge Support for the Hack_Right Program</p><p><a href="https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/">https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/</a></p>
]]></content:encoded>
      <enclosure length="29784680" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/b5359b78-9cdd-4019-ad22-c867fec1d179/audio/509426d9-15d2-4f67-b9e2-757aecefc45f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Hack Righter: Working together to make good things better</itunes:title>
      <itunes:author>Rutger Leukfeldt</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9cd1de96-0656-4a91-a99f-c24def2f1c80/3000x3000/ep99.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:59</itunes:duration>
      <itunes:summary>How do you make something that is good thing great? Dr. Rutger Leukfeldt from NSCR and Leiden University joins us to discuss the Hack_Right program reforming young criminal hackers and how academics have played a role in analyzing the program for its improvement.  We also talk about the development of interdisciplinary researchers and some of the challenges of producing this kind of research at the moment.   </itunes:summary>
      <itunes:subtitle>How do you make something that is good thing great? Dr. Rutger Leukfeldt from NSCR and Leiden University joins us to discuss the Hack_Right program reforming young criminal hackers and how academics have played a role in analyzing the program for its improvement.  We also talk about the development of interdisciplinary researchers and some of the challenges of producing this kind of research at the moment.   </itunes:subtitle>
      <itunes:keywords>analysis, crime, police, metrics, research, cybercrime, hack_right, interdisciplinary research, science, youth, hackers, online, law enforcement, education, recividism</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30d3a358-f7d3-4d1b-ba2e-14b00135b311</guid>
      <title>The Ecosystem: Understanding Cybercrime and Cybersecurity</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><p>- Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines. </p><p>- The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances. </p><p>- Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security. </p><p>- It's important to address the needs of victims of cybercrime, which is often forgotten. </p><p>- The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.</p><p><strong>About our Guest:</strong></p><p>Dr. Benoît Dupont</p><p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Beno%C3%AEt">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît</a> Dupont/</p><p><a href="https://www.linkedin.com/in/benoit-dupont-9369702/">https://www.linkedin.com/in/benoit-dupont-9369702/</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. <a href="https://doi.org/10.1177/146680250334001">https://doi.org/10.1177/146680250334001</a></p><p>Berg, J., Nakueira, S. & Shearing, C. 2014. <strong>Global Non- State Auspices of Security Governance.</strong> In: Bersot, H. & Ariigo, B. Eds. <i>The Routledge Handbook of International Crime and Justice Studies.</i> Routledge, 77-97</p><p><strong>Other:</strong></p><p>“<i>Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.”</i> pp.3.</p><p>Woodbury, A. M. (1952). Ecological taxonomy. <i>Science</i>, <i>115</i>(2992), 3-3.</p><p> </p>
]]></description>
      <pubDate>Wed, 15 Nov 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Benoit Dupont)</author>
      <link>https://cybercrimeology.com/episodes/the-ecosystem-of-cybercrime-uvunmxVl</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><p>- Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines. </p><p>- The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances. </p><p>- Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security. </p><p>- It's important to address the needs of victims of cybercrime, which is often forgotten. </p><p>- The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.</p><p><strong>About our Guest:</strong></p><p>Dr. Benoît Dupont</p><p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Beno%C3%AEt">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît</a> Dupont/</p><p><a href="https://www.linkedin.com/in/benoit-dupont-9369702/">https://www.linkedin.com/in/benoit-dupont-9369702/</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. <a href="https://doi.org/10.1177/146680250334001">https://doi.org/10.1177/146680250334001</a></p><p>Berg, J., Nakueira, S. & Shearing, C. 2014. <strong>Global Non- State Auspices of Security Governance.</strong> In: Bersot, H. & Ariigo, B. Eds. <i>The Routledge Handbook of International Crime and Justice Studies.</i> Routledge, 77-97</p><p><strong>Other:</strong></p><p>“<i>Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.”</i> pp.3.</p><p>Woodbury, A. M. (1952). Ecological taxonomy. <i>Science</i>, <i>115</i>(2992), 3-3.</p><p> </p>
]]></content:encoded>
      <enclosure length="23753516" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1ea20ce2-b217-4d4f-84da-3a4d628b6579/audio/8ce83918-4b1f-4e38-95af-a22dd26ef43f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Ecosystem: Understanding Cybercrime and Cybersecurity</itunes:title>
      <itunes:author>Benoit Dupont</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/8e83c0b1-59ab-42fc-9c6a-62d1d17fa355/3000x3000/ep98.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:43</itunes:duration>
      <itunes:summary>What is the Cybersecurity Ecosystem ? Dr Benoît Dupont dives into the world of ecology to reveal the web of relationships underlying cybersecurity and discussed how this perspective could lead to smarter governance of crime online.  </itunes:summary>
      <itunes:subtitle>What is the Cybersecurity Ecosystem ? Dr Benoît Dupont dives into the world of ecology to reveal the web of relationships underlying cybersecurity and discussed how this perspective could lead to smarter governance of crime online.  </itunes:subtitle>
      <itunes:keywords>ecology, crime, regulation, ecosystem, research, cybercrime, online, education, digital</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7ec8e946-0001-4f7e-ab9c-207a690d63d9</guid>
      <title>Minority Reporting: Beyond WEIRD(E) Cybercrime</title>
      <description><![CDATA[<p><strong>Notes:</strong></p><ol><li>Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.</li><li>While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.</li><li>Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.</li><li>Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.</li><li>Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.</li><li>Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.</li><li>Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.</li><li>Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.</li><li>Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.</li><li>Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.</li></ol><p><strong>About our guest:</strong></p><p>Dr Steven Kemp</p><p><a href="https://www.udg.edu/ca/directori/pagina-personal?ID=2003705">https://www.udg.edu/ca/directori/pagina-personal?ID=2003705</a></p><p><a href="https://www.linkedin.com/in/steven-kemp-ed/">https://www.linkedin.com/in/steven-kemp-ed/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. <a href="https://doi.org/10.1177/17488958211062359">https://doi.org/10.1177/17488958211062359</a></p><p>Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. <i>Computers & Security</i>, <i>127</i>, 103089.</p><p><a href="https://doi.org/10.1016/j.cose.2022.103089">https://doi.org/10.1016/j.cose.2022.103089</a></p><p>Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. <a href="https://doi.org/10.1177/1477370820941405">https://doi.org/10.1177/1477370820941405</a></p><p><strong>Other:</strong></p><p>I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.</p>
]]></description>
      <pubDate>Wed, 1 Nov 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Steven Kemp)</author>
      <link>https://cybercrimeology.com/episodes/minority-reporting-beyond-weirde-cybercrime-fFvortRy</link>
      <content:encoded><![CDATA[<p><strong>Notes:</strong></p><ol><li>Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.</li><li>While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.</li><li>Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.</li><li>Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.</li><li>Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.</li><li>Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.</li><li>Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.</li><li>Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.</li><li>Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.</li><li>Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.</li></ol><p><strong>About our guest:</strong></p><p>Dr Steven Kemp</p><p><a href="https://www.udg.edu/ca/directori/pagina-personal?ID=2003705">https://www.udg.edu/ca/directori/pagina-personal?ID=2003705</a></p><p><a href="https://www.linkedin.com/in/steven-kemp-ed/">https://www.linkedin.com/in/steven-kemp-ed/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. <a href="https://doi.org/10.1177/17488958211062359">https://doi.org/10.1177/17488958211062359</a></p><p>Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. <i>Computers & Security</i>, <i>127</i>, 103089.</p><p><a href="https://doi.org/10.1016/j.cose.2022.103089">https://doi.org/10.1016/j.cose.2022.103089</a></p><p>Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. <a href="https://doi.org/10.1177/1477370820941405">https://doi.org/10.1177/1477370820941405</a></p><p><strong>Other:</strong></p><p>I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.</p>
]]></content:encoded>
      <enclosure length="20782215" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/a26d2678-9d23-49a1-9b30-b7498424ac54/audio/71ff72ed-8631-46da-a2de-75c618751197/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Minority Reporting: Beyond WEIRD(E) Cybercrime</itunes:title>
      <itunes:author>Steven Kemp</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9515368c-95bb-4e51-8182-eabbeb1301fb/3000x3000/ep97.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:37</itunes:duration>
      <itunes:summary>When we say we need more cybercrime data, what do we mean ?  We talk with Dr. Steven Kemp from the University of Girona about cybercrime reporting rates, the need for longitudinal data and the need for more countries to embrace a culture of evaluation with regards to cybercrime to enable more localized analysis to ensure appropriate recommendations are being made.  </itunes:summary>
      <itunes:subtitle>When we say we need more cybercrime data, what do we mean ?  We talk with Dr. Steven Kemp from the University of Girona about cybercrime reporting rates, the need for longitudinal data and the need for more countries to embrace a culture of evaluation with regards to cybercrime to enable more localized analysis to ensure appropriate recommendations are being made.  </itunes:subtitle>
      <itunes:keywords>data, spain, latin america, reporting, europe, smes, research, cybercrime, cyber insurance, cybersecurity, insurance, policing, fraud, online</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3ba0bd1b-bed3-4c4e-b33e-8d1dcd7cd27b</guid>
      <title>Cybercrime Awareness Theatre: The revolutionary promise of story sharing</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Katalin Parti</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html</a></p><p><a href="https://www.linkedin.com/in/partikat">https://www.linkedin.com/in/partikat</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>PROS: Performances to Reduce Online Scams</p><p><a href="https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html">https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html</a></p><p>Parti, Katalin, and Faika Tahir. 2023. "“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims" <i>Social Sciences</i> 12, no. 5: 264. <a href="https://doi.org/10.3390/socsci12050264">https://doi.org/10.3390/socsci12050264</a></p><p>Parti, K. (2022). “Elder Scam” Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization.</p><p><a href="https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y">https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y</a></p><p>Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.</p><p> </p><p>Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.</p><p><a href="https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf">https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf</a></p><p> </p><p><strong>Other:</strong></p><p><a href="https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed">https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed</a></p><p><a href="https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed">https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed</a></p><p> </p><p>My laptop died a few hours before completing this episode.  At this point I am guessing it was some kind of issue with the latest update.  It is currently a brick.  Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.  </p>
]]></description>
      <pubDate>Sun, 15 Oct 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Katalin Parti)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-awareness-theatre-the-revolutionary-promise-of-story-sharing-IpIbywIb</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Katalin Parti</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html</a></p><p><a href="https://www.linkedin.com/in/partikat">https://www.linkedin.com/in/partikat</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>PROS: Performances to Reduce Online Scams</p><p><a href="https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html">https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html</a></p><p>Parti, Katalin, and Faika Tahir. 2023. "“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims" <i>Social Sciences</i> 12, no. 5: 264. <a href="https://doi.org/10.3390/socsci12050264">https://doi.org/10.3390/socsci12050264</a></p><p>Parti, K. (2022). “Elder Scam” Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization.</p><p><a href="https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y">https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y</a></p><p>Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.</p><p> </p><p>Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.</p><p><a href="https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf">https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf</a></p><p> </p><p><strong>Other:</strong></p><p><a href="https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed">https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed</a></p><p><a href="https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed">https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed</a></p><p> </p><p>My laptop died a few hours before completing this episode.  At this point I am guessing it was some kind of issue with the latest update.  It is currently a brick.  Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.  </p>
]]></content:encoded>
      <enclosure length="26267831" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/ea4ad19b-36e5-463a-bd9d-dcf2c2535a4f/audio/3178f9c6-301b-4de2-a9e6-8f2bf79619ab/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime Awareness Theatre: The revolutionary promise of story sharing</itunes:title>
      <itunes:author>Katalin Parti</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/61e20f21-112a-48c7-84fd-f162d35f2ded/3000x3000/ep96.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:20</itunes:duration>
      <itunes:summary>For cybercrime awareness to be effective it has to be heard.  Dr Katalin Parti joins us talk online scams and to explain the Performances to Reduce Online Scams (PROS) project that is taking awareness storytelling to audiences in the form of an interactive theatre experience. We discuss how the program works and the interesting metrics that reveal how it affects different audiences.    </itunes:summary>
      <itunes:subtitle>For cybercrime awareness to be effective it has to be heard.  Dr Katalin Parti joins us talk online scams and to explain the Performances to Reduce Online Scams (PROS) project that is taking awareness storytelling to audiences in the form of an interactive theatre experience. We discuss how the program works and the interesting metrics that reveal how it affects different audiences.    </itunes:subtitle>
      <itunes:keywords>online scams, community, theatre, seniors, research, cybercrime, fraud, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">321f6fb0-3175-4dd0-b035-1d8afa1447ce</guid>
      <title>+Δ∵ CyberEngineer &amp; CyberDetective &amp; CyberAdvisor</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Kenrick Bagnall</p><p><a href="https://www.linkedin.com/in/kenrickbagnall/">https://www.linkedin.com/in/kenrickbagnall/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>KonCyber the Podcast</p><p><a href="https://koncyberthepodcast.podbean.com/">https://koncyberthepodcast.podbean.com</a></p><p><strong>Other:</strong></p><p>If I took anything from Kenrick's story, besides of course all of the policing and technical stuff,  it was that you are not too old to seek or take advice nor are you too old to start again. </p>
]]></description>
      <pubDate>Sun, 1 Oct 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Kenrick Bagnall)</author>
      <link>https://cybercrimeology.com/episodes/cyberengineer-cyberdetective-cyberadvisor-95sGwcK_</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Kenrick Bagnall</p><p><a href="https://www.linkedin.com/in/kenrickbagnall/">https://www.linkedin.com/in/kenrickbagnall/</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>KonCyber the Podcast</p><p><a href="https://koncyberthepodcast.podbean.com/">https://koncyberthepodcast.podbean.com</a></p><p><strong>Other:</strong></p><p>If I took anything from Kenrick's story, besides of course all of the policing and technical stuff,  it was that you are not too old to seek or take advice nor are you too old to start again. </p>
]]></content:encoded>
      <enclosure length="38328972" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/e0a1f293-84b8-4e5c-8c40-30ed2b7e780b/audio/57609f20-2393-4a43-8b8c-ce1ede30c7ca/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>+Δ∵ CyberEngineer &amp; CyberDetective &amp; CyberAdvisor</itunes:title>
      <itunes:author>Kenrick Bagnall</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/e61d67d4-d4a3-449c-aee5-942d4b2aff1b/3000x3000/ep95.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:53</itunes:duration>
      <itunes:summary>What makes a cyberinvestigator?  This episode we hear Kenrick Bagnall tell his story, following his retirement from being a detective constable of the Toronto Police working cybercrime cases after more than 17 years of service.  We talk to him about how it was he came to be a police officer and a cyber investigator, some of the cases he worked and what it is that he hopes to do now that he has moved on from the police force.  </itunes:summary>
      <itunes:subtitle>What makes a cyberinvestigator?  This episode we hear Kenrick Bagnall tell his story, following his retirement from being a detective constable of the Toronto Police working cybercrime cases after more than 17 years of service.  We talk to him about how it was he came to be a police officer and a cyber investigator, some of the cases he worked and what it is that he hopes to do now that he has moved on from the police force.  </itunes:subtitle>
      <itunes:keywords>detective, police, cybercrime, investigations, cybersecurity, stories, policing, digital forensics, cyberpolice</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7b452bf5-30c8-4700-bce5-b69f2fd8e881</guid>
      <title>Smart Everything, Data Everywhere &amp; AI, all at once: The Weird Wide Web of Privacy</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Teresa Scassa</p><p><a href="https://techlaw.uottawa.ca/people/scassa-teresa">https://techlaw.uottawa.ca/people/scassa-teresa</a></p><p><a href="https://www.teresascassa.ca">https://www.teresascassa.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Robinson, P., & Scassa, T. (2022). <i>The Future of Open Data</i>.</p><p><a href="https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf">https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf</a></p><p>Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.</p><p>Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. <i>Technology and Regulation</i>, <i>2022</i>, 23-35</p><p>Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. <i>Can. J. Comp. & Contemp. L.</i>, <i>8</i>, 271.</p><p>Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. <i>The Canadian Bar Review</i>, <i>101</i>(1)</p><p> </p><p><strong>Other</strong>:</p><p>This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI.  The intro was then rewritten and some of the work of the other AI tool had to be redone manually.   We are at the 'click a button and it is done' stage yet.  </p><p> </p><p> </p>
]]></description>
      <pubDate>Fri, 15 Sep 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Teresa Scassa)</author>
      <link>https://cybercrimeology.com/episodes/smart-everything-data-everywhere-ai-all-at-once-the-weird-wide-web-of-privacy-h5u8KrHY</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Teresa Scassa</p><p><a href="https://techlaw.uottawa.ca/people/scassa-teresa">https://techlaw.uottawa.ca/people/scassa-teresa</a></p><p><a href="https://www.teresascassa.ca">https://www.teresascassa.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Robinson, P., & Scassa, T. (2022). <i>The Future of Open Data</i>.</p><p><a href="https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf">https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf</a></p><p>Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.</p><p>Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. <i>Technology and Regulation</i>, <i>2022</i>, 23-35</p><p>Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. <i>Can. J. Comp. & Contemp. L.</i>, <i>8</i>, 271.</p><p>Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. <i>The Canadian Bar Review</i>, <i>101</i>(1)</p><p> </p><p><strong>Other</strong>:</p><p>This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI.  The intro was then rewritten and some of the work of the other AI tool had to be redone manually.   We are at the 'click a button and it is done' stage yet.  </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="31432754" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/65bf5cd7-61bb-45ae-a16e-81ab4799de45/audio/af85e0a6-e6ec-4caf-8a19-d3022cd9d42d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Smart Everything, Data Everywhere &amp; AI, all at once: The Weird Wide Web of Privacy</itunes:title>
      <itunes:author>Teresa Scassa</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/f6f51540-8192-4b73-9c9c-6da0aafdbf1f/3000x3000/ep94.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:42</itunes:duration>
      <itunes:summary>What do AI, Open Data, and Smart Cities have in common ?  They all impact on privacy. We are joined by Dr. Teresa Scassa, a professor of law and the Canada Research Chair in Information Law and Policy at the University of Ottawa to discuss these issues and help us to better understand how we should pose and consider all of these technologies together in how we regulate to preserve our communities, societies and world  </itunes:summary>
      <itunes:subtitle>What do AI, Open Data, and Smart Cities have in common ?  They all impact on privacy. We are joined by Dr. Teresa Scassa, a professor of law and the Canada Research Chair in Information Law and Policy at the University of Ottawa to discuss these issues and help us to better understand how we should pose and consider all of these technologies together in how we regulate to preserve our communities, societies and world  </itunes:subtitle>
      <itunes:keywords>community, regulation, ai, research, personal information, privacy, open data, smart cities, law, cloud, education, artificial intelligence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6925c514-8324-407b-81e1-b0e326f99fcf</guid>
      <title>Change and Cybercrime Research: Modernizing  Data Collection and Ethics</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Richard Frank</p><p><a href="https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html">https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html</a></p><p>Noelle Warkentin</p><p><a href="https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html">https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: <a href="https://doi.org/10.1080/1478601X.2022.2081568">10.1080/1478601X.2022.2081568</a></p><p>Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. <i>Open Source Intelligence and Cyber Crime: Social Media Analytics</i>, 89-111.</p><p><a href="https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4">https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4</a></p><p>A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," <i>2016 IEEE Conference on Intelligence and Security Informatics (ISI)</i>, Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/7745452">https://ieeexplore.ieee.org/abstract/document/7745452</a></p><p><strong>Other:</strong></p>
]]></description>
      <pubDate>Fri, 1 Sep 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Noelle Warkentin, Richard Frank)</author>
      <link>https://cybercrimeology.com/episodes/change-and-cybercrime-research-modernizing-data-collection-and-ethics-pFi55GhT</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Richard Frank</p><p><a href="https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html">https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html</a></p><p>Noelle Warkentin</p><p><a href="https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html">https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: <a href="https://doi.org/10.1080/1478601X.2022.2081568">10.1080/1478601X.2022.2081568</a></p><p>Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. <i>Open Source Intelligence and Cyber Crime: Social Media Analytics</i>, 89-111.</p><p><a href="https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4">https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4</a></p><p>A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," <i>2016 IEEE Conference on Intelligence and Security Informatics (ISI)</i>, Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/7745452">https://ieeexplore.ieee.org/abstract/document/7745452</a></p><p><strong>Other:</strong></p>
]]></content:encoded>
      <enclosure length="30746873" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/95e307f5-38c1-4144-8dce-78a6225436ad/audio/15559666-cb79-4a8c-8188-6acfe41c846e/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Change and Cybercrime Research: Modernizing  Data Collection and Ethics</itunes:title>
      <itunes:author>Noelle Warkentin, Richard Frank</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/c917ee55-69b4-483c-af61-0d37f8f17ecc/3000x3000/ep93.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:00</itunes:duration>
      <itunes:summary>Adapting to overcome problems can allow us to innovate and renovate how we do things.  
Dr Richard Frank and Noelle Warkentin from Simon Fraser University chat with us about the struggle of trying to perform important research under unfavourable conditions, the use of third-party service providers for data collection in research and how the dynamic nature of cyberspace is creating challenges for the processes designed to ensure ethical research.</itunes:summary>
      <itunes:subtitle>Adapting to overcome problems can allow us to innovate and renovate how we do things.  
Dr Richard Frank and Noelle Warkentin from Simon Fraser University chat with us about the struggle of trying to perform important research under unfavourable conditions, the use of third-party service providers for data collection in research and how the dynamic nature of cyberspace is creating challenges for the processes designed to ensure ethical research.</itunes:subtitle>
      <itunes:keywords>crime, outsourcing, research, cybercrime, surveys, ethics, science, data collection, education, online research</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">85e31851-8207-4250-a0aa-5967c503c5e3</guid>
      <title>To PhD or not to PhD:  Doctor&apos;s Orders</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></description>
      <pubDate>Tue, 15 Aug 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Shabnam Saderi, Kwasi Boakye-Boateng, Rachel Bleiman, Vicky Desjardin, Allysa Czerwinsky, Diana Benitez)</author>
      <link>https://cybercrimeology.com/episodes/to-phd-or-not-to-phd-doctors-orders-dcfCaPDY</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></content:encoded>
      <enclosure length="32929995" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/9aab4b68-c3bf-4801-b5b6-2bb053c7fecb/audio/f6b26311-2acb-4142-b39b-2a2487b8e61e/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>To PhD or not to PhD:  Doctor&apos;s Orders</itunes:title>
      <itunes:author>Shabnam Saderi, Kwasi Boakye-Boateng, Rachel Bleiman, Vicky Desjardin, Allysa Czerwinsky, Diana Benitez</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/ccfb3ef8-77f0-4650-869a-dcaffd1321cb/3000x3000/ep92.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:16</itunes:duration>
      <itunes:summary>What does a phd in cybercrime or cybersecurity do to you and how can you get through the process? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In this the final part of the series, we find out how the doctoral process changes people, discuss the balance between guidance and freedom in learning to be an independent researcher, how to deal with impostor syndrome and we will receive some sage advice.</itunes:summary>
      <itunes:subtitle>What does a phd in cybercrime or cybersecurity do to you and how can you get through the process? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In this the final part of the series, we find out how the doctoral process changes people, discuss the balance between guidance and freedom in learning to be an independent researcher, how to deal with impostor syndrome and we will receive some sage advice.</itunes:subtitle>
      <itunes:keywords>higher education, academia, phd, doctorate, cybercrime, pandemic, cybersecurity, studies, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b0ffcbdf-bd8d-4b51-b380-aa5b574d035b</guid>
      <title>To PhD or not to PhD: The Challenge of a doctorate in cybercrime</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></description>
      <pubDate>Tue, 1 Aug 2023 11:52:47 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Shabnam Saderi, Rachel Bleiman, Allysa Czerwinsky, Vicky Desjardin, Kwasi Boakye-Boateng, Diana Benitez)</author>
      <link>https://cybercrimeology.com/episodes/to-phd-or-not-to-phd-the-challenge-of-a-doctorate-in-cybercrime-EzuiI3Qa</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></content:encoded>
      <enclosure length="29709107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c3749755-e9d2-4fcd-a210-229de49f2137/audio/2a2b5469-430e-4c71-ba10-4e25e7e828d3/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>To PhD or not to PhD: The Challenge of a doctorate in cybercrime</itunes:title>
      <itunes:author>Shabnam Saderi, Rachel Bleiman, Allysa Czerwinsky, Vicky Desjardin, Kwasi Boakye-Boateng, Diana Benitez</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9ac10d7d-ef99-4f2d-9113-77fb2b1afb49/3000x3000/ep91.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:55</itunes:duration>
      <itunes:summary>What is it like to study a doctorate in cybercrime or cybersecurity and should you think about doing one? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In this the second part of the series, we find out about what is unique studying a subject that is related to cyber, what the impact of the pandemic was and we learn what the process of doing had a doctorate is, how it feels, and what is important for success. </itunes:summary>
      <itunes:subtitle>What is it like to study a doctorate in cybercrime or cybersecurity and should you think about doing one? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In this the second part of the series, we find out about what is unique studying a subject that is related to cyber, what the impact of the pandemic was and we learn what the process of doing had a doctorate is, how it feels, and what is important for success. </itunes:subtitle>
      <itunes:keywords>higher education, academia, phd, doctorate, cybercrime, pandemic, cybersecurity, studies, education</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">233d792d-dfee-4286-abe1-8062a5db9694</guid>
      <title>To PhD or not to PhD: What is it to doctorate in cybercrime and should you ?</title>
      <description><![CDATA[<h2><strong>Episode Notes</strong></h2><p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></description>
      <pubDate>Sat, 15 Jul 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Diana Benitez, Kwasi Boakye-Boateng, Shabnam Saderi, Rachel Bleiman, Vicky Desjardin, Allysa Czerwinsky)</author>
      <link>https://cybercrimeology.com/episodes/to-phd-or-not-to-phd-what-is-it-to-doctorate-in-cybercrime-and-should-you-L_DBEQdD</link>
      <content:encoded><![CDATA[<h2><strong>Episode Notes</strong></h2><p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/**">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Diana Benitez</p><p>Kwasi Boakye-Boateng</p><p><a href="https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/">https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman**">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Shabnam Saderi</p><p><a href="https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK">https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK</a></p><p><a href="https://www.unb.ca/cic/membership/researchers.html">https://www.unb.ca/cic/membership/researchers.html</a></p><p>Vicky Desjardins</p><p><a href="https://www.linkedin.com/in/%F0%9F%92%ABvicky-desjardins-208134221/"><strong>https://www.linkedin.com/in/💫vicky-desjardins-208134221/</strong></a></p>
]]></content:encoded>
      <enclosure length="30745979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/d8ce986d-65c3-4120-8373-977d5bcbbd09/audio/7bd92aa9-075b-4b7e-88c3-b553711b98ef/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>To PhD or not to PhD: What is it to doctorate in cybercrime and should you ?</itunes:title>
      <itunes:author>Diana Benitez, Kwasi Boakye-Boateng, Shabnam Saderi, Rachel Bleiman, Vicky Desjardin, Allysa Czerwinsky</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/069fa5ea-0f4c-4a14-9c58-0d74a1e37d3c/3000x3000/ep90.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:00</itunes:duration>
      <itunes:summary>What is it like to study a doctorate in cybercrime or cybersecurity and should you think about doing one? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In the first part of the we look at the decision to start, why would you, why shouldn&apos;t you and what is different about doing a doctorate in cyber. </itunes:summary>
      <itunes:subtitle>What is it like to study a doctorate in cybercrime or cybersecurity and should you think about doing one? With the help of five people that are well on their way to a phd in their respective fields, we will attempt to find out more about the adventure of a doctorate in cyber. In a three-part mini-series we share some perspectives on the experience of this level of study.  In the first part of the we look at the decision to start, why would you, why shouldn&apos;t you and what is different about doing a doctorate in cyber. </itunes:subtitle>
      <itunes:keywords>higher education, academia, phd, doctorate, cybercrime, cybersecurity, studies, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">08c9e27d-da3e-48f1-8a2b-0d156f881606</guid>
      <title>Education and Research Tools for Social Engineering and Ransomware</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In <i>2021 APWG Symposium on Electronic Crime Research (eCrime)</i> (pp. 1-11). IEEE.</p><p>Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In <i>2020 IEEE Integrated STEM Education Conference (ISEC)</i> (pp. 1-6). IEEE.</p><p>Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In <i>Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales</i> (pp. 25-37). Singapore: Springer Nature Singapore.</p><p><strong>Other:</strong></p><p>The CARE Lab</p><p><a href="https://sites.temple.edu/care/social-engineering/course-projects/">https://sites.temple.edu/care/social-engineering/course-projects/</a></p><p><strong>The Critical Infrastructure Ransomware Attacks (CIRA) Dataset</strong></p><p><a href="https://sites.temple.edu/care/cira/">https://sites.temple.edu/care/cira/</a></p><p>The Summer Social Engineering School</p><p><a href="https://sites.temple.edu/socialengineering/">https://sites.temple.edu/socialengineering/</a></p><p>This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.</p>
]]></description>
      <pubDate>Sat, 1 Jul 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rachel Bleiman, Nicolas Vermeys)</author>
      <link>https://cybercrimeology.com/episodes/education-and-research-tools-for-social-engineering-and-ransomware-4HgsZxhc</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Rachel Bleiman</p><p><a href="https://liberalarts.temple.edu/content/rachel-bleiman">https://liberalarts.temple.edu/content/rachel-bleiman</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In <i>2021 APWG Symposium on Electronic Crime Research (eCrime)</i> (pp. 1-11). IEEE.</p><p>Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In <i>2020 IEEE Integrated STEM Education Conference (ISEC)</i> (pp. 1-6). IEEE.</p><p>Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In <i>Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales</i> (pp. 25-37). Singapore: Springer Nature Singapore.</p><p><strong>Other:</strong></p><p>The CARE Lab</p><p><a href="https://sites.temple.edu/care/social-engineering/course-projects/">https://sites.temple.edu/care/social-engineering/course-projects/</a></p><p><strong>The Critical Infrastructure Ransomware Attacks (CIRA) Dataset</strong></p><p><a href="https://sites.temple.edu/care/cira/">https://sites.temple.edu/care/cira/</a></p><p>The Summer Social Engineering School</p><p><a href="https://sites.temple.edu/socialengineering/">https://sites.temple.edu/socialengineering/</a></p><p>This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.</p>
]]></content:encoded>
      <enclosure length="25029661" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1b2ee3ec-bf3c-411e-bb29-167fd6be1b51/audio/301647ea-cb10-47f5-960c-3c1ca462d7ac/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Education and Research Tools for Social Engineering and Ransomware</itunes:title>
      <itunes:author>Rachel Bleiman, Nicolas Vermeys</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/5a31e0ca-fb66-4ba2-914b-e9c5a81bbf2c/3000x3000/ep89.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:02</itunes:duration>
      <itunes:summary>Rachel Bleiman from Temple University  joins us to talk about training for social engineering and the Critical Infrastructure Ransomware Attacks (CIRA) Dataset that they have created to promote research.  Prof Nicolas Vermeys answers a silly question about why some cybercrimes are tried in a criminal court and others in a civil court. </itunes:summary>
      <itunes:subtitle>Rachel Bleiman from Temple University  joins us to talk about training for social engineering and the Critical Infrastructure Ransomware Attacks (CIRA) Dataset that they have created to promote research.  Prof Nicolas Vermeys answers a silly question about why some cybercrimes are tried in a criminal court and others in a civil court. </itunes:subtitle>
      <itunes:keywords>data, research, cybercrime, critical infrastructure, ransomware, cybersecurity, social engineering, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">69cbba2f-23c0-4fdf-a6a2-1c84ad929811</guid>
      <title>An Involuntarily Celibate Community: Research to understand incels</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Julia R. DeCook & Megan Kelly (2022) Interrogating the “incel menace”: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: <a href="https://doi.org/10.1080/17539153.2021.2005099">10.1080/17539153.2021.2005099</a></p><p>Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In <i>Male supremacism in the United States</i> (pp. 164-180). Routledge.</p><p>DeCook, Julia (19 March, 2021) The Issue Isn’t Incels. It’s Racist Misogyny, Global Network on Extremism & Technology**,** <a href="https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/">https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/</a></p><p><strong>Other:</strong></p><p>Research by Tim Squirrell et al</p><p><a href="https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation">https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation</a></p><p>News articles regarding the Toronto Van attack:</p><p><a href="https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465">https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465</a></p><p><a href="https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people">https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people</a></p><p>The interview with Allysa was created as part of the <a href="http://secrev.org/">secrev.org</a> conference.</p><p>This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.</p>
]]></description>
      <pubDate>Thu, 15 Jun 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Allysa Czerwinsky, Nicolas Vermeys)</author>
      <link>https://cybercrimeology.com/episodes/an-involuntarily-celibate-community-research-to-understand-incels-pLlzy8qG</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Allysa Czerwinsky</p><p><a href="https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/">https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Julia R. DeCook & Megan Kelly (2022) Interrogating the “incel menace”: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: <a href="https://doi.org/10.1080/17539153.2021.2005099">10.1080/17539153.2021.2005099</a></p><p>Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In <i>Male supremacism in the United States</i> (pp. 164-180). Routledge.</p><p>DeCook, Julia (19 March, 2021) The Issue Isn’t Incels. It’s Racist Misogyny, Global Network on Extremism & Technology**,** <a href="https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/">https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/</a></p><p><strong>Other:</strong></p><p>Research by Tim Squirrell et al</p><p><a href="https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation">https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation</a></p><p>News articles regarding the Toronto Van attack:</p><p><a href="https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465">https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465</a></p><p><a href="https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people">https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people</a></p><p>The interview with Allysa was created as part of the <a href="http://secrev.org/">secrev.org</a> conference.</p><p>This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.</p>
]]></content:encoded>
      <enclosure length="40693854" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c26afaa1-cf0e-499e-b393-feb300ead0b4/audio/12c14bd6-484c-4f23-9f17-ebddc32eb8e1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>An Involuntarily Celibate Community: Research to understand incels</itunes:title>
      <itunes:author>Allysa Czerwinsky, Nicolas Vermeys</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/e116041f-7447-4715-9a5e-7b6a3f34256b/3000x3000/ep88.jpg?aid=rss_feed"/>
      <itunes:duration>00:42:21</itunes:duration>
      <itunes:summary>The incel community has been associated with terrorist attacks and misogynistic violence. But logically, just as not all violent terrorists are incels, not all incels are violent terrorists and uncritical condemnation is neither scientific nor constructive.  Allysa Czerwinsky joins us for an open and objective discussion of the incel community and research into that community so that we can better understand this group.  Dr Nicolas Vermeys answers another of my silly questions about the regulations around the storage of data and whether companies as victims of data breaches can also be held responsible for the loss of their client’s data.  </itunes:summary>
      <itunes:subtitle>The incel community has been associated with terrorist attacks and misogynistic violence. But logically, just as not all violent terrorists are incels, not all incels are violent terrorists and uncritical condemnation is neither scientific nor constructive.  Allysa Czerwinsky joins us for an open and objective discussion of the incel community and research into that community so that we can better understand this group.  Dr Nicolas Vermeys answers another of my silly questions about the regulations around the storage of data and whether companies as victims of data breaches can also be held responsible for the loss of their client’s data.  </itunes:subtitle>
      <itunes:keywords>black pill, extremism, incels, fisa, red pill, research, cybercrime, manosphere, data breaches, cyberlaw</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">57181006-54d6-422b-a41e-318b96529751</guid>
      <title>What is Social Engineering?</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Kevin Steinmetz</p><p><a href="https://www.k-state.edu/sasw/faculty/steinmetz.html">https://www.k-state.edu/sasw/faculty/steinmetz.html</a></p><p><a href="https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en">https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artists’ Perceptions of Criminal Justice. <i>Race and Justice</i>, <i>2</i>(3), 155–178. <a href="https://doi.org/10.1177/2153368712443969">https://doi.org/10.1177/2153368712443969</a></p><p>Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: <a href="https://doi.org/10.1080/19361610.2021.2002119">10.1080/19361610.2021.2002119</a></p><p>Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. <i>Social Science Computer Review</i>, <i>41</i>(2), 592–607. <a href="https://doi.org/10.1177/08944393221117501">https://doi.org/10.1177/08944393221117501</a></p><p>Goffman, E. (2002). The presentation of self in everyday life. 1959. <i>Garden City, NY</i>, <i>259</i>.</p><p>Agnew, R. (2006). Pressured into crime: An overview of general strain theory.</p><p><strong>Other:</strong></p><p>This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.</p>
]]></description>
      <pubDate>Thu, 1 Jun 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Kevin Steinmetz, Nicolas Vermeys)</author>
      <link>https://cybercrimeology.com/episodes/what-is-social-engineering-jWST_YH4</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Kevin Steinmetz</p><p><a href="https://www.k-state.edu/sasw/faculty/steinmetz.html">https://www.k-state.edu/sasw/faculty/steinmetz.html</a></p><p><a href="https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en">https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artists’ Perceptions of Criminal Justice. <i>Race and Justice</i>, <i>2</i>(3), 155–178. <a href="https://doi.org/10.1177/2153368712443969">https://doi.org/10.1177/2153368712443969</a></p><p>Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: <a href="https://doi.org/10.1080/19361610.2021.2002119">10.1080/19361610.2021.2002119</a></p><p>Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. <i>Social Science Computer Review</i>, <i>41</i>(2), 592–607. <a href="https://doi.org/10.1177/08944393221117501">https://doi.org/10.1177/08944393221117501</a></p><p>Goffman, E. (2002). The presentation of self in everyday life. 1959. <i>Garden City, NY</i>, <i>259</i>.</p><p>Agnew, R. (2006). Pressured into crime: An overview of general strain theory.</p><p><strong>Other:</strong></p><p>This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.</p>
]]></content:encoded>
      <enclosure length="32190689" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3b6bc5e4-ded4-4743-b545-20657514fbdf/audio/d3c0f441-15cf-4d5d-b20c-7028468a8992/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>What is Social Engineering?</itunes:title>
      <itunes:author>Kevin Steinmetz, Nicolas Vermeys</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/b1e5e55a-9315-49bf-9e06-334438b82c61/3000x3000/ep87.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:30</itunes:duration>
      <itunes:summary>Social Engineering is something what we hear about a lot in the context of cybersecurity and cybercrimes, but what is it ?  Dr Kevin Steinmetz from Kansas State University joins us to talk about Social Engineering as well as his hopes for the ASC Division of Cybercrime.  Professor Nicolas Vermeys joins us to answer a silly question about the terminology used in cybercrime law.  </itunes:summary>
      <itunes:subtitle>Social Engineering is something what we hear about a lot in the context of cybersecurity and cybercrimes, but what is it ?  Dr Kevin Steinmetz from Kansas State University joins us to talk about Social Engineering as well as his hopes for the ASC Division of Cybercrime.  Professor Nicolas Vermeys joins us to answer a silly question about the terminology used in cybercrime law.  </itunes:subtitle>
      <itunes:keywords>definitions, penetration testing, research, scams, cybercrime, science, cons, cybersecurity, social engineering, law, cyberlaw</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">48e00048-0cf3-4885-92d4-51fc056693b0</guid>
      <title>Pet Scammed: narratives of cyber fraud victimization</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Jennifer L. Schally</p><p><a href="https://cjrc.la.psu.edu/people/jennifer-l-schally/">https://cjrc.la.psu.edu/people/jennifer-l-schally/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.</p><p><a href="https://etda.libraries.psu.edu/catalog/25084ksd5317">https://etda.libraries.psu.edu/catalog/25084ksd5317</a></p><p>Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts. <i>Australian & New Zealand Journal of Criminology</i>, <i>53</i>(4), 497-514.</p><p>Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. <i>International Journal of Law, Crime and Justice</i>, <i>66</i>, 10048</p><p>Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. <i>European Journal of Criminology</i>, <i>16</i>(4), 391-412.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843">https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843</a></p><p><strong>Other:</strong></p><p>The American Kennel Club on “How to Spot a Puppy Scam Online”</p><p><a href="https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/">https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/</a></p><p>Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.</p><p><a href="https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008">https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008</a></p>
]]></description>
      <pubDate>Mon, 15 May 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Jennifer L. Schally, Kaylie Derrickson, Nicolas Vermeys)</author>
      <link>https://cybercrimeology.com/episodes/pet-scammed-narratives-of-cyber-fraud-victimization-6TjW5ZJ3</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Jennifer L. Schally</p><p><a href="https://cjrc.la.psu.edu/people/jennifer-l-schally/">https://cjrc.la.psu.edu/people/jennifer-l-schally/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.</p><p><a href="https://etda.libraries.psu.edu/catalog/25084ksd5317">https://etda.libraries.psu.edu/catalog/25084ksd5317</a></p><p>Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts. <i>Australian & New Zealand Journal of Criminology</i>, <i>53</i>(4), 497-514.</p><p>Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. <i>International Journal of Law, Crime and Justice</i>, <i>66</i>, 10048</p><p>Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. <i>European Journal of Criminology</i>, <i>16</i>(4), 391-412.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843">https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843</a></p><p><strong>Other:</strong></p><p>The American Kennel Club on “How to Spot a Puppy Scam Online”</p><p><a href="https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/">https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/</a></p><p>Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.</p><p><a href="https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008">https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008</a></p>
]]></content:encoded>
      <enclosure length="30609800" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/62f62c66-77f3-4132-aa9f-4dcbefa3f054/audio/8e109b77-5a3e-4853-a556-2e06189ebf31/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Pet Scammed: narratives of cyber fraud victimization</itunes:title>
      <itunes:author>Jennifer L. Schally, Kaylie Derrickson, Nicolas Vermeys</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/4f17be5f-05f9-40f3-b680-69df0741e016/3000x3000/ep86.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:51</itunes:duration>
      <itunes:summary>Fraud involving the sale of pets online is an emotional issue, but not one that really makes headlines as much as it perhaps should. We talk with Dr Jennifer L. Schally,  Associate Teaching Professor of Criminal Justice at Pennsylvania State University and Kaylie Derrickson who share their experiences researching the narratives of victims of online pet scams.  Prof. Nicolas Vermeys joins us to answer whether data interference type crime still happen. </itunes:summary>
      <itunes:subtitle>Fraud involving the sale of pets online is an emotional issue, but not one that really makes headlines as much as it perhaps should. We talk with Dr Jennifer L. Schally,  Associate Teaching Professor of Criminal Justice at Pennsylvania State University and Kaylie Derrickson who share their experiences researching the narratives of victims of online pet scams.  Prof. Nicolas Vermeys joins us to answer whether data interference type crime still happen. </itunes:subtitle>
      <itunes:keywords>pet scams, crime, victimization, qualitative, research, cybercrime, victims, online fraud</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">75d2afdb-303a-4674-80e4-ad5f4b6b5ce3</guid>
      <title>Darknet Honeypots: innovating research into online criminal markets</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Jordan Howell</p><p><a href="https://cina.gmu.edu/people/c-jordan-howell/">https://cina.gmu.edu/people/c-jordan-howell/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, <i>The British Journal of Criminology</i>, Volume 62, Issue 6, November 2022, Pages 1518–1536, <a href="https://doi.org/10.1093/bjc/azab116">https://doi.org/10.1093/bjc/azab116</a></p><p>Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. <i>Journal of Contemporary Criminal Justice</i>, 10439862231158005.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005">https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005</a></p><p><strong>Other:</strong></p><p>An assessment of ransomware distribution on darknet markets</p><p><a href="https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets">https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets</a></p><p>The episode with Dr. Eden Kamar talking about using chatbots for research </p><p>https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians</p><p> </p>
]]></description>
      <pubDate>Mon, 1 May 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Nicolas Vermeys, Jordan Howell)</author>
      <link>https://cybercrimeology.com/episodes/darknet-honeypots-innovating-research-into-online-criminal-markets-xQQn77j_</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Jordan Howell</p><p><a href="https://cina.gmu.edu/people/c-jordan-howell/">https://cina.gmu.edu/people/c-jordan-howell/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, <i>The British Journal of Criminology</i>, Volume 62, Issue 6, November 2022, Pages 1518–1536, <a href="https://doi.org/10.1093/bjc/azab116">https://doi.org/10.1093/bjc/azab116</a></p><p>Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. <i>Journal of Contemporary Criminal Justice</i>, 10439862231158005.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005">https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005</a></p><p><strong>Other:</strong></p><p>An assessment of ransomware distribution on darknet markets</p><p><a href="https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets">https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets</a></p><p>The episode with Dr. Eden Kamar talking about using chatbots for research </p><p>https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians</p><p> </p>
]]></content:encoded>
      <enclosure length="27952991" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/0c1eb4d7-e786-4cba-9700-0a0863a716a1/audio/4d68a801-1956-4a86-8be6-ce9a7c2ad277/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Darknet Honeypots: innovating research into online criminal markets</itunes:title>
      <itunes:author>Nicolas Vermeys, Jordan Howell</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/71f81e1c-725c-47ba-bdf0-7cd1ca24dcc7/3000x3000/ep85.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:05</itunes:duration>
      <itunes:summary>Can we observe cybercriminals as they shop for illicit goods on darknet marketplaces ?   Jordan Howell joins with us to talk about what we can learn about darknet stolen data marketplaces, innovative techniques for gathering data and the benefits of these approaches to researching criminal behaviour online.   Professor Nicolas Vermeys answers another stupid question about the law and illegal access.  </itunes:summary>
      <itunes:subtitle>Can we observe cybercriminals as they shop for illicit goods on darknet marketplaces ?   Jordan Howell joins with us to talk about what we can learn about darknet stolen data marketplaces, innovative techniques for gathering data and the benefits of these approaches to researching criminal behaviour online.   Professor Nicolas Vermeys answers another stupid question about the law and illegal access.  </itunes:subtitle>
      <itunes:keywords>stolen data, academia, darknet, breach, crime market, research, cybercrime, honeypots, ransomware, cybersecurity, innovation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0bf4b9bc-89da-4e6e-9c6c-abec54b61308</guid>
      <title>Opening the Internet&apos;s Toolbox: Building technical skills for crime research</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Kyung-shick Choi</p><p><a href="https://www.bu.edu/met/profile/kyung-shick-choi/">https://www.bu.edu/met/profile/kyung-shick-choi/</a></p><p><a href="https://centercicboston.org/">https://centercicboston.org</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Other:</strong></p><p>Regarding the Canadian cybercrime laws mentioned:</p><p><a href="https://www.rcmp-grc.gc.ca/en/cybercrime-defined">https://www.rcmp-grc.gc.ca/en/cybercrime-defined</a></p>
]]></description>
      <pubDate>Sat, 15 Apr 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Nicolas Vermeys, Kyung-shik Choi)</author>
      <link>https://cybercrimeology.com/episodes/opening-the-internets-toolbox-building-technical-skills-for-crime-researcher-SDckFpxs</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Kyung-shick Choi</p><p><a href="https://www.bu.edu/met/profile/kyung-shick-choi/">https://www.bu.edu/met/profile/kyung-shick-choi/</a></p><p><a href="https://centercicboston.org/">https://centercicboston.org</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com/"><strong>https://www.vermeys.com</strong></a></p><p><strong>Other:</strong></p><p>Regarding the Canadian cybercrime laws mentioned:</p><p><a href="https://www.rcmp-grc.gc.ca/en/cybercrime-defined">https://www.rcmp-grc.gc.ca/en/cybercrime-defined</a></p>
]]></content:encoded>
      <enclosure length="23854518" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/60919204-3e0f-48ae-ae50-70ceccea6488/audio/3e44f274-dfa5-40a5-af5d-54037b18442a/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Opening the Internet&apos;s Toolbox: Building technical skills for crime research</itunes:title>
      <itunes:author>Nicolas Vermeys, Kyung-shik Choi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/7fb5fff3-bebc-4da5-bdb9-9a0ca5884cf5/3000x3000/ep84.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:48</itunes:duration>
      <itunes:summary>Can we learn another discipline and will that make us better researchers?   Dr Kyung-Shick Choi joins us to discuss the trials of learning the technical aspects of cyber, how that can help us to be better researchers and creating training programs to make that journey easier for others.  Dr Nicolas Vermeys answers another silly question about assumptions about cybercrime law. </itunes:summary>
      <itunes:subtitle>Can we learn another discipline and will that make us better researchers?   Dr Kyung-Shick Choi joins us to discuss the trials of learning the technical aspects of cyber, how that can help us to be better researchers and creating training programs to make that journey easier for others.  Dr Nicolas Vermeys answers another silly question about assumptions about cybercrime law. </itunes:subtitle>
      <itunes:keywords>academia, research, cybercrime, training, criminology, interdisciplinary, digital forensics, osint</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b17b2b59-786d-40d1-ba14-425348baf022</guid>
      <title>My parents are home, it would be weird: Chatbots, Grooming &amp; Guardians</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Eden Kamar</p><p><a href="https://www.linkedin.com/in/eden-kamar/">https://www.linkedin.com/in/eden-kamar/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com">https://www.vermeys.com</a></p><p> </p><p><strong>Mentioned in this Episode:</strong></p><p>Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. <i>Computers in Human Behavior</i>, <i>137</i>, 107386.</p><p><a href="https://doi.org/10.1016/j.chb.2022.107386">https://doi.org/10.1016/j.chb.2022.107386</a></p><p> </p><p><strong>Other</strong>:</p><p>Thanks to Dr David Maimon for arranging this interview.  Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode.  Congratulations the London Metropolitan University gaining an exciting new associate professor.</p><p> </p><p> </p>
]]></description>
      <pubDate>Sat, 1 Apr 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Eden Kamar)</author>
      <link>https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians-dJocqgJc</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Eden Kamar</p><p><a href="https://www.linkedin.com/in/eden-kamar/">https://www.linkedin.com/in/eden-kamar/</a></p><p>Prof Nicolas Vermeys</p><p><a href="https://www.vermeys.com">https://www.vermeys.com</a></p><p> </p><p><strong>Mentioned in this Episode:</strong></p><p>Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. <i>Computers in Human Behavior</i>, <i>137</i>, 107386.</p><p><a href="https://doi.org/10.1016/j.chb.2022.107386">https://doi.org/10.1016/j.chb.2022.107386</a></p><p> </p><p><strong>Other</strong>:</p><p>Thanks to Dr David Maimon for arranging this interview.  Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode.  Congratulations the London Metropolitan University gaining an exciting new associate professor.</p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="28419850" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/82a151f4-1576-465c-b1e5-86a763c5cd64/audio/4dee1496-4e53-4070-9a7c-61bc5574f601/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>My parents are home, it would be weird: Chatbots, Grooming &amp; Guardians</itunes:title>
      <itunes:author>Eden Kamar</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/2c4ab441-af34-467b-8978-a0a597b0995a/3000x3000/ep83-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:36</itunes:duration>
      <itunes:summary>Parents play a role in the safety of their children online, but what impact does the proximity of parents have on the behaviour of predators ? Dr Eden Kamar discusses interesting experimental research using a chatbot honeypot to collect data on this important issue.   

Dr Nicolas Vermeys from the Cyberjustice laboratory at the university of Montreal answers my silly questions about the Budapest Convention on Cybercrime.</itunes:summary>
      <itunes:subtitle>Parents play a role in the safety of their children online, but what impact does the proximity of parents have on the behaviour of predators ? Dr Eden Kamar discusses interesting experimental research using a chatbot honeypot to collect data on this important issue.   

Dr Nicolas Vermeys from the Cyberjustice laboratory at the university of Montreal answers my silly questions about the Budapest Convention on Cybercrime.</itunes:subtitle>
      <itunes:keywords>research, grooming, cybercrime, convention on cybercrime, honeypots, safety, parents, law, chatbots, child abuse, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">00022ceb-d324-4285-8a3d-31a6f6aad9f1</guid>
      <title>There can be only one ... comparing theories of cybercrime</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Thomas Dearden</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p><strong>Mentioned in this Episode:</strong></p><p>France moving away from deterrence.</p><p>“using a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackers”- pp 131, page 39.</p><p>Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française</p><p><a href="http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf">http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf</a></p><p>Australia moving towards deterrence.</p><p>Reuters 2022, 11 November <strong>Australia unveils joint cyber police taskforce to 'hunt down' hackers</strong></p><p><a href="https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/">https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/</a></p><p>The name of the mobile game developed in Vietnam was Flappy Bird.</p><p><a href="https://en.wikipedia.org/wiki/Flappy_Bird">https://en.wikipedia.org/wiki/Flappy_Bird</a></p><p> </p><p><strong>Other:</strong></p><p>Apologies for the audio in this one,  we were in a room that suddenly became a lot more crowded after we pressed record.  If you hear yourself in the background,  next time come over and say 'hi'.  </p>
]]></description>
      <pubDate>Wed, 15 Mar 2023 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Thomas Dearden, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/there-can-be-only-one-comparing-theories-of-cybercrime-rkLNa6X_</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Thomas Dearden</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p><strong>Mentioned in this Episode:</strong></p><p>France moving away from deterrence.</p><p>“using a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackers”- pp 131, page 39.</p><p>Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française</p><p><a href="http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf">http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf</a></p><p>Australia moving towards deterrence.</p><p>Reuters 2022, 11 November <strong>Australia unveils joint cyber police taskforce to 'hunt down' hackers</strong></p><p><a href="https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/">https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/</a></p><p>The name of the mobile game developed in Vietnam was Flappy Bird.</p><p><a href="https://en.wikipedia.org/wiki/Flappy_Bird">https://en.wikipedia.org/wiki/Flappy_Bird</a></p><p> </p><p><strong>Other:</strong></p><p>Apologies for the audio in this one,  we were in a room that suddenly became a lot more crowded after we pressed record.  If you hear yourself in the background,  next time come over and say 'hi'.  </p>
]]></content:encoded>
      <enclosure length="26514426" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/ef1f1170-3b6c-49a4-9ee3-8aa42f3c8332/audio/a8bbed8c-ec72-4aef-8253-9ac665aea3c8/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>There can be only one ... comparing theories of cybercrime</itunes:title>
      <itunes:author>Thomas Dearden, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/2bd511f4-9a31-43e6-8372-7c9cc8dad2fa/3000x3000/ep82.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:37</itunes:duration>
      <itunes:summary>Which theory of cybercrime is the best and should we dismiss the bad ones ?  Dr Thomas Dearden, assistant professor of sociology at Virginia Tech joins us to discuss the comparison of theory and how we go about selecting research approaches and the impact that might have on cybercrime and our research of it.   
Scott Wright joins us with his suggestions as to what we should be researching.  </itunes:summary>
      <itunes:subtitle>Which theory of cybercrime is the best and should we dismiss the bad ones ?  Dr Thomas Dearden, assistant professor of sociology at Virginia Tech joins us to discuss the comparison of theory and how we go about selecting research approaches and the impact that might have on cybercrime and our research of it.   
Scott Wright joins us with his suggestions as to what we should be researching.  </itunes:subtitle>
      <itunes:keywords>strain, academia, social learning, deterrence, research, routine activities, cybercrime, anomie, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">34e36220-a333-4ef4-96b8-6b90a56e0687</guid>
      <title>Ageless Security: Cybercrime prevention across the generation gap</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Marti DeLiema</p><p><a href="https://www.cehd.umn.edu/ssw/people/mdeliema/" target="_blank">https://www.cehd.umn.edu/ssw/people/mdeliema/</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p> </p><p><strong>Papers Mentioned in this Episode:</strong></p><p>DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. <i>International Journal of Consumer Studies.</i><a href="https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886">https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886</a></p><p>DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. <i>Innovation in Aging</i>, 5(4), igab043. <a href="https://doi.org/10.1093/geroni/igab043">https://doi.org/10.1093/geroni/igab043</a></p><p>Carpenter, P., & Roer, K. (2022). <i>The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer</i> . John Wiley & Sons.</p><p><a href="https://www.securityculturebook.com/">https://www.securityculturebook.com</a></p>
]]></description>
      <pubDate>Wed, 1 Mar 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Scott Wright, Marti DeLiema)</author>
      <link>https://cybercrimeology.com/episodes/ageless-security-cybercrime-prevention-across-the-generation-gap-6eQGq5nb</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Marti DeLiema</p><p><a href="https://www.cehd.umn.edu/ssw/people/mdeliema/" target="_blank">https://www.cehd.umn.edu/ssw/people/mdeliema/</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p> </p><p><strong>Papers Mentioned in this Episode:</strong></p><p>DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. <i>International Journal of Consumer Studies.</i><a href="https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886">https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886</a></p><p>DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. <i>Innovation in Aging</i>, 5(4), igab043. <a href="https://doi.org/10.1093/geroni/igab043">https://doi.org/10.1093/geroni/igab043</a></p><p>Carpenter, P., & Roer, K. (2022). <i>The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer</i> . John Wiley & Sons.</p><p><a href="https://www.securityculturebook.com/">https://www.securityculturebook.com</a></p>
]]></content:encoded>
      <enclosure length="22623012" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/edc04bb8-15d6-4362-bee2-573addfca439/audio/3a369dd5-974a-4528-aba5-52859a686aaf/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Ageless Security: Cybercrime prevention across the generation gap</itunes:title>
      <itunes:author>Scott Wright, Marti DeLiema</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/159bf10e-18c9-4f54-98db-f8689aec07be/3000x3000/ep81.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:32</itunes:duration>
      <itunes:summary>We are joined by Dr Marti DeLiema to discuss awareness and cybercrime prevention, the needs to prepare people at every point in their lifecycle. Scott Wright is back again to answer the silly question, what is cybersecurity awareness ?</itunes:summary>
      <itunes:subtitle>We are joined by Dr Marti DeLiema to discuss awareness and cybercrime prevention, the needs to prepare people at every point in their lifecycle. Scott Wright is back again to answer the silly question, what is cybersecurity awareness ?</itunes:subtitle>
      <itunes:keywords>cybercrime, cybersecurity, fraud, online, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc673777-01b2-40dc-9349-3bd6d413f306</guid>
      <title>At the Speed of Cyber: Criminal Investigations and Research</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Thomas Hyslip</p><p><a href="https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx">https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx</a></p><p> </p><p>Greg </p><p><a href="https://www.usa.gov">https://www.usa.gov</a></p><p> </p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p> </p><p><strong>Papers Mentioned in this Episode:</strong></p><p>Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. <i>Journal of Cybersecurity</i>, <i>8</i>(1), tyac010.</p><p>Heath, C., & Heath, D. (2007). <i>Made to stick: Why some ideas survive and others die</i>. Random House.</p><p>https://heathbrothers.com/books/made-to-stick/</p><p><strong>Other:</strong></p><p>(Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks</p><p><a href="https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178">https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178</a></p><p> </p><p>​I​nternational Counter Ransomware Task Force</p><p><a href="https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx">https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx</a></p><p> </p><p> </p>
]]></description>
      <pubDate>Wed, 15 Feb 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Gary, Thomas Hyslip)</author>
      <link>https://cybercrimeology.com/episodes/at-the-speed-of-cyber-criminal-investigations-and-research-C8thyXuu</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Thomas Hyslip</p><p><a href="https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx">https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx</a></p><p> </p><p>Greg </p><p><a href="https://www.usa.gov">https://www.usa.gov</a></p><p> </p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p> </p><p><strong>Papers Mentioned in this Episode:</strong></p><p>Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. <i>Journal of Cybersecurity</i>, <i>8</i>(1), tyac010.</p><p>Heath, C., & Heath, D. (2007). <i>Made to stick: Why some ideas survive and others die</i>. Random House.</p><p>https://heathbrothers.com/books/made-to-stick/</p><p><strong>Other:</strong></p><p>(Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks</p><p><a href="https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178">https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178</a></p><p> </p><p>​I​nternational Counter Ransomware Task Force</p><p><a href="https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx">https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx</a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="30815472" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/f84f1d78-1f61-4fd4-80dc-1c5be3edb633/audio/04d279f1-ddf5-408c-ab29-f610d4652634/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>At the Speed of Cyber: Criminal Investigations and Research</itunes:title>
      <itunes:author>Gary, Thomas Hyslip</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/efb55452-d9f8-4138-bb21-d7d92bbc11cf/3000x3000/ep80.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:04</itunes:duration>
      <itunes:summary>For our 80th episode we talk to  Dr Thomas Hyslip, Assistant Professor of Instruction at the University of Florida and Gary about the contrasts between the academic world and the world of the digital forensics investigators on the front lines of cybercrime analysis.  What is different between scientific and investigative research ? </itunes:summary>
      <itunes:subtitle>For our 80th episode we talk to  Dr Thomas Hyslip, Assistant Professor of Instruction at the University of Florida and Gary about the contrasts between the academic world and the world of the digital forensics investigators on the front lines of cybercrime analysis.  What is different between scientific and investigative research ? </itunes:subtitle>
      <itunes:keywords>academia, crime, research, cybercrime, cybersecurity, digital forensics, investigation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cadc0dae-f3a7-4867-92d2-0806379f3809</guid>
      <title>Its Exponential Crime: The shift to catch up to cybercrime</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p><strong>Dr Volkan Topalli</strong></p><p><a href="https://aysps.gsu.edu/profile/volkan-topalli/">https://aysps.gsu.edu/profile/volkan-topalli/</a></p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p><strong>Papers Mentioned in this Episode:</strong></p><p>National Crime Victimization Survey (NCVS) Data Dashboard (N-DASH)</p><p><a href="https://ncvs.bjs.ojp.gov/Home">https://ncvs.bjs.ojp.gov/Home</a></p><p>National Incident-Based Reporting System (NIBRS)</p><p><a href="https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs">https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs</a></p><p>Wang, F., & Topalli, V. (2022). Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context. <i>American Journal of Criminal Justice</i> , 1-37.</p><p><a href="https://link.springer.com/article/10.1007/s12103-022-09706-4">https://link.springer.com/article/10.1007/s12103-022-09706-4</a></p><p><strong>Other:</strong></p><p>Old wine in new bottles is an old expression, that probably predates the modern English language. As Brinton Webb Woodward put in back in the 1890s book Old Wine in New Bottles for Old and New Friends, “ … we thresh over the same old straw. In literature we find, and decant, and bottle up the old wine,. We pour over the old liquor into new packages and put on labels of our own. Haply we filter away the lees and dregs which time had precipitated to the bottom.” This is quite a nice spin on the phrase as it suggests time as an important element in the process of refining ideas and the process of transference as one that removes the garbage and possibly leaving a little space for the new. That is more positive than the modern interpretation of old institutions with a new name. Interestingly, as it pertains to this particular conversation it could be seen as a turn on the biblical expression of new wine in old wineskins, “. And no man putteth new wine into old bottles; else the new wine will burst the bottles, and be spilled, and the bottles shall perish.” Luke 3:37. This older expression can be taken to suggest that new ideas must be received into a new institutions or there could be a problematic conflict between older structure, or that prior knowledge can negatively affect the understanding of new concepts.</p><p>All this to say that the phrase ‘old wine in new bottles’ could be very appropriate to the process that is required for cybersecurity research, if we take Woodward’s interpretation. But it could really be a case of us struggling with ‘new wine in old bottles’.</p><p>In either case, the value of new researchers doing new forms of research with new theory is apparent.</p>
]]></description>
      <pubDate>Wed, 1 Feb 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Volkan Topalli, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/its-exponential-crime-the-shift-to-catch-up-to-cybercrime-5uaUMy_J</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p><strong>Dr Volkan Topalli</strong></p><p><a href="https://aysps.gsu.edu/profile/volkan-topalli/">https://aysps.gsu.edu/profile/volkan-topalli/</a></p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/"><strong>https://www.linkedin.com/in/scottwright/</strong></a></p><p><a href="https://clickarmor.ca/"><strong>https://clickarmor.ca</strong></a></p><p><strong>Papers Mentioned in this Episode:</strong></p><p>National Crime Victimization Survey (NCVS) Data Dashboard (N-DASH)</p><p><a href="https://ncvs.bjs.ojp.gov/Home">https://ncvs.bjs.ojp.gov/Home</a></p><p>National Incident-Based Reporting System (NIBRS)</p><p><a href="https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs">https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs</a></p><p>Wang, F., & Topalli, V. (2022). Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context. <i>American Journal of Criminal Justice</i> , 1-37.</p><p><a href="https://link.springer.com/article/10.1007/s12103-022-09706-4">https://link.springer.com/article/10.1007/s12103-022-09706-4</a></p><p><strong>Other:</strong></p><p>Old wine in new bottles is an old expression, that probably predates the modern English language. As Brinton Webb Woodward put in back in the 1890s book Old Wine in New Bottles for Old and New Friends, “ … we thresh over the same old straw. In literature we find, and decant, and bottle up the old wine,. We pour over the old liquor into new packages and put on labels of our own. Haply we filter away the lees and dregs which time had precipitated to the bottom.” This is quite a nice spin on the phrase as it suggests time as an important element in the process of refining ideas and the process of transference as one that removes the garbage and possibly leaving a little space for the new. That is more positive than the modern interpretation of old institutions with a new name. Interestingly, as it pertains to this particular conversation it could be seen as a turn on the biblical expression of new wine in old wineskins, “. And no man putteth new wine into old bottles; else the new wine will burst the bottles, and be spilled, and the bottles shall perish.” Luke 3:37. This older expression can be taken to suggest that new ideas must be received into a new institutions or there could be a problematic conflict between older structure, or that prior knowledge can negatively affect the understanding of new concepts.</p><p>All this to say that the phrase ‘old wine in new bottles’ could be very appropriate to the process that is required for cybersecurity research, if we take Woodward’s interpretation. But it could really be a case of us struggling with ‘new wine in old bottles’.</p><p>In either case, the value of new researchers doing new forms of research with new theory is apparent.</p>
]]></content:encoded>
      <enclosure length="33937130" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/5fabf45f-a093-4b0a-8738-9401b69473b2/audio/000e6b76-b041-4139-94d5-8eed1e92cc2f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Its Exponential Crime: The shift to catch up to cybercrime</itunes:title>
      <itunes:author>Volkan Topalli, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/b3784cb8-9c8a-4420-8939-04e1220c5b0a/3000x3000/ep79-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:19</itunes:duration>
      <itunes:summary>Are there research traditions conflict with the needs that cybercrime presents? Professor Volkan Topalli joins us to discuss evidence-based cybersecurity research, the uniqueness of cybercrime and the areas where scientific research can improve its approach to realize a greater social benefit. 

Scott Wright is back to answers my silly question about how awareness fits into the puzzle of cybersecurity in organizations.</itunes:summary>
      <itunes:subtitle>Are there research traditions conflict with the needs that cybercrime presents? Professor Volkan Topalli joins us to discuss evidence-based cybersecurity research, the uniqueness of cybercrime and the areas where scientific research can improve its approach to realize a greater social benefit. 

Scott Wright is back to answers my silly question about how awareness fits into the puzzle of cybersecurity in organizations.</itunes:subtitle>
      <itunes:keywords>research, cybercrime, academic, methodology, training, policy, evidence-based, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d7f4a603-5512-4414-bf7b-88c5faed6b36</guid>
      <title>Fraudiculture: The World of Online Fraud</title>
      <description><![CDATA[<p>About our guests:</p><p><strong>Dr Yi Ting Chua</strong></p><p><a href="https://cj.ua.edu/people/dr-yi-ting-chua/">https://cj.ua.edu/people/dr-yi-ting-chua/</a></p><p><strong>Dr Doris Krakrafaa-Bestman</strong></p><p><a href="https://www.aamu.edu/academics/colleges/business-public-affairs/departments/social-sciences/faculty-staff.html">https://www.aamu.edu/academics/colleges/business-public-affairs/departments/social-sciences/faculty-staff.html</a></p><p><strong>Fangzhou Wang</strong></p><p><a href="https://aysps.gsu.edu/phd-student/wang-fangzhou/">https://aysps.gsu.edu/phd-student/wang-fangzhou/</a></p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Wang, F., & Zhou, X. (2022). Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China. <i>Victims & Offenders</i> , 1-28.</p><p><a href="https://doi.org/10.1080/15564886.2022.2051109">https://doi.org/10.1080/15564886.2022.2051109</a></p><p><strong>Other:</strong></p><p>Newman, L.H. (Jan 2, 2023) <strong>Hacker Lexicon: What Is a Pig Butchering Scam?</strong></p><p><a href="https://www.wired.com/story/what-is-pig-butchering-scam/">https://www.wired.com/story/what-is-pig-butchering-scam/</a></p><p>The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter, Kai Roer</p><p><a href="https://www.securityculturebook.com/">https://www.securityculturebook.com</a></p><p>I called this episode “Fraudiculture”, because I thought it interesting how the metaphors used to communicate the techniques seemed to target those with an understanding of agriculture, such as raising cows and pigs as endeavours performed with great care and even empathy, but an ultimate aim of exploitation.</p><p>I am not vegan, I just like to provide metaphorical options for those that prefer less violent phrasing.</p><p><i>“These are the cries of the carrots, the cries of the carrots! You see, Reverend Maynard Tomorrow is harvest day and to them it is the holocaust”</i></p><p>Tool (1993) Disgustipated[song]. On Undertow. Zoo entertainment.</p>
]]></description>
      <pubDate>Sun, 15 Jan 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Doris Krakrafaa-Bestman, Fangzhou Wang, Yi Ting Chua, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/fraudiculture-the-world-of-online-fraud-IlZZGHDc</link>
      <content:encoded><![CDATA[<p>About our guests:</p><p><strong>Dr Yi Ting Chua</strong></p><p><a href="https://cj.ua.edu/people/dr-yi-ting-chua/">https://cj.ua.edu/people/dr-yi-ting-chua/</a></p><p><strong>Dr Doris Krakrafaa-Bestman</strong></p><p><a href="https://www.aamu.edu/academics/colleges/business-public-affairs/departments/social-sciences/faculty-staff.html">https://www.aamu.edu/academics/colleges/business-public-affairs/departments/social-sciences/faculty-staff.html</a></p><p><strong>Fangzhou Wang</strong></p><p><a href="https://aysps.gsu.edu/phd-student/wang-fangzhou/">https://aysps.gsu.edu/phd-student/wang-fangzhou/</a></p><p><strong>Scott Wright</strong></p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Wang, F., & Zhou, X. (2022). Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China. <i>Victims & Offenders</i> , 1-28.</p><p><a href="https://doi.org/10.1080/15564886.2022.2051109">https://doi.org/10.1080/15564886.2022.2051109</a></p><p><strong>Other:</strong></p><p>Newman, L.H. (Jan 2, 2023) <strong>Hacker Lexicon: What Is a Pig Butchering Scam?</strong></p><p><a href="https://www.wired.com/story/what-is-pig-butchering-scam/">https://www.wired.com/story/what-is-pig-butchering-scam/</a></p><p>The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter, Kai Roer</p><p><a href="https://www.securityculturebook.com/">https://www.securityculturebook.com</a></p><p>I called this episode “Fraudiculture”, because I thought it interesting how the metaphors used to communicate the techniques seemed to target those with an understanding of agriculture, such as raising cows and pigs as endeavours performed with great care and even empathy, but an ultimate aim of exploitation.</p><p>I am not vegan, I just like to provide metaphorical options for those that prefer less violent phrasing.</p><p><i>“These are the cries of the carrots, the cries of the carrots! You see, Reverend Maynard Tomorrow is harvest day and to them it is the holocaust”</i></p><p>Tool (1993) Disgustipated[song]. On Undertow. Zoo entertainment.</p>
]]></content:encoded>
      <enclosure length="22868156" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/60e2ac36-37c5-46b4-a1f1-3db05a2986b2/audio/226874ff-bee1-4531-b60b-dab735f1d6e5/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Fraudiculture: The World of Online Fraud</itunes:title>
      <itunes:author>Doris Krakrafaa-Bestman, Fangzhou Wang, Yi Ting Chua, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/82192a69-0380-412d-a53b-e1b9fe09080e/3000x3000/ep78.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:47</itunes:duration>
      <itunes:summary>What is common to how online fraud is run around the world?  We talk about online frauds run in China and Nigeria with Dr YiTing Chua,  Dr Krakrafaa-Bestman and Fangzhou Wang following her presentation of Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China. We also are joined by Scott Wright who answers my silly question about how personalities affect security culture in organizations. </itunes:summary>
      <itunes:subtitle>What is common to how online fraud is run around the world?  We talk about online frauds run in China and Nigeria with Dr YiTing Chua,  Dr Krakrafaa-Bestman and Fangzhou Wang following her presentation of Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (杀猪盘) in China. We also are joined by Scott Wright who answers my silly question about how personalities affect security culture in organizations. </itunes:subtitle>
      <itunes:keywords>advance fee fraud, research, scams, cybercrime, cybersecurity, pig-butchering scam, nigeria, fraud, online, china, romance scam, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b3f88cb-9bb8-4fc2-bc79-0eaa35a4231f</guid>
      <title>Twenty 23: Conferences</title>
      <description><![CDATA[<p><strong>About Our Guests:</strong></p><p>Dr Thomas Dearden</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><p> </p><p>Jordan Howell</p><p><a href="https://cina.gmu.edu/people/c-jordan-howell/">https://cina.gmu.edu/people/c-jordan-howell/</a></p><p> </p><p>Dr Marti DeLiema, </p><p><a href="https://www.cehd.umn.edu/ssw/people/mdeliema/">https://www.cehd.umn.edu/ssw/people/mdeliema/</a></p><p> </p><p>Dr Volkan Topali, </p><p><a href="https://aysps.gsu.edu/profile/volkan-topalli/">https://aysps.gsu.edu/profile/volkan-topalli/</a></p><p> </p><p>Eden Komar</p><p><a href="https://ebcs.gsu.edu/profile/eden-kamar/">https://ebcs.gsu.edu/profile/eden-kamar/</a></p><p> </p><p>Dr Thomas Hyslip </p><p><a href="https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx">https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx</a></p><p> </p><p>And Gary</p><p><a href="https://www.usa.gov">https://www.usa.gov</a> </p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Conferences Mentioned in this Episode:</strong></p><p> </p><table><tbody><tr><td><a href="https://hicss.hawaii.edu">https://hicss.hawaii.edu</a></td><td> The Hawaii International Conference on System Sciences </td><td>Hawaii, USA</td></tr><tr><td><a href="https://chi2023.acm.org/">https://chi2023.acm.org</a></td><td>ACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction (HCI).</td><td>Hamburg, Germany</td></tr><tr><td><a href="https://spritehub.org/sprite-conference-belfast-28-29-june/">https://spritehub.org/sprite-conference-belfast-28-29-june/</a></td><td>SPRITE+ Conference  (Security Privacy Identity and Trust Engagement Network)</td><td>Belfast, Ireland</td></tr><tr><td><a href="https://eurosp2023.ieee-security.org/">https://eurosp2023.ieee-security.org</a></td><td>8th IEEE European Symposium on Security and Privacy</td><td>Delft, The Netherlands</td></tr><tr><td><a href="https://weis2023.econinfosec.org">https://weis2023.econinfosec.org</a></td><td>Workshop on the Economics of Information Security (WEIS). The main topic of the conference is Digital Sovereignty </td><td>Geneva, Switzerland</td></tr><tr><td><a href="https://www.usenix.org/conference/soups2023">https://www.usenix.org/conference/soups2023</a></td><td>Symposium on Usable Privacy and Security</td><td>Anaheim, USA</td></tr><tr><td><a href="https://defcon.org">https://defcon.org</a></td><td>DEFCON31</td><td>Las Vegas, USA</td></tr><tr><td><a href="https://www.blackhat.com">https://www.blackhat.com</a></td><td>Black Hat USA </td><td>Las Vegas, USA</td></tr><tr><td><a href="https://eurocrim2023.com">https://eurocrim2023.com</a></td><td>European Society of Criminology</td><td>Florence, Italy </td></tr><tr><td><a href="https://asc41.com/events/">https://asc41.com/events/</a></td><td>American Society of Criminology</td><td>Philadelphia, USA</td></tr></tbody></table><p> </p><p><strong>Also Look out for:</strong></p><p><a href="https://www.hfc-conference.com">https://www.hfc-conference.com</a></p><p><a href="https://www.cambridgecybercrime.uk">https://www.cambridgecybercrime.uk</a></p><p><a href="https://nsec.io">https://nsec.io</a></p><p><a href="https://secrev.org/">https://secrev.org/</a></p><p> </p><p><strong>Other:</strong></p><p>Bloom's Taxonomy</p><p><a href="https://en.wikipedia.org/wiki/Bloom's_taxonomy">https://en.wikipedia.org/wiki/Bloom's_taxonomy</a></p><p>This episode was a bit different because it was for the start of the year.  Back to the normal style next episode. </p>
]]></description>
      <pubDate>Sun, 1 Jan 2023 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Thomas Hyslip, Eden Komar, Volkan Topali, Marti DeLiema, Jordan Howell, Thomas Dearden, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/twenty-23-conferences-NsNeyjiK</link>
      <content:encoded><![CDATA[<p><strong>About Our Guests:</strong></p><p>Dr Thomas Dearden</p><p><a href="https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html">https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</a></p><p> </p><p>Jordan Howell</p><p><a href="https://cina.gmu.edu/people/c-jordan-howell/">https://cina.gmu.edu/people/c-jordan-howell/</a></p><p> </p><p>Dr Marti DeLiema, </p><p><a href="https://www.cehd.umn.edu/ssw/people/mdeliema/">https://www.cehd.umn.edu/ssw/people/mdeliema/</a></p><p> </p><p>Dr Volkan Topali, </p><p><a href="https://aysps.gsu.edu/profile/volkan-topalli/">https://aysps.gsu.edu/profile/volkan-topalli/</a></p><p> </p><p>Eden Komar</p><p><a href="https://ebcs.gsu.edu/profile/eden-kamar/">https://ebcs.gsu.edu/profile/eden-kamar/</a></p><p> </p><p>Dr Thomas Hyslip </p><p><a href="https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx">https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx</a></p><p> </p><p>And Gary</p><p><a href="https://www.usa.gov">https://www.usa.gov</a> </p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Conferences Mentioned in this Episode:</strong></p><p> </p><table><tbody><tr><td><a href="https://hicss.hawaii.edu">https://hicss.hawaii.edu</a></td><td> The Hawaii International Conference on System Sciences </td><td>Hawaii, USA</td></tr><tr><td><a href="https://chi2023.acm.org/">https://chi2023.acm.org</a></td><td>ACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction (HCI).</td><td>Hamburg, Germany</td></tr><tr><td><a href="https://spritehub.org/sprite-conference-belfast-28-29-june/">https://spritehub.org/sprite-conference-belfast-28-29-june/</a></td><td>SPRITE+ Conference  (Security Privacy Identity and Trust Engagement Network)</td><td>Belfast, Ireland</td></tr><tr><td><a href="https://eurosp2023.ieee-security.org/">https://eurosp2023.ieee-security.org</a></td><td>8th IEEE European Symposium on Security and Privacy</td><td>Delft, The Netherlands</td></tr><tr><td><a href="https://weis2023.econinfosec.org">https://weis2023.econinfosec.org</a></td><td>Workshop on the Economics of Information Security (WEIS). The main topic of the conference is Digital Sovereignty </td><td>Geneva, Switzerland</td></tr><tr><td><a href="https://www.usenix.org/conference/soups2023">https://www.usenix.org/conference/soups2023</a></td><td>Symposium on Usable Privacy and Security</td><td>Anaheim, USA</td></tr><tr><td><a href="https://defcon.org">https://defcon.org</a></td><td>DEFCON31</td><td>Las Vegas, USA</td></tr><tr><td><a href="https://www.blackhat.com">https://www.blackhat.com</a></td><td>Black Hat USA </td><td>Las Vegas, USA</td></tr><tr><td><a href="https://eurocrim2023.com">https://eurocrim2023.com</a></td><td>European Society of Criminology</td><td>Florence, Italy </td></tr><tr><td><a href="https://asc41.com/events/">https://asc41.com/events/</a></td><td>American Society of Criminology</td><td>Philadelphia, USA</td></tr></tbody></table><p> </p><p><strong>Also Look out for:</strong></p><p><a href="https://www.hfc-conference.com">https://www.hfc-conference.com</a></p><p><a href="https://www.cambridgecybercrime.uk">https://www.cambridgecybercrime.uk</a></p><p><a href="https://nsec.io">https://nsec.io</a></p><p><a href="https://secrev.org/">https://secrev.org/</a></p><p> </p><p><strong>Other:</strong></p><p>Bloom's Taxonomy</p><p><a href="https://en.wikipedia.org/wiki/Bloom's_taxonomy">https://en.wikipedia.org/wiki/Bloom's_taxonomy</a></p><p>This episode was a bit different because it was for the start of the year.  Back to the normal style next episode. </p>
]]></content:encoded>
      <enclosure length="25966047" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1c3b9bf1-3b3c-489d-acb9-9e864c6f5903/audio/1d2a684c-d95d-4372-8c30-2ada5d7f1bd6/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Twenty 23: Conferences</itunes:title>
      <itunes:author>Thomas Hyslip, Eden Komar, Volkan Topali, Marti DeLiema, Jordan Howell, Thomas Dearden, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/9a68e81c-1fa4-46dc-8bd8-86a02270ec59/3000x3000/ep77-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:01</itunes:duration>
      <itunes:summary>It&apos;s a new year and it is time to think about conferences and start planning which ones to go to.  We talk about conferences for 2023 and we are joined by Jordan Howell, Dr Marti DeLiema, Dr Volkan Topali,  Eden Komar, Dr Thomas Hyslip and Gary who will share their tips for getting the most out of conferences.  </itunes:summary>
      <itunes:subtitle>It&apos;s a new year and it is time to think about conferences and start planning which ones to go to.  We talk about conferences for 2023 and we are joined by Jordan Howell, Dr Marti DeLiema, Dr Volkan Topali,  Eden Komar, Dr Thomas Hyslip and Gary who will share their tips for getting the most out of conferences.  </itunes:subtitle>
      <itunes:keywords>academia, research, conferences, cybercrime, 2023, cybersecurity, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db7694b1-1496-4ada-9e05-934237a1f90d</guid>
      <title>Cyber Predators: Writing wrongs</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Lauren Shapiro</p><p><a href="https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd">https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Shapiro, L. R. (2022). <i>Cyberpredators and Their Prey</i>. CRC Press.</p><p><a href="https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698">https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698</a></p><p> </p><p>Shapiro, L. R., & Maras, M. H. (2015). <i>Multidisciplinary investigation of child maltreatment</i>. Jones & Bartlett Publishers.</p><p><a href="https://www.worldcat.org/title/875351759">https://www.worldcat.org/title/875351759</a></p><p> </p><p><strong>Other:</strong></p><p>To all my fellow Internuts,  try to take a few moments away from the screen to share the holiday period with the people around you, then you can get straight back on there :). </p>
]]></description>
      <pubDate>Thu, 15 Dec 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Lauren Shapiro, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/cyber-predators-yUkxYqNK</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Lauren Shapiro</p><p><a href="https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd">https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Shapiro, L. R. (2022). <i>Cyberpredators and Their Prey</i>. CRC Press.</p><p><a href="https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698">https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698</a></p><p> </p><p>Shapiro, L. R., & Maras, M. H. (2015). <i>Multidisciplinary investigation of child maltreatment</i>. Jones & Bartlett Publishers.</p><p><a href="https://www.worldcat.org/title/875351759">https://www.worldcat.org/title/875351759</a></p><p> </p><p><strong>Other:</strong></p><p>To all my fellow Internuts,  try to take a few moments away from the screen to share the holiday period with the people around you, then you can get straight back on there :). </p>
]]></content:encoded>
      <enclosure length="28220596" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/233514f6-5bd1-48a2-82b4-972d2e4a8252/audio/4d56ed23-e130-4496-a415-13c55e5c51a4/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cyber Predators: Writing wrongs</itunes:title>
      <itunes:author>Lauren Shapiro, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/b1df1d1d-5181-4088-830a-31a0bce075e3/3000x3000/ep76-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:21</itunes:duration>
      <itunes:summary>Are we doing all we should about cyber predators ?   Dr. Lauren Shapiro, Associate Professor at the Department of Security, Fire, and Emergency Management at the John Jay College of Criminal Justice joins us to discuss the issues surrounding cyber predators and shares her experience and insights into creating books for real-world impact.  </itunes:summary>
      <itunes:subtitle>Are we doing all we should about cyber predators ?   Dr. Lauren Shapiro, Associate Professor at the Department of Security, Fire, and Emergency Management at the John Jay College of Criminal Justice joins us to discuss the issues surrounding cyber predators and shares her experience and insights into creating books for real-world impact.  </itunes:subtitle>
      <itunes:keywords>online predators, writing, child maltreatment, inter-disciplinary, research, internet, publishing, cyberpredators, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">071df141-f4cc-4b3b-b74f-b0807f0bb93f</guid>
      <title>Cyber Insurance: What does it do for security?</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p> </p><p>Dr. Rainer Böhme</p><p><a href="https://informationsecurity.uibk.ac.at/people/rainer-boehme/">https://informationsecurity.uibk.ac.at/people/rainer-boehme/</a></p><p><a href="https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate">https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Böhme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. <i>Variance</i>, <i>12</i>(2), 161-185.</p><p><a href="fs/BLR2019_FundamentalApproachCyberRiskInsurance_Variance.pdf">https://informationsecurity.uibk.ac.at/pdfs/BLR2019_FundamentalApproachCyberRiskInsurance_Variance.pdf</a></p><p> </p><p>Woods, DW & Böhme, R 2021, 'How Cyber Insurance Shapes Incident Response: A Mixed Methods Study', Paper presented at The 20th Annual Workshop on the Economics of Information Security, 28/06/21 - 29/06/21. <a href="https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf">https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf</a></p><p> </p><p>Böhme, R., & Kataria, G. (2006, September). On the limits of cyber-insurance. In <i>International Conference on Trust, Privacy and Security in Digital Business</i> (pp. 31-40). Springer, Berlin, Heidelberg.</p><p><a href="https://link.springer.com/content/pdf/10.1007/11824633_4.pdf">https://link.springer.com/content/pdf/10.1007/11824633_4.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>Virtual Assets Insurance (by Rainer Böhme), Actuarial Research Conference 2020</p><p><a href="https://youtu.be/Sh9QM1tBqKc">https://youtu.be/Sh9QM1tBqKc</a></p><p> </p>
]]></description>
      <pubDate>Thu, 1 Dec 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rainer Böhme, Scott Wright)</author>
      <link>https://cybercrimeology.com/episodes/cyber-insurance-what-does-it-do-for-security-qbmCg5j6</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p> </p><p>Dr. Rainer Böhme</p><p><a href="https://informationsecurity.uibk.ac.at/people/rainer-boehme/">https://informationsecurity.uibk.ac.at/people/rainer-boehme/</a></p><p><a href="https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate">https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate</a></p><p> </p><p>Scott Wright</p><p><a href="https://www.linkedin.com/in/scottwright/">https://www.linkedin.com/in/scottwright/</a></p><p><a href="https://clickarmor.ca/">https://clickarmor.ca</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Böhme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. <i>Variance</i>, <i>12</i>(2), 161-185.</p><p><a href="fs/BLR2019_FundamentalApproachCyberRiskInsurance_Variance.pdf">https://informationsecurity.uibk.ac.at/pdfs/BLR2019_FundamentalApproachCyberRiskInsurance_Variance.pdf</a></p><p> </p><p>Woods, DW & Böhme, R 2021, 'How Cyber Insurance Shapes Incident Response: A Mixed Methods Study', Paper presented at The 20th Annual Workshop on the Economics of Information Security, 28/06/21 - 29/06/21. <a href="https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf">https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf</a></p><p> </p><p>Böhme, R., & Kataria, G. (2006, September). On the limits of cyber-insurance. In <i>International Conference on Trust, Privacy and Security in Digital Business</i> (pp. 31-40). Springer, Berlin, Heidelberg.</p><p><a href="https://link.springer.com/content/pdf/10.1007/11824633_4.pdf">https://link.springer.com/content/pdf/10.1007/11824633_4.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>Virtual Assets Insurance (by Rainer Böhme), Actuarial Research Conference 2020</p><p><a href="https://youtu.be/Sh9QM1tBqKc">https://youtu.be/Sh9QM1tBqKc</a></p><p> </p>
]]></content:encoded>
      <enclosure length="32056830" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/51cf8515-ef95-40df-8fdd-3c9d4e2bdc62/audio/4bea40bc-92ba-4180-9993-b86caf99b4e3/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cyber Insurance: What does it do for security?</itunes:title>
      <itunes:author>Rainer Böhme, Scott Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/fadb011d-132e-41dd-b35d-b2b576d0db28/3000x3000/ep75-final.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:21</itunes:duration>
      <itunes:summary>What is cyber insurance and what role does it play in the provision of information security? Dr. Rainer Böhme, Professor for Security and Privacy in the Department of Computer Science at the University of Innsbruck, Austria joins us talk about cyber insurance and the potential impacts that it is having on security in general and the responses to crime by victimized organizations. </itunes:summary>
      <itunes:subtitle>What is cyber insurance and what role does it play in the provision of information security? Dr. Rainer Böhme, Professor for Security and Privacy in the Department of Computer Science at the University of Innsbruck, Austria joins us talk about cyber insurance and the potential impacts that it is having on security in general and the responses to crime by victimized organizations. </itunes:subtitle>
      <itunes:keywords>cyberinsurance, academia, risk management, research, cybercrime, training, cybersecurity, insurance, seta, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">97b0ba73-dcaf-43a4-b1f9-b2e0de1f744a</guid>
      <title>Preparing Police for Cybercrime: building a global understanding</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Michael Wilson</p><p><a href="http://profiles.murdoch.edu.au/myprofile/michael-wilson/">http://profiles.murdoch.edu.au/myprofile/michael-wilson/</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri"><strong>https://www.linkedin.com/in/vanessahenri</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Wilson, M., Cross, C., Holt, T., & Powell, A. (2022). Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. <i>Journal of Criminology</i> , <i>55</i> (4), 468–494. <a href="https://doi.org/10.1177/26338076221123080">https://doi.org/10.1177/26338076221123080</a></p><p>Cross, C., Holt, T., Powell, A., Wilson, M.<strong>,</strong> (2021), <i>Responding to cybercrime: Results of a comparison between community members and police personnel</i>, Trends and Issues in Crime and Criminal Justice, 653, August 2021, pages 1 - 20.</p><p><strong>Other:</strong></p><p>That was the last episode in the series with Vanessa Henri, she is very busy running a business ;). <a href="https://henriwolf.law/">https://henriwolf.law</a></p>
]]></description>
      <pubDate>Tue, 15 Nov 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael Wilson, Vanessa Henri)</author>
      <link>https://cybercrimeology.com/episodes/preparing-police-for-cybercrime-building-a-global-understanding-CCfHwChb</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Michael Wilson</p><p><a href="http://profiles.murdoch.edu.au/myprofile/michael-wilson/">http://profiles.murdoch.edu.au/myprofile/michael-wilson/</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri"><strong>https://www.linkedin.com/in/vanessahenri</strong></a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Wilson, M., Cross, C., Holt, T., & Powell, A. (2022). Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. <i>Journal of Criminology</i> , <i>55</i> (4), 468–494. <a href="https://doi.org/10.1177/26338076221123080">https://doi.org/10.1177/26338076221123080</a></p><p>Cross, C., Holt, T., Powell, A., Wilson, M.<strong>,</strong> (2021), <i>Responding to cybercrime: Results of a comparison between community members and police personnel</i>, Trends and Issues in Crime and Criminal Justice, 653, August 2021, pages 1 - 20.</p><p><strong>Other:</strong></p><p>That was the last episode in the series with Vanessa Henri, she is very busy running a business ;). <a href="https://henriwolf.law/">https://henriwolf.law</a></p>
]]></content:encoded>
      <enclosure length="28550005" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/394c664c-ed3b-486c-9683-d5750cf1fd83/audio/019a26eb-6709-4b9b-a299-194951571ba1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Preparing Police for Cybercrime: building a global understanding</itunes:title>
      <itunes:author>Michael Wilson, Vanessa Henri</itunes:author>
      <itunes:duration>00:29:42</itunes:duration>
      <itunes:summary>Do police feel like that they are capable of dealing with cybercrime effectively? Dr Michael Wilson from Murdoch University in Australia joins us to discuss where Australia is in terms of providing police with what they need in order to respond to cybercrime.

Vanessa Henri joins us again to answer my silly question &apos;Is there such thing as bad laws?’</itunes:summary>
      <itunes:subtitle>Do police feel like that they are capable of dealing with cybercrime effectively? Dr Michael Wilson from Murdoch University in Australia joins us to discuss where Australia is in terms of providing police with what they need in order to respond to cybercrime.

Vanessa Henri joins us again to answer my silly question &apos;Is there such thing as bad laws?’</itunes:subtitle>
      <itunes:keywords>police, research, cybercrime, training, cybersecurity, policing, australia, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c1481854-112b-49e4-8ff1-d6157310ce65</guid>
      <title>Baby Steps: The Pathways into Criminal Hacking, Money Muling and Innovative Research</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p><a href="https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/">https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>L. M. J. Bekkers & E. R. Leukfeldt (2022) Recruiting money mules on instagram: a qualitative examination of the online involvement mechanisms of cybercrime, Deviant Behavior, DOI: <a href="https://doi.org/10.1080/01639625.2022.2073298">10.1080/01639625.2022.2073298</a></p><p>Peelen, A. A. E., van de Weijer, S. G. A., van den Berg, C. J. W., & Leukfeldt, E. R. (2022). Employment Opportunities for Applicants with Cybercrime Records: A Field Experiment. <i>Social Science Computer Review</i>, <i>0</i>(0). <a href="https://doi.org/10.1177/08944393221085706">https://doi.org/10.1177/08944393221085706</a></p><p>Other:</p><p>I had a lot of issues with the equalization on this one.  My apologies if the apparent volume varies too much through the episode for your tastes.  </p>
]]></description>
      <pubDate>Tue, 1 Nov 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Vanessa Henri, Rutger Leukfeldt)</author>
      <link>https://cybercrimeology.com/episodes/baby-steps-the-pathways-into-criminal-hacking-money-muling-and-innovative-research-gxT07JBt</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p><a href="https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/">https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>L. M. J. Bekkers & E. R. Leukfeldt (2022) Recruiting money mules on instagram: a qualitative examination of the online involvement mechanisms of cybercrime, Deviant Behavior, DOI: <a href="https://doi.org/10.1080/01639625.2022.2073298">10.1080/01639625.2022.2073298</a></p><p>Peelen, A. A. E., van de Weijer, S. G. A., van den Berg, C. J. W., & Leukfeldt, E. R. (2022). Employment Opportunities for Applicants with Cybercrime Records: A Field Experiment. <i>Social Science Computer Review</i>, <i>0</i>(0). <a href="https://doi.org/10.1177/08944393221085706">https://doi.org/10.1177/08944393221085706</a></p><p>Other:</p><p>I had a lot of issues with the equalization on this one.  My apologies if the apparent volume varies too much through the episode for your tastes.  </p>
]]></content:encoded>
      <enclosure length="35519979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/082af085-e3a9-4d30-b35c-d28d5ef64291/audio/14ba4c02-bffe-448b-b1f1-189a976d5b2e/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Baby Steps: The Pathways into Criminal Hacking, Money Muling and Innovative Research</itunes:title>
      <itunes:author>Vanessa Henri, Rutger Leukfeldt</itunes:author>
      <itunes:duration>00:36:58</itunes:duration>
      <itunes:summary>What are the baby steps for criminal hackers, for online money mules and for unique passionate research? Dr Rutger Leukfeldt is here to discuss how innovative research ideas are turned into research projects, the baby steps that might be common on the path to black hat hacking and how understandings of money mule culture can fuel insights from large scale research on social media platforms.   Vanessa Henri joins us again to answer my silly question &apos;What is the crappy part of working as a lawyer?&apos;</itunes:summary>
      <itunes:subtitle>What are the baby steps for criminal hackers, for online money mules and for unique passionate research? Dr Rutger Leukfeldt is here to discuss how innovative research ideas are turned into research projects, the baby steps that might be common on the path to black hat hacking and how understandings of money mule culture can fuel insights from large scale research on social media platforms.   Vanessa Henri joins us again to answer my silly question &apos;What is the crappy part of working as a lawyer?&apos;</itunes:subtitle>
      <itunes:keywords>academia, research, cybercrime, money mules, hackers, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9a82adf9-76c7-4a9a-b784-fee2dc8f6194</guid>
      <title>New Fashioned Laundry: Cryptocurrency and the proceeds of crime</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Christian Leuprecht </p><p><a href="https://www.queensu.ca/academia/leuprecht/">https://www.queensu.ca/academia/leuprecht/</a></p><p>Caitlyn Jenkins </p><p><a href="https://www.queensu.ca/iigr/jenkins-caitlyn">https://www.queensu.ca/iigr/jenkins-caitlyn</a></p><p>Rhianna Hamilton</p><p><a href="https://www.queensu.ca/iigr/hamilton-rhianna">https://www.queensu.ca/iigr/hamilton-rhianna</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p><a href="https://www.emerald.com/insight/search?q=Christian%20Leuprecht">Leuprecht, C.</a>, <a href="https://www.emerald.com/insight/search?q=Caitlyn%20Jenkins">Jenkins, C.</a> and <a href="https://www.emerald.com/insight/search?q=Rhianna%20Hamilton">Hamilton, R.</a> (2022), "Virtual money laundering: policy implications of the proliferation in the illicit use of cryptocurrency", <a href="https://www.emerald.com/insight/publication/issn/1359-0790"><i>Journal of Financial Crime</i></a>, Vol. ahead-of-print No. ahead-of-print. <a href="https://doi.org/10.1108/JFC-07-2022-0161">https://doi.org/10.1108/JFC-07-2022-0161</a></p><p>Cullen Commission (2022) Commission of Inquiry into Money Laundering in British Columbia</p><p><a href="https://cullencommission.ca/com-rep/">https://cullencommission.ca/com-rep/</a></p><p><strong>Other:</strong></p><p>Financial Action Task Force (FATF) is the global money laundering and terrorist financing watchdog</p><p><a href="https://www.fatf-gafi.org/home/">https://www.fatf-gafi.org/home/</a></p><p> </p>
]]></description>
      <pubDate>Sat, 15 Oct 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Christian Leuprecht, Rhianna Hamilton, Caitlyn Jenkins)</author>
      <link>https://cybercrimeology.com/episodes/new-fashioned-laundry-cryptocurrency-and-the-proceeds-of-crime-RBrlN3Xd</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Christian Leuprecht </p><p><a href="https://www.queensu.ca/academia/leuprecht/">https://www.queensu.ca/academia/leuprecht/</a></p><p>Caitlyn Jenkins </p><p><a href="https://www.queensu.ca/iigr/jenkins-caitlyn">https://www.queensu.ca/iigr/jenkins-caitlyn</a></p><p>Rhianna Hamilton</p><p><a href="https://www.queensu.ca/iigr/hamilton-rhianna">https://www.queensu.ca/iigr/hamilton-rhianna</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p><a href="https://www.emerald.com/insight/search?q=Christian%20Leuprecht">Leuprecht, C.</a>, <a href="https://www.emerald.com/insight/search?q=Caitlyn%20Jenkins">Jenkins, C.</a> and <a href="https://www.emerald.com/insight/search?q=Rhianna%20Hamilton">Hamilton, R.</a> (2022), "Virtual money laundering: policy implications of the proliferation in the illicit use of cryptocurrency", <a href="https://www.emerald.com/insight/publication/issn/1359-0790"><i>Journal of Financial Crime</i></a>, Vol. ahead-of-print No. ahead-of-print. <a href="https://doi.org/10.1108/JFC-07-2022-0161">https://doi.org/10.1108/JFC-07-2022-0161</a></p><p>Cullen Commission (2022) Commission of Inquiry into Money Laundering in British Columbia</p><p><a href="https://cullencommission.ca/com-rep/">https://cullencommission.ca/com-rep/</a></p><p><strong>Other:</strong></p><p>Financial Action Task Force (FATF) is the global money laundering and terrorist financing watchdog</p><p><a href="https://www.fatf-gafi.org/home/">https://www.fatf-gafi.org/home/</a></p><p> </p>
]]></content:encoded>
      <enclosure length="28989273" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/97847250-8e36-4527-ae1a-617ed684653a/audio/ae710dbb-da67-4472-b800-18f5a3d378d3/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>New Fashioned Laundry: Cryptocurrency and the proceeds of crime</itunes:title>
      <itunes:author>Christian Leuprecht, Rhianna Hamilton, Caitlyn Jenkins</itunes:author>
      <itunes:duration>00:30:10</itunes:duration>
      <itunes:summary>Does Cryptocurrency change how we should understand money laundering ?Dr Christian Leuprecht, Caitlyn Jenkins and Rhianna Hamilton join us to discuss their recent paper “Virtual money laundering: policy implications of the proliferation in the illicit use of cryptocurrency&quot;  Vanessa Henri answers the question can lawyers say whatever they want? </itunes:summary>
      <itunes:subtitle>Does Cryptocurrency change how we should understand money laundering ?Dr Christian Leuprecht, Caitlyn Jenkins and Rhianna Hamilton join us to discuss their recent paper “Virtual money laundering: policy implications of the proliferation in the illicit use of cryptocurrency&quot;  Vanessa Henri answers the question can lawyers say whatever they want? </itunes:subtitle>
      <itunes:keywords>academia, bitcoin, research, cybercrime, financial crime, case studies, money laundering, policy, cryptocurrency, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbb06142-1c34-4b51-be7a-3ebd858c1f7a</guid>
      <title>Cybersecurity Education for Better Digital Nations</title>
      <description><![CDATA[<h2>Episode Notes</h2><p><strong>About our Guests:</strong></p><p>Dr Ruth Shillair</p><p><a href="https://comartsci.msu.edu/our-people/ruth-shillair">https://comartsci.msu.edu/our-people/ruth-shillair</a></p><p> </p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (2022). National Level Evidence-Based Results, Challenges, and Promise. <i>Computers & Security</i>, 102756.</p><p><a href="https://doi.org/10.1016/j.cose.2022.102756">https://doi.org/10.1016/j.cose.2022.102756</a></p><p>Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. <i>IEEE software</i>, <i>5</i>(2), 73-79.</p><p><a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=2014&casa_token=viOPgCkogikAAAAA:khUCFSCaUx11Og8iSrJWS7liXtAypowrgOCv3D7BRFM8RDZ0X8adx_2_kseoYHd-NkWzn8LEg6NWQw&tag=1">https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=2014&casa_token=viOPgCkogikAAAAA:khUCFSCaUx11Og8iSrJWS7liXtAypowrgOCv3D7BRFM8RDZ0X8adx_2_kseoYHd-NkWzn8LEg6NWQw&tag=1</a></p><p> </p><p><strong>Other:</strong></p><p>The Global Cyber Security Capacity Centre</p><p><a href="https://www.cybersecurity.ox.ac.uk/research/global-security-cyber-capacity">https://www.cybersecurity.ox.ac.uk/research/global-security-cyber-capacity</a></p><p> </p><p>I said "graciolussly" at the start of the episode, I don't think that is a real word.  I meant graciously. </p>
]]></description>
      <pubDate>Sat, 1 Oct 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Vanessa Henri, Ruth Shilliar)</author>
      <link>https://cybercrimeology.com/episodes/cybersecurity-education-for-better-digital-nations-00mIUG3Z</link>
      <content:encoded><![CDATA[<h2>Episode Notes</h2><p><strong>About our Guests:</strong></p><p>Dr Ruth Shillair</p><p><a href="https://comartsci.msu.edu/our-people/ruth-shillair">https://comartsci.msu.edu/our-people/ruth-shillair</a></p><p> </p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (2022). National Level Evidence-Based Results, Challenges, and Promise. <i>Computers & Security</i>, 102756.</p><p><a href="https://doi.org/10.1016/j.cose.2022.102756">https://doi.org/10.1016/j.cose.2022.102756</a></p><p>Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. <i>IEEE software</i>, <i>5</i>(2), 73-79.</p><p><a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=2014&casa_token=viOPgCkogikAAAAA:khUCFSCaUx11Og8iSrJWS7liXtAypowrgOCv3D7BRFM8RDZ0X8adx_2_kseoYHd-NkWzn8LEg6NWQw&tag=1">https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=2014&casa_token=viOPgCkogikAAAAA:khUCFSCaUx11Og8iSrJWS7liXtAypowrgOCv3D7BRFM8RDZ0X8adx_2_kseoYHd-NkWzn8LEg6NWQw&tag=1</a></p><p> </p><p><strong>Other:</strong></p><p>The Global Cyber Security Capacity Centre</p><p><a href="https://www.cybersecurity.ox.ac.uk/research/global-security-cyber-capacity">https://www.cybersecurity.ox.ac.uk/research/global-security-cyber-capacity</a></p><p> </p><p>I said "graciolussly" at the start of the episode, I don't think that is a real word.  I meant graciously. </p>
]]></content:encoded>
      <enclosure length="23952481" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/fe0cabad-2127-4890-a8b1-fa7ac15c4a3f/audio/ee06ed75-6baa-4791-9485-716ab2bc9477/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybersecurity Education for Better Digital Nations</itunes:title>
      <itunes:author>Vanessa Henri, Ruth Shilliar</itunes:author>
      <itunes:duration>00:24:55</itunes:duration>
      <itunes:summary>What does cybersecurity education do to the capacity of a nation to advance itself ? Dr Ruth Shillair joins us to talk about the paper “Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise”. Vanessa Henri answers the question of whether I have what it takes to be a cyber lawyer</itunes:summary>
      <itunes:subtitle>What does cybersecurity education do to the capacity of a nation to advance itself ? Dr Ruth Shillair joins us to talk about the paper “Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise”. Vanessa Henri answers the question of whether I have what it takes to be a cyber lawyer</itunes:subtitle>
      <itunes:keywords>csam, academia, regulation, research, cybercrime, cybersecurity, seta, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c278a31-1015-4484-8821-f84463ce358c</guid>
      <title>Measuring Cybersecurity Awareness: Part of an Effective Education Process</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Sunil Chaudhary</p><p><a href="https://www.ntnu.edu/employees/sunil.chaudhary">https://www.ntnu.edu/employees/sunil.chaudhary</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. <i>Journal of Cybersecurity</i> , <a href="https://doi.org/10.1093/cybsec/tyac006" target="_blank">https://doi.org/10.1093/cybsec/tyac006 </a></p><p> </p><p><strong>Other:</strong></p><p><a href="https://cybersec4europe.eu/" target="_blank">https://cybersec4europe.eu/</a></p>
]]></description>
      <pubDate>Thu, 15 Sep 2022 04:55:43 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Sunil Chaudhary)</author>
      <link>https://cybercrimeology.com/episodes/measuring-cybersecurity-awareness-part-of-an-effective-education-process-mli2r_dP</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Sunil Chaudhary</p><p><a href="https://www.ntnu.edu/employees/sunil.chaudhary">https://www.ntnu.edu/employees/sunil.chaudhary</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. <i>Journal of Cybersecurity</i> , <a href="https://doi.org/10.1093/cybsec/tyac006" target="_blank">https://doi.org/10.1093/cybsec/tyac006 </a></p><p> </p><p><strong>Other:</strong></p><p><a href="https://cybersec4europe.eu/" target="_blank">https://cybersec4europe.eu/</a></p>
]]></content:encoded>
      <enclosure length="21428118" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3aa0306b-d024-4b81-9d98-47935ab303ef/audio/6476ad28-211d-4b07-ac3f-e53f64bb1f8d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Measuring Cybersecurity Awareness: Part of an Effective Education Process</itunes:title>
      <itunes:author>Sunil Chaudhary</itunes:author>
      <itunes:duration>00:22:17</itunes:duration>
      <itunes:summary>If you can’t measure it, you can’t improve it.  If we want to improve cybersecurity awareness, what do we measure ?  
Dr Sunil Chaudhary joins us to discuss the article “Developing metrics to assess the effectiveness of cybersecurity awareness program” published in the Journal of Cybersecurity.  As you might imagine, the question of which metrics they developed and how is an important one for those developing awareness programs for cybercrime prevention</itunes:summary>
      <itunes:subtitle>If you can’t measure it, you can’t improve it.  If we want to improve cybersecurity awareness, what do we measure ?  
Dr Sunil Chaudhary joins us to discuss the article “Developing metrics to assess the effectiveness of cybersecurity awareness program” published in the Journal of Cybersecurity.  As you might imagine, the question of which metrics they developed and how is an important one for those developing awareness programs for cybercrime prevention</itunes:subtitle>
      <itunes:keywords>metrics, europe, research, cybercrime, seta, cybersecurity awareness, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">409dfc68-90a1-4885-919c-13d42fc5ff83</guid>
      <title>Not Strictly Cybercriminal: Legitimate work for illegitimate ends</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Masarah Paquet-Clouston </p><p><a href="https://crim.umontreal.ca/en/repertoire-departement/professeurs/professeur/in/in33261/sg/Masarah%20Paquet-Clouston/">https://crim.umontreal.ca/en/repertoire-departement/professeurs/professeur/in/in33261/sg/Masarah%20Paquet-Clouston/</a></p><p><a href="https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/">https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/</a></p><p> </p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. <i>Journal of Cybersecurity</i>, <i>8</i>(1), tyac010.</p><p><a href="https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916">https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916</a></p><p>Paquet-Clouston, M., & Bouchard, M. (2022). A Robust Measure to Uncover Community Brokerage in Illicit Networks. <i>Journal of Quantitative Criminology</i>, 1-29.</p><p><a>https://www.crimrxiv.com/pub/nhorzdki</a></p><p>Paquet-Clouston, M. C. (2021). <i>The Role of Informal Workers in Online Economic Crime</i> (Doctoral dissertation, Arts & Social Sciences: School of Criminology).</p><p><a href="https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf">https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>This interview was done in person, I haven't done one of those for a long time and think my microphone technique is a little rusty, not only that I forgot to record some room tone. </p><p> </p>
]]></description>
      <pubDate>Thu, 1 Sep 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Masarah Paquet-Clouston)</author>
      <link>https://cybercrimeology.com/episodes/not-strictly-cybercriminal-legitimate-work-for-illegitimate-ends-yhYtaHcZ</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Masarah Paquet-Clouston </p><p><a href="https://crim.umontreal.ca/en/repertoire-departement/professeurs/professeur/in/in33261/sg/Masarah%20Paquet-Clouston/">https://crim.umontreal.ca/en/repertoire-departement/professeurs/professeur/in/in33261/sg/Masarah%20Paquet-Clouston/</a></p><p><a href="https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/">https://www.linkedin.com/in/masarah-paquet-clouston-54b29587/</a></p><p> </p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. <i>Journal of Cybersecurity</i>, <i>8</i>(1), tyac010.</p><p><a href="https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916">https://academic.oup.com/cybersecurity/article/8/1/tyac010/6644916</a></p><p>Paquet-Clouston, M., & Bouchard, M. (2022). A Robust Measure to Uncover Community Brokerage in Illicit Networks. <i>Journal of Quantitative Criminology</i>, 1-29.</p><p><a>https://www.crimrxiv.com/pub/nhorzdki</a></p><p>Paquet-Clouston, M. C. (2021). <i>The Role of Informal Workers in Online Economic Crime</i> (Doctoral dissertation, Arts & Social Sciences: School of Criminology).</p><p><a href="https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf">https://summit.sfu.ca/_flysystem/fedora/2022-08/input_data/21455/etd21636.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>This interview was done in person, I haven't done one of those for a long time and think my microphone technique is a little rusty, not only that I forgot to record some room tone. </p><p> </p>
]]></content:encoded>
      <enclosure length="26669762" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/6a1e1fa0-8144-4120-83a9-555319e22605/audio/49870884-e855-4526-aa65-49ed685832fa/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Not Strictly Cybercriminal: Legitimate work for illegitimate ends</itunes:title>
      <itunes:author>Masarah Paquet-Clouston</itunes:author>
      <itunes:duration>00:27:45</itunes:duration>
      <itunes:summary>Cybercrime operations is not strictly criminal. Day to day operations require the building of websites, translating of texts, maintenance of servers. But where are criminal groups finding people to do this work for them? Dr Masarah Paquet-Clouston joins us to discuss the entanglement between informal markets and cybercrime forums.   
Vanessa Henri is back to answer another silly questions as I ask whether a student should consider working at a large law firm or a small law firm. </itunes:summary>
      <itunes:subtitle>Cybercrime operations is not strictly criminal. Day to day operations require the building of websites, translating of texts, maintenance of servers. But where are criminal groups finding people to do this work for them? Dr Masarah Paquet-Clouston joins us to discuss the entanglement between informal markets and cybercrime forums.   
Vanessa Henri is back to answer another silly questions as I ask whether a student should consider working at a large law firm or a small law firm. </itunes:subtitle>
      <itunes:keywords>crime, malware, research, cybercrime, criminology, informal markets, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a3c63ac9-4a32-4221-95db-e1a83a1bee99</guid>
      <title>Scientists under attack: The Impact of Internet-Facilitated Harassment of Researchers</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Periwinkle Doerfler</p><p><a href="https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en">https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Doerfler, P., Forte, A., De Cristofaro, E., Stringhini, G., Blackburn, J., & McCoy, D. (2021). " I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. <i>Proceedings of the ACM on Human-Computer Interaction</i>, <i>5</i>(CSCW2), 1-32. </p><p><a href="https://arxiv.org/pdf/2104.11145.pdf">https://arxiv.org/pdf/2104.11145.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>Burke, Katie L. ( 2017, Sep) Harassment in Science, American Scientist, from:</p><p><a href="https://www.americanscientist.org/article/harassment-in-science">https://www.americanscientist.org/article/harassment-in-science</a></p><p> </p><p>Nogrady, Bianca (2021, 13 Oct) ‘I hope you die’: how the COVID pandemic unleashed attacks on scientists, Retreived from Nature.com:</p><p><a href="https://www.nature.com/articles/d41586-021-02741-x">https://www.nature.com/articles/d41586-021-02741-x</a></p><p> </p><p>O'Grady, Cathleen (2022, 24 Mar) In the Line of Fire:Scientists have been harassed for years. But a Science survey shows the pandemic has made things far worse for some</p><p><a href="https://www.science.org/content/article/overwhelmed-hate-covid-19-scientists-face-avalanche-abuse-survey-shows">https://www.science.org/content/article/overwhelmed-hate-covid-19-scientists-face-avalanche-abuse-survey-shows</a></p><p> </p><p>Advice for researchers experiencing harassment by the Science Media Centre</p><p><a href="https://www.sciencemediacentre.org/wp-content/uploads/2019/10/Advice-for-Researchers-Experiencing-Harrasment-2019.pdf">https://www.sciencemediacentre.org/wp-content/uploads/2019/10/Advice-for-Researchers-Experiencing-Harrasment-2019.pdf</a></p>
]]></description>
      <pubDate>Mon, 15 Aug 2022 04:07:33 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Periwinkle Doerfler, Vanessa Henri)</author>
      <link>https://cybercrimeology.com/episodes/scientists-under-attack-the-impact-of-internet-facilitated-harassment-of-researchers-Ga3geA1D</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Periwinkle Doerfler</p><p><a href="https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en">https://scholar.google.com/citations?user=beizXWkAAAAJ&hl=en</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Doerfler, P., Forte, A., De Cristofaro, E., Stringhini, G., Blackburn, J., & McCoy, D. (2021). " I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers. <i>Proceedings of the ACM on Human-Computer Interaction</i>, <i>5</i>(CSCW2), 1-32. </p><p><a href="https://arxiv.org/pdf/2104.11145.pdf">https://arxiv.org/pdf/2104.11145.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>Burke, Katie L. ( 2017, Sep) Harassment in Science, American Scientist, from:</p><p><a href="https://www.americanscientist.org/article/harassment-in-science">https://www.americanscientist.org/article/harassment-in-science</a></p><p> </p><p>Nogrady, Bianca (2021, 13 Oct) ‘I hope you die’: how the COVID pandemic unleashed attacks on scientists, Retreived from Nature.com:</p><p><a href="https://www.nature.com/articles/d41586-021-02741-x">https://www.nature.com/articles/d41586-021-02741-x</a></p><p> </p><p>O'Grady, Cathleen (2022, 24 Mar) In the Line of Fire:Scientists have been harassed for years. But a Science survey shows the pandemic has made things far worse for some</p><p><a href="https://www.science.org/content/article/overwhelmed-hate-covid-19-scientists-face-avalanche-abuse-survey-shows">https://www.science.org/content/article/overwhelmed-hate-covid-19-scientists-face-avalanche-abuse-survey-shows</a></p><p> </p><p>Advice for researchers experiencing harassment by the Science Media Centre</p><p><a href="https://www.sciencemediacentre.org/wp-content/uploads/2019/10/Advice-for-Researchers-Experiencing-Harrasment-2019.pdf">https://www.sciencemediacentre.org/wp-content/uploads/2019/10/Advice-for-Researchers-Experiencing-Harrasment-2019.pdf</a></p>
]]></content:encoded>
      <enclosure length="37397108" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/8f63628a-8faa-4012-a5df-00cbfddd4ffa/audio/c9de05f2-7568-4271-afc8-b511a1d5edf5/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Scientists under attack: The Impact of Internet-Facilitated Harassment of Researchers</itunes:title>
      <itunes:author>Periwinkle Doerfler, Vanessa Henri</itunes:author>
      <itunes:duration>00:38:55</itunes:duration>
      <itunes:summary>The Internet-Facilitated Harassment of Researchers shouldn&apos;t be a problem, but it is.  Dr Periwinkle Doerfler joins us to discuss this issue, the experience of it, its impact on minority research and researchers, the institutions involved with it and what we can do to reduce its harms. 
Vanessa Henri joins us to answer my silly questions about the names of law firms and whether or not it is better for a  cyberlawyer to get their start at a big law firm? </itunes:summary>
      <itunes:subtitle>The Internet-Facilitated Harassment of Researchers shouldn&apos;t be a problem, but it is.  Dr Periwinkle Doerfler joins us to discuss this issue, the experience of it, its impact on minority research and researchers, the institutions involved with it and what we can do to reduce its harms. 
Vanessa Henri joins us to answer my silly questions about the names of law firms and whether or not it is better for a  cyberlawyer to get their start at a big law firm? </itunes:subtitle>
      <itunes:keywords>research, cybercrime, internet-facilitated, harrassment, cyberlaw, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd117f67-6282-433c-915c-11458c1029ed</guid>
      <title>Surveillance Technology, the solution to {insert issue here}</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Lyon</p><p><a href="https://www.sscqueens.org/people/david-lyon">https://www.sscqueens.org/people/david-lyon</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Beyond Big Data Surveillance: Freedom and Fairness</p><p><a href="https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released">https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released</a></p><p> </p><p>David Lyon (1994) Electronic Eye: The Rise of Surveillance Society</p><p><a href="https://www.goodreads.com/book/show/237851.Electronic_Eye">https://www.goodreads.com/book/show/237851.Electronic_Eye</a></p><p>David Lyon (2001) Surveillance Society: Monitoring Everyday Life</p><p><a href="https://www.goodreads.com/book/show/237855.Surveillance_Society">https://www.goodreads.com/book/show/237855.Surveillance_Society</a></p><p>David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life</p><p><a href="https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance">https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance</a></p><p>David Lyon (2022) Pandemic Surveillance</p><p><a href="https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302">https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302</a></p><p>Michel Foucault (1975) Discipline and Punish: The Birth of the Prison</p><p><a href="https://www.goodreads.com/book/show/80369.Discipline_and_Punish">https://www.goodre</a>ads.com/book/show/80369.Discipline_and_Punish</p><p>Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)</p><p><a href="https://ses.library.usyd.edu.au/handle/2123/11591">https://ses.library.usyd.edu.au/handle/2123/11591</a></p><p><strong>Other:</strong></p><p>History of Henry V</p><p>Act 2, Scene 2</p><p>DUKE OF BEDFORD:</p><p><i> The king hath note of all that they intend,</i></p><p><i>By interception which they dream not of.</i></p><p><a href="https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene">https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene</a></p><p>The Tragedy of Hamlet, Prince of Denmark</p><p>Act 3, Scene 1</p><p>KING CLAUDIUS:</p><p>Her father and myself,<i> lawful espials,</i><br /><i>Will so bestow ourselves that, seeing, unseen,</i><br /><i>We may of their encounter frankly judge,</i><br />And gather by him, as he is behaved,<br />If 't be the affliction of his love or no<br />That thus he suffers for.</p><p><a href="http://shakespeare.mit.edu/hamlet/hamlet.3.1.html">http://shakespeare.mit.edu/hamlet/hamlet.3.1.html</a></p>
]]></description>
      <pubDate>Mon, 1 Aug 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/surveillance-technology-the-solution-to-insert-issue-here-YT0w32bd</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Lyon</p><p><a href="https://www.sscqueens.org/people/david-lyon">https://www.sscqueens.org/people/david-lyon</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Beyond Big Data Surveillance: Freedom and Fairness</p><p><a href="https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released">https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released</a></p><p> </p><p>David Lyon (1994) Electronic Eye: The Rise of Surveillance Society</p><p><a href="https://www.goodreads.com/book/show/237851.Electronic_Eye">https://www.goodreads.com/book/show/237851.Electronic_Eye</a></p><p>David Lyon (2001) Surveillance Society: Monitoring Everyday Life</p><p><a href="https://www.goodreads.com/book/show/237855.Surveillance_Society">https://www.goodreads.com/book/show/237855.Surveillance_Society</a></p><p>David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life</p><p><a href="https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance">https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance</a></p><p>David Lyon (2022) Pandemic Surveillance</p><p><a href="https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302">https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302</a></p><p>Michel Foucault (1975) Discipline and Punish: The Birth of the Prison</p><p><a href="https://www.goodreads.com/book/show/80369.Discipline_and_Punish">https://www.goodre</a>ads.com/book/show/80369.Discipline_and_Punish</p><p>Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)</p><p><a href="https://ses.library.usyd.edu.au/handle/2123/11591">https://ses.library.usyd.edu.au/handle/2123/11591</a></p><p><strong>Other:</strong></p><p>History of Henry V</p><p>Act 2, Scene 2</p><p>DUKE OF BEDFORD:</p><p><i> The king hath note of all that they intend,</i></p><p><i>By interception which they dream not of.</i></p><p><a href="https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene">https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene</a></p><p>The Tragedy of Hamlet, Prince of Denmark</p><p>Act 3, Scene 1</p><p>KING CLAUDIUS:</p><p>Her father and myself,<i> lawful espials,</i><br /><i>Will so bestow ourselves that, seeing, unseen,</i><br /><i>We may of their encounter frankly judge,</i><br />And gather by him, as he is behaved,<br />If 't be the affliction of his love or no<br />That thus he suffers for.</p><p><a href="http://shakespeare.mit.edu/hamlet/hamlet.3.1.html">http://shakespeare.mit.edu/hamlet/hamlet.3.1.html</a></p>
]]></content:encoded>
      <enclosure length="26442845" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/209263f1-6d1e-45af-8ad1-3149423fbf57/audio/aaed85c5-4c3f-4481-9e3a-9daa9f46055d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Surveillance Technology, the solution to {insert issue here}</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:27:30</itunes:duration>
      <itunes:summary>A discussion about Cyber and Computer crime would not be complete if it did not include surveillance.  Dr David Lyon joins us to continue the discussion on surveillance and talk about the implication of events like 9/11 and our role in surveillance.  </itunes:summary>
      <itunes:subtitle>A discussion about Cyber and Computer crime would not be complete if it did not include surveillance.  Dr David Lyon joins us to continue the discussion on surveillance and talk about the implication of events like 9/11 and our role in surveillance.  </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e943c01f-bd71-432e-8f09-df10b1ae693a</guid>
      <title>The Lawful Espials in your pocket: Electronic Surveillance</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Lyon</p><p><a href="https://www.sscqueens.org/people/david-lyon">https://www.sscqueens.org/people/david-lyon</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Beyond Big Data Surveillance: Freedom and Fairness</p><p><a href="https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released">https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released</a></p><p> </p><p>David Lyon (1994) Electronic Eye: The Rise of Surveillance Society</p><p><a href="https://www.goodreads.com/book/show/237851.Electronic_Eye">https://www.goodreads.com/book/show/237851.Electronic_Eye</a></p><p>David Lyon (2001) Surveillance Society: Monitoring Everyday Life</p><p><a href="https://www.goodreads.com/book/show/237855.Surveillance_Society">https://www.goodreads.com/book/show/237855.Surveillance_Society</a></p><p>David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life</p><p><a href="https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance">https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance</a></p><p>David Lyon (2022) Pandemic Surveillance</p><p><a href="https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302">https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302</a></p><p>Michel Foucault (1975) Discipline and Punish: The Birth of the Prison</p><p><a href="https://www.goodreads.com/book/show/80369.Discipline_and_Punish">https://www.goodre</a>ads.com/book/show/80369.Discipline_and_Punish</p><p>Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)</p><p><a href="https://ses.library.usyd.edu.au/handle/2123/11591">https://ses.library.usyd.edu.au/handle/2123/11591</a></p><p><strong>Other:</strong></p><p>History of Henry V</p><p>Act 2, Scene 2</p><p>DUKE OF BEDFORD:</p><p><i> The king hath note of all that they intend,</i></p><p><i>By interception which they dream not of.</i></p><p><a href="https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene">https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene</a></p><p> </p><p>The Tragedy of Hamlet, Prince of Denmark</p><p>Act 3, Scene 1</p><p>KING CLAUDIUS:</p><p>Her father and myself,<i> lawful espials,</i><br /><i>Will so bestow ourselves that, seeing, unseen,</i><br /><i>We may of their encounter frankly judge,</i><br />And gather by him, as he is behaved,<br />If 't be the affliction of his love or no<br />That thus he suffers for.</p><p><a href="http://shakespeare.mit.edu/hamlet/hamlet.3.1.html">http://shakespeare.mit.edu/hamlet/hamlet.3.1.html</a></p><p> </p><p> </p>
]]></description>
      <pubDate>Fri, 15 Jul 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (David Lyon)</author>
      <link>https://cybercrimeology.com/episodes/the-lawful-espials-in-your-pocket-electronic-surveillance-QhGCUiax</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Lyon</p><p><a href="https://www.sscqueens.org/people/david-lyon">https://www.sscqueens.org/people/david-lyon</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Beyond Big Data Surveillance: Freedom and Fairness</p><p><a href="https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released">https://www.sscqueens.org/news/beyond-big-data-surveillance-report-released</a></p><p> </p><p>David Lyon (1994) Electronic Eye: The Rise of Surveillance Society</p><p><a href="https://www.goodreads.com/book/show/237851.Electronic_Eye">https://www.goodreads.com/book/show/237851.Electronic_Eye</a></p><p>David Lyon (2001) Surveillance Society: Monitoring Everyday Life</p><p><a href="https://www.goodreads.com/book/show/237855.Surveillance_Society">https://www.goodreads.com/book/show/237855.Surveillance_Society</a></p><p>David Lyon (2018) The Culture of Surveillance: Watching as a Way of Life</p><p><a href="https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance">https://www.goodreads.com/book/show/36739405-the-culture-of-surveillance</a></p><p>David Lyon (2022) Pandemic Surveillance</p><p><a href="https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302">https://www.politybooks.com/bookdetail?book_slug=pandemic-surveillance--9781509550302</a></p><p>Michel Foucault (1975) Discipline and Punish: The Birth of the Prison</p><p><a href="https://www.goodreads.com/book/show/80369.Discipline_and_Punish">https://www.goodre</a>ads.com/book/show/80369.Discipline_and_Punish</p><p>Smith, Richard Angus (2015) Spying and Surveillance in Shakespeare’s Dramatic Courts (Ph.D Thesis)</p><p><a href="https://ses.library.usyd.edu.au/handle/2123/11591">https://ses.library.usyd.edu.au/handle/2123/11591</a></p><p><strong>Other:</strong></p><p>History of Henry V</p><p>Act 2, Scene 2</p><p>DUKE OF BEDFORD:</p><p><i> The king hath note of all that they intend,</i></p><p><i>By interception which they dream not of.</i></p><p><a href="https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene">https://www.opensourceshakespeare.org/views/plays/play_view.php?WorkID=henry5&Act=2&Scene=2&Scope=scene</a></p><p> </p><p>The Tragedy of Hamlet, Prince of Denmark</p><p>Act 3, Scene 1</p><p>KING CLAUDIUS:</p><p>Her father and myself,<i> lawful espials,</i><br /><i>Will so bestow ourselves that, seeing, unseen,</i><br /><i>We may of their encounter frankly judge,</i><br />And gather by him, as he is behaved,<br />If 't be the affliction of his love or no<br />That thus he suffers for.</p><p><a href="http://shakespeare.mit.edu/hamlet/hamlet.3.1.html">http://shakespeare.mit.edu/hamlet/hamlet.3.1.html</a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="33753365" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c384c4d8-795a-43f3-be44-8e60493a2b8c/audio/f852cd8a-754d-4656-a1fd-2752518c94e0/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Lawful Espials in your pocket: Electronic Surveillance</itunes:title>
      <itunes:author>David Lyon</itunes:author>
      <itunes:duration>00:35:07</itunes:duration>
      <itunes:summary>A discussion about Cyber and Computer crime would not be complete if it did not include surveillance.  Dr David Lyon joins us to share a history and point of view with a richness that comes from three decades of experience studying the topic.  </itunes:summary>
      <itunes:subtitle>A discussion about Cyber and Computer crime would not be complete if it did not include surveillance.  Dr David Lyon joins us to share a history and point of view with a richness that comes from three decades of experience studying the topic.  </itunes:subtitle>
      <itunes:keywords>cybersurveillance, research, cybercrime, surveillance, privacy, shakespeare, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">66ec4bbc-f1eb-4f95-ab3d-80d2e9aaa54b</guid>
      <title>Make Elections Great Again: Cyber-threats to Democracy</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Holly Ann Garnett</p><p><a href="https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett">https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett</a></p><p><a href="https://www.queensu.ca/iigr/holly-ann-garnett">https://www.queensu.ca/iigr/holly-ann-garnett</a></p><p>Michael Pal </p><p><a href="https://commonlaw.uottawa.ca/en/people/pal-michael">https://commonlaw.uottawa.ca/en/people/pal-michael</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Garnett HA, Pal M (2022) Cyber-Threats to Canadian Democracy,.</p><p><a href="https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php">https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php</a></p><p><a href="https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&">https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&</a></p><p> </p><p>Other:</p><p>There was a lot of noise happening outside my apartment as I was recording part of this episode and it was very distracting.  Apologies if I sound a little weird :) </p><p> </p><p> </p><p> </p>
]]></description>
      <pubDate>Fri, 1 Jul 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Holly Ann Garnett, Michael Pal)</author>
      <link>https://cybercrimeology.com/episodes/make-elections-great-again-cyber-threats-to-democracy-riv38tUK</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Holly Ann Garnett</p><p><a href="https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett">https://www.rmc-cmr.ca/en/political-science-and-economics/holly-ann-garnett</a></p><p><a href="https://www.queensu.ca/iigr/holly-ann-garnett">https://www.queensu.ca/iigr/holly-ann-garnett</a></p><p>Michael Pal </p><p><a href="https://commonlaw.uottawa.ca/en/people/pal-michael">https://commonlaw.uottawa.ca/en/people/pal-michael</a></p><p>Vanessa Henri</p><p><a href="https://www.linkedin.com/in/vanessahenri">https://www.linkedin.com/in/vanessahenri</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Garnett HA, Pal M (2022) Cyber-Threats to Canadian Democracy,.</p><p><a href="https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php">https://www.mqup.ca/cyber-threats-to-canadian-democracy-products-9780228011477.php</a></p><p><a href="https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&">https://books.google.ca/books/about/Cyber_Threats_to_Canadian_Democracy.html?id=_qOwzgEACAAJ&</a></p><p> </p><p>Other:</p><p>There was a lot of noise happening outside my apartment as I was recording part of this episode and it was very distracting.  Apologies if I sound a little weird :) </p><p> </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="39509363" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/fa9ab492-f9d3-4491-a4a3-849c38b9c6a2/audio/0db9c1a1-738d-4c13-a13e-9cfbe4c13609/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Make Elections Great Again: Cyber-threats to Democracy</itunes:title>
      <itunes:author>Holly Ann Garnett, Michael Pal</itunes:author>
      <itunes:duration>00:41:08</itunes:duration>
      <itunes:summary>It feels like cyberspace has become a threat to democracy, but what is that threat?  Drs Holly Ann Garnett and Michael Pal join us to talk about their book “Cyber-Threats to Canadian Democracy” and the  cybersecurity of elections and the democratic process and the threats to democracy that we face in the digitized world.  </itunes:summary>
      <itunes:subtitle>It feels like cyberspace has become a threat to democracy, but what is that threat?  Drs Holly Ann Garnett and Michael Pal join us to talk about their book “Cyber-Threats to Canadian Democracy” and the  cybersecurity of elections and the democratic process and the threats to democracy that we face in the digitized world.  </itunes:subtitle>
      <itunes:keywords>disinformation, democracy, cybercrime, cyberspace, misinformation, elections, cybersecurity, digital divide, law, social media</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">24e00dca-80a3-4197-a434-117c22a92b1f</guid>
      <title>Safeguards: Secure your Choice to share your Research</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Sinead Tuite</p><p>Innovation, Science and Economic Development (ISED) Canada</p><p><a href="https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home">https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p><strong>Safeguarding your Research</strong></p><p><i>This website provides information on how to safeguard your research and innovation. </i></p><p><a href="https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html">https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html</a></p><p> </p><p><strong>The Government of Canada's National Security Guidelines for Research Partnerships</strong></p><p><a href="https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html">https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html</a></p><p> </p><p><strong>The US Government's Executive Order on Improving the Nation’s Cybersecurity</strong></p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ </a></p><p> </p><p><strong>The UK Centre for the Protection of National Infrastructure (CPNI) Trusted Research Guidance for Academia</strong></p><p><a href="https://www.cpni.gov.uk/trusted-research-academia">https://www.cpni.gov.uk/trusted-research-academia</a></p><p> </p><p><strong>Australia's Cybersecurity Strategy 2020 (Section 40, Page 23)</strong></p><p><a href="https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf">https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf</a></p><p> </p>
]]></description>
      <pubDate>Wed, 15 Jun 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Sinead Tuite)</author>
      <link>https://cybercrimeology.com/episodes/safeguards-protecting-your-choice-to-share-your-research-072exri3</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Sinead Tuite</p><p>Innovation, Science and Economic Development (ISED) Canada</p><p><a href="https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home">https://www.ic.gc.ca/eic/site/icgc.nsf/eng/home</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p><strong>Safeguarding your Research</strong></p><p><i>This website provides information on how to safeguard your research and innovation. </i></p><p><a href="https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html">https://science.gc.ca/eic/site/063.nsf/eng/h_97955.html</a></p><p> </p><p><strong>The Government of Canada's National Security Guidelines for Research Partnerships</strong></p><p><a href="https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html">https://science.gc.ca/eic/site/063.nsf/eng/h_98257.html</a></p><p> </p><p><strong>The US Government's Executive Order on Improving the Nation’s Cybersecurity</strong></p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ </a></p><p> </p><p><strong>The UK Centre for the Protection of National Infrastructure (CPNI) Trusted Research Guidance for Academia</strong></p><p><a href="https://www.cpni.gov.uk/trusted-research-academia">https://www.cpni.gov.uk/trusted-research-academia</a></p><p> </p><p><strong>Australia's Cybersecurity Strategy 2020 (Section 40, Page 23)</strong></p><p><a href="https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf">https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf</a></p><p> </p>
]]></content:encoded>
      <enclosure length="34801718" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/8e02f5c2-70eb-4ef1-a895-ccc67e0462bb/audio/32dcfa82-e792-49ec-ab96-e3cd42f9f5d0/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Safeguards: Secure your Choice to share your Research</itunes:title>
      <itunes:author>Sinead Tuite</itunes:author>
      <itunes:duration>00:36:13</itunes:duration>
      <itunes:summary>More than ever, you should safeguard your research. We are joined by Sinead Tuite, the Senior Director for the Digital Research Infrastructure Branch within the Science and Research Sector at Innovation, Science and Economic Development (ISED) Canada to talk about the need for protecting your research, some threats to be aware of and what you can do about it to make sure you are proactively making choices about how your research is used and shared. </itunes:summary>
      <itunes:subtitle>More than ever, you should safeguard your research. We are joined by Sinead Tuite, the Senior Director for the Digital Research Infrastructure Branch within the Science and Research Sector at Innovation, Science and Economic Development (ISED) Canada to talk about the need for protecting your research, some threats to be aware of and what you can do about it to make sure you are proactively making choices about how your research is used and shared. </itunes:subtitle>
      <itunes:keywords>academia, risk, research, cybercrime, safeguarding research, cybersecurity, security, canada, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">53693e6d-825c-487a-b014-79caa475f4ce</guid>
      <title>Press Record. Trustworthy Truth Supply-chains in the Disinformation Age</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Victoria Lemieux</p><p><a href="https://ischool.ubc.ca/profile/victoria-lemieux/">https://ischool.ubc.ca/profile/victoria-lemieux/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p>Lemieux, V. L. (2022). <i>Searching for Trust: Blockchain Technology in an Age of Disinformation</i>. Cambridge University Press.</p><p><a href="https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856">https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856</a></p><p>Lemieux, V. L., & Feng, C. (2021). <i>Building Decentralized Trust</i>. Springer International Publishing. https://doi. org/10.1007/978-3-030-54414-0.</p><p><a href="https://www.researchgate.net/profile/Victoria-Lemieux/publication/350180597_Multidisciplinary_Blockchain_Research_and_Design_A_Case_Study_in_Moving_from_Theory_to_Pedagogy_to_Practice/links/60a542afa6fdcc3f30b5cbb4/Multidisciplinary-Blockchain-Research-and-Design-A-Case-Study-in-Moving-from-Theory-to-Pedagogy-to-Practice.pdf">https://www.researchgate.net/profile/Victoria-Lemieux/publication/350180597_Multidisciplinary_Blockchain_Research_and_Design_A_Case_Study_in_Moving_from_Theory_to_Pedagogy_to_Practice/links/60a542afa6fdcc3f30b5cbb4/Multidisciplinary-Blockchain-Research-and-Design-A-Case-Study-in-Moving-from-Theory-to-Pedagogy-to-Practice.pdf</a></p><p><strong>Other:</strong></p><p>Here is the oldest surviving record of the 60% of hacked SMBs go bankrupt claim,</p><p><a href="https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf">https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf</a></p><p>National Cyber Security Alliance (NCSA) Statement Regarding Incorrect Small Business Statistic</p><p><a href="https://staysafeonline.org/press-release/national-cyber-security-alliance-statement-regarding-incorrect-small-business-statistic/">https://staysafeonline.org/press-release/national-cyber-security-alliance-statement-regarding-incorrect-small-business-statistic/</a></p><p>60% of Hacked Small Businesses Fail. How Reliable Is That Stat?</p><p><a href="https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464">https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464</a></p><p>The fact that we can't find who is responsible for these numbers is kind of the point of having record keeping. </p><p>Just to put this claim in context in 2015 the US had 28.8 million Small businesses (<a href="https://www.sba.gov/sites/default/files/advocacy/United_States.pdf">https://www.sba.gov/sites/default/files/advocacy/United_States.pdf</a>)</p><p>If half of those businesses were hacked, as claimed that would be 14.4million Breaches.   If 60% of those went out of business, that would be 8.64 million businesses folding, which you might expect would be noticed economically.  In particular, it would mean that around half of the US population lost their job.  I suspect that we might have noticed that. </p>
]]></description>
      <pubDate>Wed, 1 Jun 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Victoria Lemieux)</author>
      <link>https://cybercrimeology.com/episodes/press-record-trustworthy-truth-supply-chains-in-the-disinformation-ages-rgZT_PmN</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Victoria Lemieux</p><p><a href="https://ischool.ubc.ca/profile/victoria-lemieux/">https://ischool.ubc.ca/profile/victoria-lemieux/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p>Lemieux, V. L. (2022). <i>Searching for Trust: Blockchain Technology in an Age of Disinformation</i>. Cambridge University Press.</p><p><a href="https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856">https://www.cambridge.org/core/books/searching-for-trust/B2F64551393899EBC6306EB42FCBE856</a></p><p>Lemieux, V. L., & Feng, C. (2021). <i>Building Decentralized Trust</i>. Springer International Publishing. https://doi. org/10.1007/978-3-030-54414-0.</p><p><a href="https://www.researchgate.net/profile/Victoria-Lemieux/publication/350180597_Multidisciplinary_Blockchain_Research_and_Design_A_Case_Study_in_Moving_from_Theory_to_Pedagogy_to_Practice/links/60a542afa6fdcc3f30b5cbb4/Multidisciplinary-Blockchain-Research-and-Design-A-Case-Study-in-Moving-from-Theory-to-Pedagogy-to-Practice.pdf">https://www.researchgate.net/profile/Victoria-Lemieux/publication/350180597_Multidisciplinary_Blockchain_Research_and_Design_A_Case_Study_in_Moving_from_Theory_to_Pedagogy_to_Practice/links/60a542afa6fdcc3f30b5cbb4/Multidisciplinary-Blockchain-Research-and-Design-A-Case-Study-in-Moving-from-Theory-to-Pedagogy-to-Practice.pdf</a></p><p><strong>Other:</strong></p><p>Here is the oldest surviving record of the 60% of hacked SMBs go bankrupt claim,</p><p><a href="https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf">https://docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf</a></p><p>National Cyber Security Alliance (NCSA) Statement Regarding Incorrect Small Business Statistic</p><p><a href="https://staysafeonline.org/press-release/national-cyber-security-alliance-statement-regarding-incorrect-small-business-statistic/">https://staysafeonline.org/press-release/national-cyber-security-alliance-statement-regarding-incorrect-small-business-statistic/</a></p><p>60% of Hacked Small Businesses Fail. How Reliable Is That Stat?</p><p><a href="https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464">https://www.bankinfosecurity.com/blogs/60-hacked-small-businesses-fail-how-reliable-that-stat-p-2464</a></p><p>The fact that we can't find who is responsible for these numbers is kind of the point of having record keeping. </p><p>Just to put this claim in context in 2015 the US had 28.8 million Small businesses (<a href="https://www.sba.gov/sites/default/files/advocacy/United_States.pdf">https://www.sba.gov/sites/default/files/advocacy/United_States.pdf</a>)</p><p>If half of those businesses were hacked, as claimed that would be 14.4million Breaches.   If 60% of those went out of business, that would be 8.64 million businesses folding, which you might expect would be noticed economically.  In particular, it would mean that around half of the US population lost their job.  I suspect that we might have noticed that. </p>
]]></content:encoded>
      <enclosure length="33270069" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/acf966f1-7e90-43f5-8736-0abc30724884/audio/5a634aab-3b42-46e7-8f98-a74531c9013b/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Press Record. Trustworthy Truth Supply-chains in the Disinformation Age</itunes:title>
      <itunes:author>Victoria Lemieux</itunes:author>
      <itunes:duration>00:34:37</itunes:duration>
      <itunes:summary>Where is trust in the big data world of the information age? Dr Victoria Lemieux joins us to talk about the importance of record keeping in an age of heightened institutional and epistemic mistrust. We talk about her recent book &quot;Searching for Trust
Blockchain Technology in an Age of Disinformation&quot; and the important role of immutable records such as distributed ledgers in providing an epistemic basis for the trust necessary for civilization.  </itunes:summary>
      <itunes:subtitle>Where is trust in the big data world of the information age? Dr Victoria Lemieux joins us to talk about the importance of record keeping in an age of heightened institutional and epistemic mistrust. We talk about her recent book &quot;Searching for Trust
Blockchain Technology in an Age of Disinformation&quot; and the important role of immutable records such as distributed ledgers in providing an epistemic basis for the trust necessary for civilization.  </itunes:subtitle>
      <itunes:keywords>truth, records, disinformation, research, cybercrime, internet, misinformation, cyber, cybersecurity, archives, evidence, trust, archival science, epistemology, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6959d1d3-bb96-4dcd-90bc-bc10972677ce</guid>
      <title>Environmental Choices: Advancing the research of cybercrime prevention</title>
      <description><![CDATA[<p><strong>About our Guests</strong></p><p>Dr Asier Moneva</p><p><a href="https://asiermoneva.com/">https://asiermoneva.com/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p>Moneva, A., Leukfeldt, E.R. & Klijnsoon, W. Alerting consciences to reduce cybercrime: a quasi-experimental design using warning banners. <i>J Exp Criminol</i> (2022). https://doi.org/10.1007/s11292-022-09504-2</p><p><a href="https://link.springer.com/article/10.1007/s11292-022-09504-2">https://link.springer.com/article/10.1007/s11292-022-09504-2</a></p><p>Moneva, A., Leukfeldt, E. R., Van De Weijer, S. G., & Miró-Llinares, F. (2022). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. <i>Computers in Human Behavior</i>, <i>126</i>, 106984.</p><p><a href="https://www.sciencedirect.com/science/article/pii/S0747563221003071">https://www.sciencedirect.com/science/article/pii/S0747563221003071</a></p><p>Miró-Llinares, F., & Moneva, A. (2020). Environmental criminology and cybercrime: Shifting focus from the wine to the bottles. <i>The Palgrave handbook of international cybercrime and cyberdeviance</i>, 491-511.</p><p><a href="https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf">https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf</a></p><p> </p><p><strong>Other</strong></p><p>Hacker Mobility in Cyberspace and the Least Effort Principle: Examining Efficiency in the Journey to Cybercrime</p><p><a href="https://osf.io/ufdp8">https://osf.io/ufdp8</a></p><p> </p><p>Bhuiyan, Johana (2022, 4 Apr) How can US law enforcement agencies access your data? Let’s count the ways, The Guardian, <a href="https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta">https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta</a></p><p> </p><p>Carcamo, Cindy (2022, 10 May) Immigration officials created network that can spy on majority of Americans, report says, Los Angeles Times, <a href="https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans">https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans</a></p><p> </p><p> </p><p> </p><p> </p>
]]></description>
      <pubDate>Sun, 15 May 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Asier Moneva, Domenic Vogel)</author>
      <link>https://cybercrimeology.com/episodes/environmental-choices-advancing-the-research-of-cybercrime-prevention-L_4Kpxo2</link>
      <content:encoded><![CDATA[<p><strong>About our Guests</strong></p><p>Dr Asier Moneva</p><p><a href="https://asiermoneva.com/">https://asiermoneva.com/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mention in this episode:</strong></p><p>Moneva, A., Leukfeldt, E.R. & Klijnsoon, W. Alerting consciences to reduce cybercrime: a quasi-experimental design using warning banners. <i>J Exp Criminol</i> (2022). https://doi.org/10.1007/s11292-022-09504-2</p><p><a href="https://link.springer.com/article/10.1007/s11292-022-09504-2">https://link.springer.com/article/10.1007/s11292-022-09504-2</a></p><p>Moneva, A., Leukfeldt, E. R., Van De Weijer, S. G., & Miró-Llinares, F. (2022). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. <i>Computers in Human Behavior</i>, <i>126</i>, 106984.</p><p><a href="https://www.sciencedirect.com/science/article/pii/S0747563221003071">https://www.sciencedirect.com/science/article/pii/S0747563221003071</a></p><p>Miró-Llinares, F., & Moneva, A. (2020). Environmental criminology and cybercrime: Shifting focus from the wine to the bottles. <i>The Palgrave handbook of international cybercrime and cyberdeviance</i>, 491-511.</p><p><a href="https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf">https://link.springer.com/content/pdf/10.1007/978-3-319-78440-3_30.pdf</a></p><p> </p><p><strong>Other</strong></p><p>Hacker Mobility in Cyberspace and the Least Effort Principle: Examining Efficiency in the Journey to Cybercrime</p><p><a href="https://osf.io/ufdp8">https://osf.io/ufdp8</a></p><p> </p><p>Bhuiyan, Johana (2022, 4 Apr) How can US law enforcement agencies access your data? Let’s count the ways, The Guardian, <a href="https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta">https://www.theguardian.com/technology/2022/apr/04/us-law-enforcement-agencies-access-your-data-apple-meta</a></p><p> </p><p>Carcamo, Cindy (2022, 10 May) Immigration officials created network that can spy on majority of Americans, report says, Los Angeles Times, <a href="https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans">https://www.latimes.com/california/story/2022-05-10/report-immigration-officials-spying-on-majority-of-americans</a></p><p> </p><p> </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="31380159" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/e04fe320-58f7-42a5-ba6a-bd7318704cc6/audio/f3e89c30-a1df-4b9e-a40d-77347c90b0f1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Environmental Choices: Advancing the research of cybercrime prevention</itunes:title>
      <itunes:author>Asier Moneva, Domenic Vogel</itunes:author>
      <itunes:duration>00:32:39</itunes:duration>
      <itunes:summary>What choices should we make in order to adapt to the environment of cybercrime ? Dr Asier Moneva shares with us his experiences applying environmental criminology to the research of crime online.  We talk about work on website defacements and DDoS attacks, progressing research to overcome limitations, finding research questions and adopting new forms of data and methods to advance our understanding of crime in the virtual world and provide value in the prevention of crime. 

Dominic Vogel from cyber.sc joins us to help with a silly question. He lets us know the difference between cybersecurity and information technology skill sets and talks about balancing profit and community values as a small business. </itunes:summary>
      <itunes:subtitle>What choices should we make in order to adapt to the environment of cybercrime ? Dr Asier Moneva shares with us his experiences applying environmental criminology to the research of crime online.  We talk about work on website defacements and DDoS attacks, progressing research to overcome limitations, finding research questions and adopting new forms of data and methods to advance our understanding of crime in the virtual world and provide value in the prevention of crime. 

Dominic Vogel from cyber.sc joins us to help with a silly question. He lets us know the difference between cybersecurity and information technology skill sets and talks about balancing profit and community values as a small business. </itunes:subtitle>
      <itunes:keywords>crime, methods, website defacement, research, cybercrime, criminology, environmental criminology, education, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f8fdf67-ab9e-4d43-9420-237e9eb2ca04</guid>
      <title>CTF?WTF? : Designing and Competing in Capture the Flag competitions</title>
      <description><![CDATA[<p><strong>About our guest:</strong></p><p>You can find out more about the design team for Northsec at <a href="https://nsec.io/team/">https://nsec.io/team/</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Challenges from previous northsec competitions can be found here:</p><p><a href="https://nsec.io/competition-write-ups/">https://nsec.io/competition-write-ups/</a></p><p>In particular, we referred to this challenge:</p><p><a href="https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs">https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs</a></p><p> </p><p><strong>Other:</strong></p><p>If you want to have a try at CTF challenges, you can try this site from Carnegie Mellon University</p><p><a href="https://picoctf.org/">https://picoctf.org/</a></p><p>You can also try this website for getting started with hacking techniques </p><p><a href="https://www.hackthissite.org/">https://www.hackthissite.org/</a></p><p>Jax was actually feeling ill during this interview but did it anyway, what a champion.  </p>
]]></description>
      <pubDate>Sun, 1 May 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Jax)</author>
      <link>https://cybercrimeology.com/episodes/capture-the-flag-what-is-how-to-design-and-how-to-compete-in-ctfs-for-hackers-YaILVAUl</link>
      <content:encoded><![CDATA[<p><strong>About our guest:</strong></p><p>You can find out more about the design team for Northsec at <a href="https://nsec.io/team/">https://nsec.io/team/</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Challenges from previous northsec competitions can be found here:</p><p><a href="https://nsec.io/competition-write-ups/">https://nsec.io/competition-write-ups/</a></p><p>In particular, we referred to this challenge:</p><p><a href="https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs">https://github.com/JaneBdemented/NSEC2019_DEFEC8ED_Walkthroughs</a></p><p> </p><p><strong>Other:</strong></p><p>If you want to have a try at CTF challenges, you can try this site from Carnegie Mellon University</p><p><a href="https://picoctf.org/">https://picoctf.org/</a></p><p>You can also try this website for getting started with hacking techniques </p><p><a href="https://www.hackthissite.org/">https://www.hackthissite.org/</a></p><p>Jax was actually feeling ill during this interview but did it anyway, what a champion.  </p>
]]></content:encoded>
      <enclosure length="28842310" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3ad33879-6503-46df-b5ad-c1323fec3a4b/audio/b205981f-090d-4224-9f16-05a58d81a222/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>CTF?WTF? : Designing and Competing in Capture the Flag competitions</itunes:title>
      <itunes:author>Jax</itunes:author>
      <itunes:duration>00:30:01</itunes:duration>
      <itunes:summary>What is important to keep in mind when designing and taking part in Capture The Flag (CTF) competition. We talk with Jax, who has been designing top-level competitions for white hats and students for half a decade. We find out what CTFs are, what to keep in mind when designing them and when competing in them.  We keep the discussion away from the technical and there is a glossary at the end and fun throughout.  </itunes:summary>
      <itunes:subtitle>What is important to keep in mind when designing and taking part in Capture The Flag (CTF) competition. We talk with Jax, who has been designing top-level competitions for white hats and students for half a decade. We find out what CTFs are, what to keep in mind when designing them and when competing in them.  We keep the discussion away from the technical and there is a glossary at the end and fun throughout.  </itunes:subtitle>
      <itunes:keywords>crime, design, competition, white-hat, research, capture the flag, hackers, cybersecurity, education, ctf</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9fc52194-2663-47b8-b721-a7b06bc64542</guid>
      <title>Beyond Awareness: connecting cybersecurity knowledge, behaviour and victimization</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Susanne van’t Hoff de Goede</p><p><a href="https://www.thehagueuniversity.com/research/centre-of-expertise/details/centre-of-expertise-cyber-security#team">https://www.thehagueuniversity.com/research/centre-of-expertise/details/centre-of-expertise-cyber-security#team</a></p><p><a href="https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/">https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/</a></p><p><a href="https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/">https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Van ’t Hoff-de Goede, S., Leukfeldt, R., Van der Kleij, R., & Van de Weijer, S. (2020). The online behaviour and victimization study: The development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In M. Weulen Kranenbarg & R. Leukfeldt (Eds.), <i>Cybercrime in Context</i>. <i>The human factor in victimization, offending and policing.</i> Springer.</p><p> </p><p>Van der Kleij, R., Van ’t Hoff-de Goede, S., Van de Weijer, S., & Leukfeldt, R. (2021). How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens. In M. Zallio, C. Raymundo Ibañez, & J.H. Hernandez (Eds), <i>Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity</i>. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. <a href="https://doi.org/10.1007/978-3-030-79997-7_30" target="_blank">https://doi.org/10.1007/978-3-030-79997-7_30</a></p><p> </p><p><strong>Other:</strong></p><p>We weren't able to include all of the discussion in the podcast, but there is an interesting discussion to be had around the relationship between theory and research method.  Often this kind of discussion is around how a theory might shape the research methods that are chosen, in this case Dr van’t Hoff de Goede raised the issue of methods and theory reinforcing each other as the method provides proof of the theory and the theory provides valid application of the method.  I am not a great discussant for this particular debate, but I would say that it provides an argument for a greater range of research methods being a component of strong science.  </p><p> </p><p> </p>
]]></description>
      <pubDate>Fri, 15 Apr 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Susanne van’t Hoff de Goede)</author>
      <link>https://cybercrimeology.com/episodes/beyond-awareness-connecting-cybersecurity-knowledge-behaviour-and-victimization-XSVSKcLu</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr Susanne van’t Hoff de Goede</p><p><a href="https://www.thehagueuniversity.com/research/centre-of-expertise/details/centre-of-expertise-cyber-security#team">https://www.thehagueuniversity.com/research/centre-of-expertise/details/centre-of-expertise-cyber-security#team</a></p><p><a href="https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/">https://www.linkedin.com/in/susanne-van-t-hoff-de-goede-8057a98/</a></p><p><a href="https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/">https://victimologie.nl/netwerkleden/susanne-van-t-hoff-de-goede/</a></p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc/">cyber.sc</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Van ’t Hoff-de Goede, S., Leukfeldt, R., Van der Kleij, R., & Van de Weijer, S. (2020). The online behaviour and victimization study: The development of an experimental research instrument for measuring and explaining online behaviour and cybercrime victimization. In M. Weulen Kranenbarg & R. Leukfeldt (Eds.), <i>Cybercrime in Context</i>. <i>The human factor in victimization, offending and policing.</i> Springer.</p><p> </p><p>Van der Kleij, R., Van ’t Hoff-de Goede, S., Van de Weijer, S., & Leukfeldt, R. (2021). How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens. In M. Zallio, C. Raymundo Ibañez, & J.H. Hernandez (Eds), <i>Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity</i>. AHFE 2021. Lecture Notes in Networks and Systems, vol 268. Springer, Cham. <a href="https://doi.org/10.1007/978-3-030-79997-7_30" target="_blank">https://doi.org/10.1007/978-3-030-79997-7_30</a></p><p> </p><p><strong>Other:</strong></p><p>We weren't able to include all of the discussion in the podcast, but there is an interesting discussion to be had around the relationship between theory and research method.  Often this kind of discussion is around how a theory might shape the research methods that are chosen, in this case Dr van’t Hoff de Goede raised the issue of methods and theory reinforcing each other as the method provides proof of the theory and the theory provides valid application of the method.  I am not a great discussant for this particular debate, but I would say that it provides an argument for a greater range of research methods being a component of strong science.  </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="23797772" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/a23311c4-7f7b-4f18-875e-675bdff06d76/audio/42641488-a1d8-42c9-8da8-827581366f06/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Beyond Awareness: connecting cybersecurity knowledge, behaviour and victimization</itunes:title>
      <itunes:author>Susanne van’t Hoff de Goede</itunes:author>
      <itunes:duration>00:24:46</itunes:duration>
      <itunes:summary>Dr Susanne van’t Hoff de Goede joins us to talk about the link between cybersecurity motivation and knowledge, cybersecurity behaviours and cybercrime victimization.  She discusses research that provide some interesting insights into victimization that brings into question some common assumptions about crime online.  
Dominic Vogel from cyber.sc joins us to help with a silly question. He explains that a security consultant should be honest and helpful even when they don&apos;t know the answer to a question, and the importance of authenticity for him as an entrepreneur.  </itunes:summary>
      <itunes:subtitle>Dr Susanne van’t Hoff de Goede joins us to talk about the link between cybersecurity motivation and knowledge, cybersecurity behaviours and cybercrime victimization.  She discusses research that provide some interesting insights into victimization that brings into question some common assumptions about crime online.  
Dominic Vogel from cyber.sc joins us to help with a silly question. He explains that a security consultant should be honest and helpful even when they don&apos;t know the answer to a question, and the importance of authenticity for him as an entrepreneur.  </itunes:subtitle>
      <itunes:keywords>crime, victimization, research, cybercrime, protection, cybersecurity, behaviour, motivation, victim, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">17d0e4f7-456e-4271-8d80-4debe5f26789</guid>
      <title>CyberAware: How governments (may) change our behaviour for the better</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Tommy Van Steen</p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1">https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1</a></p><p> </p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc">cyber.sc</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?. <i>Journal of Cybersecurity</i>, <i>6</i> (1)</p><p><a href="https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830">https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830</a></p><p>Michie S, Richardson M, Johnston M, Abraham C, Francis J, Hardeman W, Eccles MP, Cane J, Wood CE. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med. 2013 Aug;46(1):81-95. doi: 10.1007/s12160-013-9486-6. PMID: 23512568.</p><p><a href="https://pubmed.ncbi.nlm.nih.gov/23512568/">https://pubmed.ncbi.nlm.nih.gov/23512568/</a></p><p>Canada Revenue Agency, Be Scam Smart – Tax Refund</p><p><a href="https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2">https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2</a></p><p> </p><p><strong>Other:</strong></p><p>The Behaviour Change Wheel organizes the taxonomy into a way that allows it to be used as a tool during the design and implementation of tools. You can find a presentation from Dr Susan Mitchie, presenting that approach in this video <a href="https://www.youtube.com/watch?v=2-KvaIsb0fM">https://www.youtube.com/watch?v=2-KvaIsb0fM</a></p><p>Thanks to Domenic Vogel’s son for providing some background ambience during the interview. Its always amazing how the sound of a child playing helps adults to remember to play too.</p>
]]></description>
      <pubDate>Fri, 1 Apr 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Domenic Vogel, Tommy Van Steen)</author>
      <link>https://cybercrimeology.com/episodes/cyberaware-how-governments-may-change-our-behaviour-for-the-better-vcS0wJUW</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr Tommy Van Steen</p><p><a href="https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1">https://www.universiteitleiden.nl/en/staffmembers/tommy-van-steen#tab-1</a></p><p> </p><p>Dominic Vogel</p><p><a href="https://ca.linkedin.com/in/domvogel">https://ca.linkedin.com/in/domvogel</a></p><p><a href="http://cyber.sc">cyber.sc</a></p><p> </p><p><strong>Papers or resources mentioned in this episode:</strong></p><p>Van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?. <i>Journal of Cybersecurity</i>, <i>6</i> (1)</p><p><a href="https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830">https://academic.oup.com/cybersecurity/article-abstract/6/1/tyaa019/6032830</a></p><p>Michie S, Richardson M, Johnston M, Abraham C, Francis J, Hardeman W, Eccles MP, Cane J, Wood CE. The behavior change technique taxonomy (v1) of 93 hierarchically clustered techniques: building an international consensus for the reporting of behavior change interventions. Ann Behav Med. 2013 Aug;46(1):81-95. doi: 10.1007/s12160-013-9486-6. PMID: 23512568.</p><p><a href="https://pubmed.ncbi.nlm.nih.gov/23512568/">https://pubmed.ncbi.nlm.nih.gov/23512568/</a></p><p>Canada Revenue Agency, Be Scam Smart – Tax Refund</p><p><a href="https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2">https://www.youtube.com/watch?v=lGNb7JCElzY&list=PLWsWrJHQSlisHkd5uCkyfaO3x2h4P2rsq&index=2</a></p><p> </p><p><strong>Other:</strong></p><p>The Behaviour Change Wheel organizes the taxonomy into a way that allows it to be used as a tool during the design and implementation of tools. You can find a presentation from Dr Susan Mitchie, presenting that approach in this video <a href="https://www.youtube.com/watch?v=2-KvaIsb0fM">https://www.youtube.com/watch?v=2-KvaIsb0fM</a></p><p>Thanks to Domenic Vogel’s son for providing some background ambience during the interview. Its always amazing how the sound of a child playing helps adults to remember to play too.</p>
]]></content:encoded>
      <enclosure length="23256246" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/973d1dc9-c61b-4ee4-99d8-3a70e6d76a22/audio/ac2a6ce9-f754-4b01-90b1-16696d921549/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>CyberAware: How governments (may) change our behaviour for the better</itunes:title>
      <itunes:author>Domenic Vogel, Tommy Van Steen</itunes:author>
      <itunes:duration>00:24:12</itunes:duration>
      <itunes:summary>What aspects of cybercrime awareness campaigns change behaviour? To help to better understand the messaging from these campaigns is Dr. Tommy Van Steen who has recently published a paper called “What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?”.

Dominic Vogel from cyber.sc joins us to answer a stupid question. He explains when it is that a security consultant is contacted about cybersecurity.</itunes:summary>
      <itunes:subtitle>What aspects of cybercrime awareness campaigns change behaviour? To help to better understand the messaging from these campaigns is Dr. Tommy Van Steen who has recently published a paper called “What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?”.

Dominic Vogel from cyber.sc joins us to answer a stupid question. He explains when it is that a security consultant is contacted about cybersecurity.</itunes:subtitle>
      <itunes:keywords>research, cybercrime, cybersecurity, campaigns, education, awareness, psychology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ed4f98a9-d91c-44a5-93f0-989ae79273f2</guid>
      <title>The Right Tools: Advanced &amp; Appropriate Methods For Advancing Cybercrime Research</title>
      <description><![CDATA[<p><strong>About Our Guests:</strong></p><p>Dr. David Maimon</p><p><a href="https://news.gsu.edu/expert/david-maimon/">https://news.gsu.edu/expert/david-maimon/</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Maimon, D., Howell, C. J., Perkins, R. C., Muniz, C. N., & Berenblum, T. (2021). A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks. Social Science Computer Review. <a href="https://doi.org/10.1177/08944393211046339">https://doi.org/10.1177/08944393211046339</a></p><p>Maimon, D., Howell, C. J., & Burruss, G. W. (2021). Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials. <i>Computers in Human Behavior</i> <a href="https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661">https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661</a></p><p><strong>Other:</strong></p><p>Dr Maimon mentions sending a link with a EULA or End User License Agreement. A EULA is a contract between a software producer and the eventual user of the product, specifying the terms and conditions of use.</p><p>The music for this episode is called “G0n3 Ph1sh1ng”. I do like a good metaphor.</p><p>One thou is 25 micrometres. Metric is more precise. In practice, I use both. Such is the joy of Canada.</p><p>You might get 40 rods to the hog’s head and like it that way; I respect that.</p>
]]></description>
      <pubDate>Tue, 15 Mar 2022 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (David Maimon)</author>
      <link>https://cybercrimeology.com/episodes/the-right-tools-advanced-appropriate-methods-for-advancing-cybercrime-N_ryuNz7</link>
      <content:encoded><![CDATA[<p><strong>About Our Guests:</strong></p><p>Dr. David Maimon</p><p><a href="https://news.gsu.edu/expert/david-maimon/">https://news.gsu.edu/expert/david-maimon/</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Maimon, D., Howell, C. J., Perkins, R. C., Muniz, C. N., & Berenblum, T. (2021). A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks. Social Science Computer Review. <a href="https://doi.org/10.1177/08944393211046339">https://doi.org/10.1177/08944393211046339</a></p><p>Maimon, D., Howell, C. J., & Burruss, G. W. (2021). Restrictive deterrence and the scope of hackers’ reoffending: Findings from two randomized field trials. <i>Computers in Human Behavior</i> <a href="https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661">https://www.sciencedirect.com/science/article/abs/pii/S0747563221002661</a></p><p><strong>Other:</strong></p><p>Dr Maimon mentions sending a link with a EULA or End User License Agreement. A EULA is a contract between a software producer and the eventual user of the product, specifying the terms and conditions of use.</p><p>The music for this episode is called “G0n3 Ph1sh1ng”. I do like a good metaphor.</p><p>One thou is 25 micrometres. Metric is more precise. In practice, I use both. Such is the joy of Canada.</p><p>You might get 40 rods to the hog’s head and like it that way; I respect that.</p>
]]></content:encoded>
      <enclosure length="28278687" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/41996f4f-ae07-4bb1-bf2a-89d4ee24b60e/audio/387b7872-75b2-4620-8745-5a07ba8bbaae/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Right Tools: Advanced &amp; Appropriate Methods For Advancing Cybercrime Research</itunes:title>
      <itunes:author>David Maimon</itunes:author>
      <itunes:duration>00:29:26</itunes:duration>
      <itunes:summary>Dr David Maimon joins us to share some research and have a chat about research.  We discus the impact of the pandemic on illicit markets, phishing, online fraud, identity theft and synthetic identities as well as the possibilities that technologies offers in terms of developing tools that provide new measurements and observations for scientific research on cybercrime. 

Dr. James is with us to answer one of my odd questions about digital forensics. He explains why the opposite of technologies ‘going dark’ obstructing criminal investigations is not ‘going light’ making investigations easy.</itunes:summary>
      <itunes:subtitle>Dr David Maimon joins us to share some research and have a chat about research.  We discus the impact of the pandemic on illicit markets, phishing, online fraud, identity theft and synthetic identities as well as the possibilities that technologies offers in terms of developing tools that provide new measurements and observations for scientific research on cybercrime. 

Dr. James is with us to answer one of my odd questions about digital forensics. He explains why the opposite of technologies ‘going dark’ obstructing criminal investigations is not ‘going light’ making investigations easy.</itunes:subtitle>
      <itunes:keywords>crime, smishing, research, cybercrime, identity theft, phishing, darknets, illicit markets, research methods</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a608344-686f-4ab3-a352-891b327307c8</guid>
      <title>Cyber Victims, Offenders &amp; Policing in context of a life offline</title>
      <description><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Marleen Weulen Kranenbarg</p><p><a href="https://research.vu.nl/en/persons/marleen-weulen-kranenbarg">https://research.vu.nl/en/persons/marleen-weulen-kranenbarg</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p> </p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Weulen Kranenbarg, M., & Leukfeldt, R. (2021). Cybercrime in Context . Springer International Publishing.</p><p><a href="https://link.springer.com/book/10.1007/978-3-030-60527-8">https://link.springer.com/book/10.1007/978-3-030-60527-8</a></p><p> </p><p>Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. <i>European Journal of Criminology</i>, <i>18</i>(3), 386-406.</p><p> </p><p>Weulen Kranenbarg, M., van der Toolen, Y., & Weerman, F. (2022). Understanding cybercriminal behaviour among young people.</p><p> </p><p>Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J. L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. <i>Journal of developmental and life-course criminology</i>, <i>4</i>(3), 343-364.</p><p> </p><p><strong>Other:</strong></p><p>The episode with Dr. David Decary-Hetu is episode 55, you can go back a couple of episodes to find that or look here: <a href="https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web">https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web</a></p><p>I edited this episode a little more aggressively to get it down to 30 minutes, it may have lost a little of its smoothness, but it is concentrated goodness ;). </p>
]]></description>
      <pubDate>Tue, 1 Mar 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Marleen Weulen Kranenbarg, Joshua James)</author>
      <link>https://cybercrimeology.com/episodes/cyber-victims-offenders-policing-in-context-of-a-life-offline-_P_4J57d</link>
      <content:encoded><![CDATA[<p><strong>About our guests:</strong></p><p>Dr. Marleen Weulen Kranenbarg</p><p><a href="https://research.vu.nl/en/persons/marleen-weulen-kranenbarg">https://research.vu.nl/en/persons/marleen-weulen-kranenbarg</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p> </p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Weulen Kranenbarg, M., & Leukfeldt, R. (2021). Cybercrime in Context . Springer International Publishing.</p><p><a href="https://link.springer.com/book/10.1007/978-3-030-60527-8">https://link.springer.com/book/10.1007/978-3-030-60527-8</a></p><p> </p><p>Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J. L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. <i>European Journal of Criminology</i>, <i>18</i>(3), 386-406.</p><p> </p><p>Weulen Kranenbarg, M., van der Toolen, Y., & Weerman, F. (2022). Understanding cybercriminal behaviour among young people.</p><p> </p><p>Weulen Kranenbarg, M., Ruiter, S., Van Gelder, J. L., & Bernasco, W. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. <i>Journal of developmental and life-course criminology</i>, <i>4</i>(3), 343-364.</p><p> </p><p><strong>Other:</strong></p><p>The episode with Dr. David Decary-Hetu is episode 55, you can go back a couple of episodes to find that or look here: <a href="https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web">https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web</a></p><p>I edited this episode a little more aggressively to get it down to 30 minutes, it may have lost a little of its smoothness, but it is concentrated goodness ;). </p>
]]></content:encoded>
      <enclosure length="28822579" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/4eadc760-a126-413c-9342-89d79283d612/audio/e53ba0b1-76d4-4d47-ab4f-4f1a656ee77d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cyber Victims, Offenders &amp; Policing in context of a life offline</itunes:title>
      <itunes:author>Marleen Weulen Kranenbarg, Joshua James</itunes:author>
      <itunes:duration>00:30:00</itunes:duration>
      <itunes:summary>How do you create a book that can serve as a resource for those jumping into cybercrime research ? We ask our guest Dr. Marleen Weulen Kranenbarg who is assistant professor in Criminology at  the Vrije Universiteit (VU) Amsterdam about the creation of the book “Cybercrime in Context” from the Human Factors in Cybercrime conference. We also find out more about the development in the types and methods that are now being used in cybercrime research.   We talk about how cybercrime differs from traditional crime for offenders in terms of life course theory. 

Dr. James joins us again to answer one of my odd questions about digital forensics. He explains why it is that Digital Forensics requires human investigators and is not an activity that can be automated.</itunes:summary>
      <itunes:subtitle>How do you create a book that can serve as a resource for those jumping into cybercrime research ? We ask our guest Dr. Marleen Weulen Kranenbarg who is assistant professor in Criminology at  the Vrije Universiteit (VU) Amsterdam about the creation of the book “Cybercrime in Context” from the Human Factors in Cybercrime conference. We also find out more about the development in the types and methods that are now being used in cybercrime research.   We talk about how cybercrime differs from traditional crime for offenders in terms of life course theory. 

Dr. James joins us again to answer one of my odd questions about digital forensics. He explains why it is that Digital Forensics requires human investigators and is not an activity that can be automated.</itunes:subtitle>
      <itunes:keywords>methods, life-course, research, cybercrime, human factor, digital forensics, education, artificial intelligence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5bf24bef-058a-4c8c-9759-3784079c0379</guid>
      <title>Cybercrime Frenzy: Cloudy Data and the cascade Effect</title>
      <description><![CDATA[<p><strong>About our Guests</strong></p><p>Dr Maria Grazia Porcedda </p><p><a href="https://www.tcd.ie/research/profiles/?profile=mariagrp">https://www.tcd.ie/research/profiles/?profile=mariagrp</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Porcedda, M. G., & Wall, D. S. (2021, September). Modelling the Cybercrime Cascade Effect in Data Crime. In <i>2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)</i> (pp. 161-177). IEEE.</p><p><a href="http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdf">http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdf</a></p><p>The Cambridge Computer Crime Database (Maintained by Alice Hutchings )</p><p><a href="https://www.cl.cam.ac.uk/~ah793/cccd.html">https://www.cl.cam.ac.uk/~ah793/cccd.html</a></p><p>The Computer Evidence Database of Computer Misuse Act cases (Maintained by Michael Turner)</p><p><a href="https://www.computerevidence.co.uk/Cases/CMA.htm">https://www.computerevidence.co.uk/Cases/CMA.htm</a></p><p> </p><p><strong>Other:</strong></p><p>During the outro I managed to say "<i>Mater </i>data" instead of "Meta data". I don't think that mater data exists as a term but perhaps we will need it or something like it to describe the data that gave birth to other data.  If we keep having to chase data back to its point of origin and it is being transformed and transferred by automatic processes we might well one day have deliberate conversations about mater data.  That hasn't happened yet and in this case it was just another of  my many mangled mispronunciations.  </p><p> </p>
]]></description>
      <pubDate>Tue, 15 Feb 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Maria Grazia Porcedda)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-frenzy-cloudy-data-and-the-cascade-effect-YyJB4M3V</link>
      <content:encoded><![CDATA[<p><strong>About our Guests</strong></p><p>Dr Maria Grazia Porcedda </p><p><a href="https://www.tcd.ie/research/profiles/?profile=mariagrp">https://www.tcd.ie/research/profiles/?profile=mariagrp</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Porcedda, M. G., & Wall, D. S. (2021, September). Modelling the Cybercrime Cascade Effect in Data Crime. In <i>2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)</i> (pp. 161-177). IEEE.</p><p><a href="http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdf">http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdf</a></p><p>The Cambridge Computer Crime Database (Maintained by Alice Hutchings )</p><p><a href="https://www.cl.cam.ac.uk/~ah793/cccd.html">https://www.cl.cam.ac.uk/~ah793/cccd.html</a></p><p>The Computer Evidence Database of Computer Misuse Act cases (Maintained by Michael Turner)</p><p><a href="https://www.computerevidence.co.uk/Cases/CMA.htm">https://www.computerevidence.co.uk/Cases/CMA.htm</a></p><p> </p><p><strong>Other:</strong></p><p>During the outro I managed to say "<i>Mater </i>data" instead of "Meta data". I don't think that mater data exists as a term but perhaps we will need it or something like it to describe the data that gave birth to other data.  If we keep having to chase data back to its point of origin and it is being transformed and transferred by automatic processes we might well one day have deliberate conversations about mater data.  That hasn't happened yet and in this case it was just another of  my many mangled mispronunciations.  </p><p> </p>
]]></content:encoded>
      <enclosure length="29874789" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/4efcde47-e36b-4182-8133-c3f729929f83/audio/57ac2c4c-92c9-444c-9a2c-d9295d76b120/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime Frenzy: Cloudy Data and the cascade Effect</itunes:title>
      <itunes:author>Maria Grazia Porcedda</itunes:author>
      <itunes:duration>00:31:05</itunes:duration>
      <itunes:summary>We are joined by Dr Maria Grazia Porcedda who is Assistant Professor of IT Law a Trinity college Dublin to talk about the role of data in cybercrime offences and the cascading harms that result from data breaches.  Cyber dependent crimes can result in cyber enabled crimes by both direct and indirect links between offenders.  There is a cascade effect that can see secondary and tertiary victimizations flowing on from an initial crime event.
Dr. James joins us again to answer one of my odd questions about digital forensics. He explains two types meta-data, what we should be concerned about and how it can be used by digital investigators. </itunes:summary>
      <itunes:subtitle>We are joined by Dr Maria Grazia Porcedda who is Assistant Professor of IT Law a Trinity college Dublin to talk about the role of data in cybercrime offences and the cascading harms that result from data breaches.  Cyber dependent crimes can result in cyber enabled crimes by both direct and indirect links between offenders.  There is a cascade effect that can see secondary and tertiary victimizations flowing on from an initial crime event.
Dr. James joins us again to answer one of my odd questions about digital forensics. He explains two types meta-data, what we should be concerned about and how it can be used by digital investigators. </itunes:subtitle>
      <itunes:keywords>data, crime, breach, research, science, cloud, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e4141282-2560-40c1-aa9d-de3d27daefca</guid>
      <title>Dark Data Scraping : Studying on the dark web, Publishing on the open web</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Décary-Hetu</p><p><a href="https://ddhetu.pubpub.org/">https://ddhetu.pubpub.org/</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>The Crim Archive.</p><p><a href="https://www.crimrxiv.com/">https://www.crimrxiv.com/</a></p><p>Human Cyber-Centric Cybersecurity Partnership</p><p><a href="https://www.hc2p.ca/">https://www.hc2p.ca/</a></p><p>Ouellet, Marie; Décary-Hétu, David; and Bergeron, Andréanne, "Cryptomarkets and the Returns to Criminal Experience" (2022). CSLF Articles. 3. <a href="https://scholarworks.gsu.edu/ays_cslf_articles/3">https://scholarworks.gsu.edu/ays_cslf_articles/3</a></p><p>David Décary-Hétu & Benoit Dupont (2012) The social network of hackers, Global Crime, 13:3, 160-175, DOI: <a href="https://doi.org/10.1080/17440572.2012.702523">10.1080/17440572.2012.702523</a></p><p>Flamand, C., & Décary-Hétu, D. (2019). The Open and Dark Web. <i>The Human Factor of Cybercrime</i>, 34-50.</p><p>Other:</p><p>My husky voice is as a result of testing how much my lung capacity has degraded as a result of covid-19 with a short work through metre deep snow. Turns out it has degraded a lot. If you have wondered if show shoes are worth the hassle, they absolutely are.  </p>
]]></description>
      <pubDate>Tue, 1 Feb 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (David Décary-Hetu)</author>
      <link>https://cybercrimeology.com/episodes/dark-data-scraping-studying-on-the-dark-web-publishing-on-the-open-web-2orD1dmo</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr David Décary-Hetu</p><p><a href="https://ddhetu.pubpub.org/">https://ddhetu.pubpub.org/</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/"><strong>https://dfir.science/</strong></a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>The Crim Archive.</p><p><a href="https://www.crimrxiv.com/">https://www.crimrxiv.com/</a></p><p>Human Cyber-Centric Cybersecurity Partnership</p><p><a href="https://www.hc2p.ca/">https://www.hc2p.ca/</a></p><p>Ouellet, Marie; Décary-Hétu, David; and Bergeron, Andréanne, "Cryptomarkets and the Returns to Criminal Experience" (2022). CSLF Articles. 3. <a href="https://scholarworks.gsu.edu/ays_cslf_articles/3">https://scholarworks.gsu.edu/ays_cslf_articles/3</a></p><p>David Décary-Hétu & Benoit Dupont (2012) The social network of hackers, Global Crime, 13:3, 160-175, DOI: <a href="https://doi.org/10.1080/17440572.2012.702523">10.1080/17440572.2012.702523</a></p><p>Flamand, C., & Décary-Hétu, D. (2019). The Open and Dark Web. <i>The Human Factor of Cybercrime</i>, 34-50.</p><p>Other:</p><p>My husky voice is as a result of testing how much my lung capacity has degraded as a result of covid-19 with a short work through metre deep snow. Turns out it has degraded a lot. If you have wondered if show shoes are worth the hassle, they absolutely are.  </p>
]]></content:encoded>
      <enclosure length="35964500" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/a235a3aa-9efe-4e4f-a7e9-31d51849e1d0/audio/8985d562-16ae-4d83-be1a-4730e052a5db/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Dark Data Scraping : Studying on the dark web, Publishing on the open web</itunes:title>
      <itunes:author>David Décary-Hetu</itunes:author>
      <itunes:duration>00:37:26</itunes:duration>
      <itunes:summary>We talk to Dr. David Décary-Hetu, associate professor at the University of Montreal about the Dark web,  how and why it is that we do research, gathering data with web crawlers and scrapers such as the DataCrypto tool David worked to develop and the complex problem of how to share research outcomes in a way that is both engaging and responsible in the modern era.  
Dr. James joins us again to answer one of my silly questions about digital forensics. I asked what happens when investigators encounters an encrypted phone or device. </itunes:summary>
      <itunes:subtitle>We talk to Dr. David Décary-Hetu, associate professor at the University of Montreal about the Dark web,  how and why it is that we do research, gathering data with web crawlers and scrapers such as the DataCrypto tool David worked to develop and the complex problem of how to share research outcomes in a way that is both engaging and responsible in the modern era.  
Dr. James joins us again to answer one of my silly questions about digital forensics. I asked what happens when investigators encounters an encrypted phone or device. </itunes:subtitle>
      <itunes:keywords>crime, research, cybercrime, publishing, big data, open science, web scraping, dark web, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c89dfb4b-83ea-42f7-88c3-92a2d4920acc</guid>
      <title>Safety by Design: Making Crime Unfriendly Tech with just 3 Principles</title>
      <description><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Bridget Harris</p><p><a href="https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris">https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Harris, B. (2021). Technology-enabled abuse: how'safety by design' can reduce stalking and domestic violence. <i>The Conversation</i>.</p><p><a href="https://theconversation.com/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636">https://theconversation.com/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636</a></p><p>Harris, B., & Woodlock, D. (2021). ‘For my safety’: experiences of technology-facilitated abuse among women with intellectual disability or cognitive disability.</p><p><a href="https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf">https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf</a></p><p>The Australian eSafety Commissioner</p><p><a href="https://www.esafety.gov.au/">https://www.esafety.gov.au/</a></p><p><a href="https://www.esafety.gov.au/industry/safety-by-design">https://www.esafety.gov.au/industry/safety-by-design</a></p><p>The eSafety Commissioner</p><p>Safety by Design (SbD)</p><p><a href="https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions">https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions</a></p><p><strong>Other:</strong></p><p>I said the allegory of motor vehicles was revealing. An allegory generally considered to be a story poem or picture with a symbolic meaning such as a moral point of view. Although it didn’t make the final edit there is something to be learned from the story of automobile safety is that safety requires regulation, standards and education and it can be effective.</p>
]]></description>
      <pubDate>Sat, 15 Jan 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Bridget Harris, Joshua James)</author>
      <link>https://cybercrimeology.com/episodes/safety-by-design-making-crime-unfriendly-tech-with-just-3-principles-60mWPzRJ</link>
      <content:encoded><![CDATA[<p><strong>About our Guests:</strong></p><p>Dr. Bridget Harris</p><p><a href="https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris">https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris</a></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><strong>Papers or resources mentioned in this article:</strong></p><p>Harris, B. (2021). Technology-enabled abuse: how'safety by design' can reduce stalking and domestic violence. <i>The Conversation</i>.</p><p><a href="https://theconversation.com/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636">https://theconversation.com/technology-enabled-abuse-how-safety-by-design-can-reduce-stalking-and-domestic-violence-170636</a></p><p>Harris, B., & Woodlock, D. (2021). ‘For my safety’: experiences of technology-facilitated abuse among women with intellectual disability or cognitive disability.</p><p><a href="https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf">https://apo.org.au/sites/default/files/resource-files/2021-09/apo-nid314044.pdf</a></p><p>The Australian eSafety Commissioner</p><p><a href="https://www.esafety.gov.au/">https://www.esafety.gov.au/</a></p><p><a href="https://www.esafety.gov.au/industry/safety-by-design">https://www.esafety.gov.au/industry/safety-by-design</a></p><p>The eSafety Commissioner</p><p>Safety by Design (SbD)</p><p><a href="https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions">https://www.esafety.gov.au/about-us/who-we-are/our-legislative-functions</a></p><p><strong>Other:</strong></p><p>I said the allegory of motor vehicles was revealing. An allegory generally considered to be a story poem or picture with a symbolic meaning such as a moral point of view. Although it didn’t make the final edit there is something to be learned from the story of automobile safety is that safety requires regulation, standards and education and it can be effective.</p>
]]></content:encoded>
      <enclosure length="29379914" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/65000da4-87f6-4fa6-ba45-0f07aa8cff86/audio/6b4e1490-d7b7-45a2-96e4-c8fb7f698414/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Safety by Design: Making Crime Unfriendly Tech with just 3 Principles</itunes:title>
      <itunes:author>Bridget Harris, Joshua James</itunes:author>
      <itunes:duration>00:30:35</itunes:duration>
      <itunes:summary>We are joined by  Dr Harris who is Senior Lecturer in the Faculty of Law at the Queensland University of Technology, Australia to talk about working with the eSafety Commissioner in Australia,  considerations for the safety regarding technology-facilitated abuse of women with intellectual disability or cognitive disabilities and how Safety by Design can make a difference in improving products and services such as Apple’s Airtags.    

Dr James joins us again to answer one of my silly questions about digital forensics. I asked why there are often backlogs for processing digital evidence.</itunes:summary>
      <itunes:subtitle>We are joined by  Dr Harris who is Senior Lecturer in the Faculty of Law at the Queensland University of Technology, Australia to talk about working with the eSafety Commissioner in Australia,  considerations for the safety regarding technology-facilitated abuse of women with intellectual disability or cognitive disabilities and how Safety by Design can make a difference in improving products and services such as Apple’s Airtags.    

Dr James joins us again to answer one of my silly questions about digital forensics. I asked why there are often backlogs for processing digital evidence.</itunes:subtitle>
      <itunes:keywords>airtags, safety by design, research, cybercrime, spyware, domestic violence, investigations, digital forensics, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dad5df93-050b-4c70-b61f-16aa97b94083</guid>
      <title>Twenty 22</title>
      <description><![CDATA[<p><strong>About Our Guests</strong></p><p><i>(In Order of Appearance) </i></p><p><strong>Dr. Jin Lee</strong>, </p><p><a href="https://cls.gmu.edu/people/jlee331">https://cls.gmu.edu/people/jlee331</a></p><p><strong>Dr. David Buil-Gil</strong></p><p><a href="https://www.research.manchester.ac.uk/portal/david.builgil.html">https://www.research.manchester.ac.uk/portal/david.builgil.html</a></p><p><strong>Dr. Bridget Harris</strong></p><p><a href="https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris">https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris</a></p><p><strong>and</strong></p><p><strong>Dr. Cathy Marcum </strong></p><p><a href="https://gjs.appstate.edu/directory/dr-cathy-marcum">https://gjs.appstate.edu/directory/dr-cathy-marcum</a></p><p> </p><p><strong>Other:</strong></p><p> I will be honest with you, the mix on this episode is a little rough, forgive me for rushing it a little. </p><p>'Bisney' isn't a word. 'Busy' is what I was aiming for there.   </p><p>This episode's track is called ONOSCOMOSOMO. They don't all get names, but this one did.</p><p> </p>
]]></description>
      <pubDate>Sat, 1 Jan 2022 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Jin Lee, David Buil-Gil, Bridget Harris, Cathy Marcum)</author>
      <link>https://cybercrimeology.com/episodes/twenty-22-Abb5ZnHw</link>
      <content:encoded><![CDATA[<p><strong>About Our Guests</strong></p><p><i>(In Order of Appearance) </i></p><p><strong>Dr. Jin Lee</strong>, </p><p><a href="https://cls.gmu.edu/people/jlee331">https://cls.gmu.edu/people/jlee331</a></p><p><strong>Dr. David Buil-Gil</strong></p><p><a href="https://www.research.manchester.ac.uk/portal/david.builgil.html">https://www.research.manchester.ac.uk/portal/david.builgil.html</a></p><p><strong>Dr. Bridget Harris</strong></p><p><a href="https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris">https://www.qut.edu.au/about/our-people/academic-profiles/bridget.harris</a></p><p><strong>and</strong></p><p><strong>Dr. Cathy Marcum </strong></p><p><a href="https://gjs.appstate.edu/directory/dr-cathy-marcum">https://gjs.appstate.edu/directory/dr-cathy-marcum</a></p><p> </p><p><strong>Other:</strong></p><p> I will be honest with you, the mix on this episode is a little rough, forgive me for rushing it a little. </p><p>'Bisney' isn't a word. 'Busy' is what I was aiming for there.   </p><p>This episode's track is called ONOSCOMOSOMO. They don't all get names, but this one did.</p><p> </p>
]]></content:encoded>
      <enclosure length="32904268" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1a91dc4b-d226-4d4b-a4c4-c4142b188559/audio/8c478a40-aac6-41fd-9af1-a2667b32ac95/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Twenty 22</itunes:title>
      <itunes:author>Jin Lee, David Buil-Gil, Bridget Harris, Cathy Marcum</itunes:author>
      <itunes:duration>00:34:15</itunes:duration>
      <itunes:summary>What happened and what can we hope for in 2022 ?  For this new year&apos;s day special episode we are joined by Dr Jin Lee, Assistant Professor at George Mason University; Dr David Buil-Gil, Lecturer at the University of Manchester; Dr Bridget Harris, Associate Professor at the Queensland University of Technology in Australia; and Dr Cathy Marcum Professor at Apalacian State University about what was notable in 2021 and what their hopes are for the new year. </itunes:summary>
      <itunes:subtitle>What happened and what can we hope for in 2022 ?  For this new year&apos;s day special episode we are joined by Dr Jin Lee, Assistant Professor at George Mason University; Dr David Buil-Gil, Lecturer at the University of Manchester; Dr Bridget Harris, Associate Professor at the Queensland University of Technology in Australia; and Dr Cathy Marcum Professor at Apalacian State University about what was notable in 2021 and what their hopes are for the new year. </itunes:subtitle>
      <itunes:keywords>data, 2021, research, conferences, cybercrime, publishing, 2022, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">29537a21-0479-4ec6-bae9-6cedb993e1b8</guid>
      <title>Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr Elisabeth Carter</p><p><a href="https://www.linkedin.com/in/elisabeth-carter-8b372444">https://www.linkedin.com/in/elisabeth-carter-8b372444</a></p><p><strong>Papers mentioned in this Episode:</strong></p><p>Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. <i>The British Journal of Criminology</i>, <i>61</i>(2), 283-302.</p><p><a href="https://doi.org/10.1093/bjc/azaa072">https://doi.org/10.1093/bjc/azaa072</a></p><p> </p><p>Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. <i>Essex Graduate Journal of Sociology</i>, <i>7</i>(1), 99-113.</p><p><a href="https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf">https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf</a></p><p> </p><p>Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. <i>Crime, Media, Culture</i>, <i>11</i>(2), 89-103.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310">https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310</a></p><p> </p><p>A Guide to Spotting Romance Fraudsters</p><p><a href="https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters?__cf_chl_captcha_tk__=oiTpR_PIj8ciaGJUyhOL3s2BLqyvaX5n6Lbx7yToJ1Q-1636989739-0-gaNycGzNCL0" target="_blank">https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters</a></p><p>TinEye is a reverse image search tool.  You can search with an image for other similar images. </p><p><a href="https://tineye.com/">https://tineye.com/</a></p><p>If you can't access that then, you can also reverse image search on google. </p><p>https://www.google.com/imghp?hl=en</p><p><strong>About our Expert Guest:</strong></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><a href="https://www.youtube.com/DFIRScience">https://www.youtube.com/DFIRScience</a></p><p> </p><p><strong>What we learned:</strong></p><p>What happens where there is a difference in analysis between digital forensics investigators ?</p><p>Like physical evidence there is little room for differences regarding the facts of a case.  There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes.  Using multiple tools that extract and analyze data from devices reduces the chance of this happening.  </p><p><strong>Other:</strong></p><p>Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for.   Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.  </p><p>This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.</p><p> </p>
]]></description>
      <pubDate>Wed, 15 Dec 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Elisabeth Carter)</author>
      <link>https://cybercrimeology.com/episodes/be-a-curious-romantic-understanding-how-romance-fraud-works-with-linguistic-analysis-NlE8JpR7</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr Elisabeth Carter</p><p><a href="https://www.linkedin.com/in/elisabeth-carter-8b372444">https://www.linkedin.com/in/elisabeth-carter-8b372444</a></p><p><strong>Papers mentioned in this Episode:</strong></p><p>Carter, E. (2021). Distort, extort, deceive and exploit: Exploring the inner workings of a romance fraud. <i>The British Journal of Criminology</i>, <i>61</i>(2), 283-302.</p><p><a href="https://doi.org/10.1093/bjc/azaa072">https://doi.org/10.1093/bjc/azaa072</a></p><p> </p><p>Carter, E. (2015). Laughing matters: A conversation analytic account the use of laughter by suspects and officers in the police interview. <i>Essex Graduate Journal of Sociology</i>, <i>7</i>(1), 99-113.</p><p><a href="https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf">https://bucks.repository.guildhe.ac.uk/id/eprint/9401/1/Carter,%20Elisabeth%20Laughing%20matters.pdf</a></p><p> </p><p>Carter, E. (2015). The anatomy of written scam communications: An empirical analysis. <i>Crime, Media, Culture</i>, <i>11</i>(2), 89-103.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310">https://journals.sagepub.com/doi/pdf/10.1177/1741659015572310</a></p><p> </p><p>A Guide to Spotting Romance Fraudsters</p><p><a href="https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters?__cf_chl_captcha_tk__=oiTpR_PIj8ciaGJUyhOL3s2BLqyvaX5n6Lbx7yToJ1Q-1636989739-0-gaNycGzNCL0" target="_blank">https://www.thamesvalley.police.uk/police-forces/thames-valley-police/areas/c/2020/a-guide-to-spotting-romance-fraudsters</a></p><p>TinEye is a reverse image search tool.  You can search with an image for other similar images. </p><p><a href="https://tineye.com/">https://tineye.com/</a></p><p>If you can't access that then, you can also reverse image search on google. </p><p>https://www.google.com/imghp?hl=en</p><p><strong>About our Expert Guest:</strong></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><a href="https://www.youtube.com/DFIRScience">https://www.youtube.com/DFIRScience</a></p><p> </p><p><strong>What we learned:</strong></p><p>What happens where there is a difference in analysis between digital forensics investigators ?</p><p>Like physical evidence there is little room for differences regarding the facts of a case.  There might be a different in explanation of the meaning of a piece of evidence depending on the story they are presenting. The tools are an instrument of interpreting the meaning of information on a device and tools can make mistakes.  Using multiple tools that extract and analyze data from devices reduces the chance of this happening.  </p><p><strong>Other:</strong></p><p>Thanks very much to my neighbours for assisting with the voice over for this episode. I do hope the human/furniture couples ballroom dancing and hollering team goes well in whichever competition you are preparing for.   Also thanks to my audio editing software for deciding to have a meltdown and give me the opportunity to do the final mastering twice.  </p><p>This episode's track is called 'curious diamonds'. Not all of the songs for podcast episodes get a name, but it did this time.</p><p> </p>
]]></content:encoded>
      <enclosure length="39511393" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/42770d9b-5c9a-4eec-a0da-ffd54ef033f4/audio/0916542b-66b6-479d-9901-0cab8c3755bd/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis</itunes:title>
      <itunes:author>Elisabeth Carter</itunes:author>
      <itunes:duration>00:41:08</itunes:duration>
      <itunes:summary> Dr Elisabeth Carter, Senior Lecturer in Criminology and Forensic Linguist at the University of Roehampton joins us to discuss romance fraud and the mechanisms that offenders use to victimize intelligent and rational people.  We discuss linguistic analysis, genre-mapping, coercive control and how we can help victims and those around them to reduce the harm of this form of crime. Dr James joins us again to answer another of my silly questions about digital forensics. </itunes:summary>
      <itunes:subtitle> Dr Elisabeth Carter, Senior Lecturer in Criminology and Forensic Linguist at the University of Roehampton joins us to discuss romance fraud and the mechanisms that offenders use to victimize intelligent and rational people.  We discuss linguistic analysis, genre-mapping, coercive control and how we can help victims and those around them to reduce the harm of this form of crime. Dr James joins us again to answer another of my silly questions about digital forensics. </itunes:subtitle>
      <itunes:keywords>crime, online crime, research, cybercrime, romance fraud, science, fraud, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b26fa89f-3a47-4e34-8bad-e158f7398d3e</guid>
      <title>Tearing down the cross-disciplinary wall : Creating a reference on Method, Ethics &amp; Data for Research</title>
      <description><![CDATA[<p><strong>About our Interview Guest:</strong></p><p>Dr Anita Lavorgna</p><p><a href="https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page">https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page</a></p><p> </p><p><strong>Papers and Publications Mentioned in this Episode:</strong></p><p>Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes : methodologies, ethics, and critical approaches. Palgrave Macmillan. <a href="https://doi.org/10.1007/978-3-030-74837-1">https://doi.org/10.1007/978-3-030-74837-1</a></p><p>This book contains the following major sections:</p><ul><li>Knowledge Production and Research Datafication in Cybercrime Research</li><li>Methodologies and Strategies for Cybercrime Research</li><li>Geographies and Cultures of Ethics in Cybercrime Research</li></ul><p> </p><p>Lavorgna, A., & Ugwudike, P. (2021). The datafication revolution in criminal justice: An empirical exploration of frames portraying data-driven technologies for crime prevention and control. <i>Big Data & Society</i>, <i>8</i>(2), 20539517211049670.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670">https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670</a></p><p> </p><p><strong>About our Expert Guest:</strong></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><a href="https://www.youtube.com/DFIRScience">https://www.youtube.com/DFIRScience</a></p><p> </p><p><strong>What we learned:</strong></p><p>What is the difference between digital evidence and physical evidence for investigators ?</p><p>Digital evidence always requires active interpretation because it is an abstract series of electrical symbols. Because of this, the interpretation is very important but very difficult. Unlike physical evidence, it can be tested and analyzed indefinitely because it can be copied perfectly, and the accuracy of copies can be verified with hashes.</p><p> </p><p><strong>Other:</strong></p><p>This episode's track is called 'surfing on white noise'. Not all of the songs for podcast episodes get a name, but it did this time.</p>
]]></description>
      <pubDate>Wed, 1 Dec 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Anita Lavorgna, Joshua James)</author>
      <link>https://cybercrimeology.com/episodes/tearing-down-the-cross-disciplinary-wall-creating-a-reference-on-method-ethics-data-for-research-Mek59MV1</link>
      <content:encoded><![CDATA[<p><strong>About our Interview Guest:</strong></p><p>Dr Anita Lavorgna</p><p><a href="https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page">https://www.southampton.ac.uk/sociology/about/staff/ai11n14.page</a></p><p> </p><p><strong>Papers and Publications Mentioned in this Episode:</strong></p><p>Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes : methodologies, ethics, and critical approaches. Palgrave Macmillan. <a href="https://doi.org/10.1007/978-3-030-74837-1">https://doi.org/10.1007/978-3-030-74837-1</a></p><p>This book contains the following major sections:</p><ul><li>Knowledge Production and Research Datafication in Cybercrime Research</li><li>Methodologies and Strategies for Cybercrime Research</li><li>Geographies and Cultures of Ethics in Cybercrime Research</li></ul><p> </p><p>Lavorgna, A., & Ugwudike, P. (2021). The datafication revolution in criminal justice: An empirical exploration of frames portraying data-driven technologies for crime prevention and control. <i>Big Data & Society</i>, <i>8</i>(2), 20539517211049670.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670">https://journals.sagepub.com/doi/pdf/10.1177/20539517211049670</a></p><p> </p><p><strong>About our Expert Guest:</strong></p><p>Dr. Joshua James</p><p><a href="https://dfir.science/">https://dfir.science/</a></p><p><a href="https://www.youtube.com/DFIRScience">https://www.youtube.com/DFIRScience</a></p><p> </p><p><strong>What we learned:</strong></p><p>What is the difference between digital evidence and physical evidence for investigators ?</p><p>Digital evidence always requires active interpretation because it is an abstract series of electrical symbols. Because of this, the interpretation is very important but very difficult. Unlike physical evidence, it can be tested and analyzed indefinitely because it can be copied perfectly, and the accuracy of copies can be verified with hashes.</p><p> </p><p><strong>Other:</strong></p><p>This episode's track is called 'surfing on white noise'. Not all of the songs for podcast episodes get a name, but it did this time.</p>
]]></content:encoded>
      <enclosure length="32890073" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/623f6e19-970f-498b-afcd-7dfae034927e/audio/0a5f1f59-5523-45df-a4a4-aefbf9967f53/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Tearing down the cross-disciplinary wall : Creating a reference on Method, Ethics &amp; Data for Research</itunes:title>
      <itunes:author>Anita Lavorgna, Joshua James</itunes:author>
      <itunes:duration>00:34:15</itunes:duration>
      <itunes:summary>Dr Anita Lavorgna  talks to us about the motivation behind and process for creating the book.  &quot;Researching cybercrimes : methodologies, ethics, and critical approaches.&quot; We discuss the importance of cross disciplinary work and the importance of a common language for cybercrime research. We also talk about global inclusivity, ethics, datafication and equitably approaching complementary methodologies for researching the socio-technical problem of cybercrime. Dr Joshua James also joins us to teach me something about Digital Forensics I probably should have already known. </itunes:summary>
      <itunes:subtitle>Dr Anita Lavorgna  talks to us about the motivation behind and process for creating the book.  &quot;Researching cybercrimes : methodologies, ethics, and critical approaches.&quot; We discuss the importance of cross disciplinary work and the importance of a common language for cybercrime research. We also talk about global inclusivity, ethics, datafication and equitably approaching complementary methodologies for researching the socio-technical problem of cybercrime. Dr Joshua James also joins us to teach me something about Digital Forensics I probably should have already known. </itunes:subtitle>
      <itunes:keywords>crime, writing, datafication, research, cybercrime, ethics, digital forensics, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">877a53ba-9182-40c3-95f0-79abf754df82</guid>
      <title>Knowing enough to be Dangerous: Podcasting for crime researchers</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr. Jerry Ratcliffe</p><p><a href="https://www.jratcliffe.net/">https://www.jratcliffe.net/</a></p><p>Reducing Crime, Podcast, Blog and Book</p><p><a href="https://www.reducingcrime.com/">https://www.reducingcrime.com/</a></p><p><strong>Other:</strong></p><p>The introduction at  the start of the episode is from the Prelinger archives at <a href="http://archive.org">archive.org</a>.</p>
]]></description>
      <pubDate>Mon, 15 Nov 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Jerry Ratcliffe)</author>
      <link>https://cybercrimeology.com/episodes/knowing-enough-to-be-dangerous-podcasting-for-crime-researchers-RNZrMqG1</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr. Jerry Ratcliffe</p><p><a href="https://www.jratcliffe.net/">https://www.jratcliffe.net/</a></p><p>Reducing Crime, Podcast, Blog and Book</p><p><a href="https://www.reducingcrime.com/">https://www.reducingcrime.com/</a></p><p><strong>Other:</strong></p><p>The introduction at  the start of the episode is from the Prelinger archives at <a href="http://archive.org">archive.org</a>.</p>
]]></content:encoded>
      <enclosure length="27856545" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/f8ff3f17-e451-4413-a671-88f24fd99749/audio/b8dde9da-0fd9-4195-8ca8-66429b1e387f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Knowing enough to be Dangerous: Podcasting for crime researchers</itunes:title>
      <itunes:author>Jerry Ratcliffe</itunes:author>
      <itunes:duration>00:29:00</itunes:duration>
      <itunes:summary>This is our fiftieth episode so we take the opportunity to ask how it is you make a good academic podcast about crime ?  We talk with Dr Jerry Ratcliffe, host of the Reducing Crime Podcast how he started his podcast, what podcast success looks like and his tips and thoughts on what is important for this format. </itunes:summary>
      <itunes:subtitle>This is our fiftieth episode so we take the opportunity to ask how it is you make a good academic podcast about crime ?  We talk with Dr Jerry Ratcliffe, host of the Reducing Crime Podcast how he started his podcast, what podcast success looks like and his tips and thoughts on what is important for this format. </itunes:subtitle>
      <itunes:keywords>crime, communication, research, academic, science, podcasting, education</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">208fe5e9-7d72-4510-8b5a-590a8529efcb</guid>
      <title>Dispatch CyberPolice or CyberSoldiers? The Complexities of High and Low Policing in Cyberspace</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr. Chad Whelan</p><p><a href="https://www.deakin.edu.au/about-deakin/people/chad-whelan#">https://www.deakin.edu.au/about-deakin/people/chad-whelan#</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. <i>Journal of criminology</i>, 00048658211003925.</p><p><a href="https://doi.org/10.1177%2F00048658211003925">https://doi.org/10.1177%2F00048658211003925</a></p><p><a href="https://papyrus.bib.umontreal.ca/xmlui/bitstream/handle/1866/24951/Dupont%20%26%20Whelan%202021%20Enhancing%20relationships.pdf?sequence=1">Manuscript available from the University of Montreal</a></p><p> </p><p><strong>Other:</strong></p><p><i>About the Darkside cybercrime group:</i></p><p><a href="https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/">https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/</a></p><p><a href="https://en.wikipedia.org/wiki/DarkSide_(hacking_group)">https://en.wikipedia.org/wiki/DarkSide_(hacking_group)</a></p><p><i>About the REvil  cybercrime group:</i></p><p><a href="https://en.wikipedia.org/wiki/REvil">https://en.wikipedia.org/wiki/REvil</a></p><p><i>Some technical information:</i></p><p><a href="https://unit42.paloaltonetworks.com/revil-threat-actors/ ">https://unit42.paloaltonetworks.com/revil-threat-actors/ </a></p><p><i>A timeline of some interesting developments related to this issue:</i></p><p>2021, May 14. </p><p><i>The moral underground? Ransomware operators retreat after Colonial Pipeline hack</i></p><p><a href="https://intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime">https://intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime</a></p><p>2021, June 7 .</p><p><i>Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside</i></p><p><a href="https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside">https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside</a></p><p>2021, July 20 </p><p><i>Operation Orcus Task Force Established To Fight Ransomware Gangs</i></p><p><a href="https://australiancybersecuritymagazine.com.au/operation-orcus-task-force-established-to-fight-ransomware-gangs/">https://australiancybersecuritymagazine.com.au/operation-orcus-task-force-established-to-fight-ransomware-gangs/</a></p><p>2021, Aug 5 </p><p>Ransomware Gangs and the Name Game Distraction</p><p><a href="https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/">https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/</a></p><p>2021, Oct 5. </p><p>NSA chief predicts U.S. will face ransomware ‘every single day’ for years to come ("Ransomware is a national security issue. I firmly believe that.”)</p><p><a href="https://therecord.media/nsa-chief-predicts-u-s-will-face-ransomware-every-single-day-for-years-to-come/">https://therecord.media/nsa-chief-predicts-u-s-will-face-ransomware-every-single-day-for-years-to-come/</a></p><p>2021, Oct 7.</p><p>Netherlands can use intelligence or armed forces to respond to ransomware attacks</p><p><a href="https://therecord.media/netherlands-can-use-intelligence-or-armed-forces-to-respond-to-ransomware-attacks/">https://therecord.media/netherlands-can-use-intelligence-or-armed-forces-to-respond-to-ransomware-attacks/</a></p><p>2021, Oct 11.</p><p>UK cyber head says Russia responsible for 'devastating' ransomware attacks</p><p><a href="https://www.bbc.co.uk/news/uk-58877433.amp">https://www.bbc.co.uk/news/uk-58877433.amp</a></p><p>2021, Oct 21. </p><p><i>Governments turn tables on ransomware gang REvil by pushing it offline</i></p><p><a href="https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/">https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/</a></p><p><i>2021, Oct 25. </i></p><p><i>Groove Calls for Cyberattacks on US as REvil Payback</i></p><p><a href="https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/">https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/</a></p><p><strong>Other Other:</strong></p><p>The intro for this was drawn from a 1968 film on the role of PSYOPS in assisting developing countries in cementing their shiny new system of government installed by the US called "Psychological Operations in Support of Internal Defense and Development Assistance Programs " which is in the Public Domain and available from <a href="https://archive.org/details/0095_Psychological_Operations_in_Support_of_Internal_Defense_and_Dev_07_21_47_00">https://archive.org/details/0095_Psychological_Operations_in_Support_of_Internal_Defense_and_Dev_07_21_47_00</a></p>
]]></description>
      <pubDate>Mon, 1 Nov 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Chat Whelan)</author>
      <link>https://cybercrimeology.com/episodes/dispatch-cyberpolice-or-cybersoldiers-the-complexities-of-high-and-low-policing-in-cyberspace-B95f2p1H</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr. Chad Whelan</p><p><a href="https://www.deakin.edu.au/about-deakin/people/chad-whelan#">https://www.deakin.edu.au/about-deakin/people/chad-whelan#</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>Dupont, B., & Whelan, C. (2021). Enhancing relationships between criminology and cybersecurity. <i>Journal of criminology</i>, 00048658211003925.</p><p><a href="https://doi.org/10.1177%2F00048658211003925">https://doi.org/10.1177%2F00048658211003925</a></p><p><a href="https://papyrus.bib.umontreal.ca/xmlui/bitstream/handle/1866/24951/Dupont%20%26%20Whelan%202021%20Enhancing%20relationships.pdf?sequence=1">Manuscript available from the University of Montreal</a></p><p> </p><p><strong>Other:</strong></p><p><i>About the Darkside cybercrime group:</i></p><p><a href="https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/">https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/</a></p><p><a href="https://en.wikipedia.org/wiki/DarkSide_(hacking_group)">https://en.wikipedia.org/wiki/DarkSide_(hacking_group)</a></p><p><i>About the REvil  cybercrime group:</i></p><p><a href="https://en.wikipedia.org/wiki/REvil">https://en.wikipedia.org/wiki/REvil</a></p><p><i>Some technical information:</i></p><p><a href="https://unit42.paloaltonetworks.com/revil-threat-actors/ ">https://unit42.paloaltonetworks.com/revil-threat-actors/ </a></p><p><i>A timeline of some interesting developments related to this issue:</i></p><p>2021, May 14. </p><p><i>The moral underground? Ransomware operators retreat after Colonial Pipeline hack</i></p><p><a href="https://intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime">https://intel471.com/blog/darkside-ransomware-shut-down-revil-avaddon-cybercrime</a></p><p>2021, June 7 .</p><p><i>Department of Justice Seizes $2.3 Million in Cryptocurrency Paid to the Ransomware Extortionists Darkside</i></p><p><a href="https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside">https://www.justice.gov/opa/pr/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside</a></p><p>2021, July 20 </p><p><i>Operation Orcus Task Force Established To Fight Ransomware Gangs</i></p><p><a href="https://australiancybersecuritymagazine.com.au/operation-orcus-task-force-established-to-fight-ransomware-gangs/">https://australiancybersecuritymagazine.com.au/operation-orcus-task-force-established-to-fight-ransomware-gangs/</a></p><p>2021, Aug 5 </p><p>Ransomware Gangs and the Name Game Distraction</p><p><a href="https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/">https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/</a></p><p>2021, Oct 5. </p><p>NSA chief predicts U.S. will face ransomware ‘every single day’ for years to come ("Ransomware is a national security issue. I firmly believe that.”)</p><p><a href="https://therecord.media/nsa-chief-predicts-u-s-will-face-ransomware-every-single-day-for-years-to-come/">https://therecord.media/nsa-chief-predicts-u-s-will-face-ransomware-every-single-day-for-years-to-come/</a></p><p>2021, Oct 7.</p><p>Netherlands can use intelligence or armed forces to respond to ransomware attacks</p><p><a href="https://therecord.media/netherlands-can-use-intelligence-or-armed-forces-to-respond-to-ransomware-attacks/">https://therecord.media/netherlands-can-use-intelligence-or-armed-forces-to-respond-to-ransomware-attacks/</a></p><p>2021, Oct 11.</p><p>UK cyber head says Russia responsible for 'devastating' ransomware attacks</p><p><a href="https://www.bbc.co.uk/news/uk-58877433.amp">https://www.bbc.co.uk/news/uk-58877433.amp</a></p><p>2021, Oct 21. </p><p><i>Governments turn tables on ransomware gang REvil by pushing it offline</i></p><p><a href="https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/">https://www.reuters.com/technology/exclusive-governments-turn-tables-ransomware-gang-revil-by-pushing-it-offline-2021-10-21/</a></p><p><i>2021, Oct 25. </i></p><p><i>Groove Calls for Cyberattacks on US as REvil Payback</i></p><p><a href="https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/">https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/</a></p><p><strong>Other Other:</strong></p><p>The intro for this was drawn from a 1968 film on the role of PSYOPS in assisting developing countries in cementing their shiny new system of government installed by the US called "Psychological Operations in Support of Internal Defense and Development Assistance Programs " which is in the Public Domain and available from <a href="https://archive.org/details/0095_Psychological_Operations_in_Support_of_Internal_Defense_and_Dev_07_21_47_00">https://archive.org/details/0095_Psychological_Operations_in_Support_of_Internal_Defense_and_Dev_07_21_47_00</a></p>
]]></content:encoded>
      <enclosure length="38803758" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/a1ffcd67-d075-4726-b7aa-3db34524e138/audio/44c462a0-66b9-4332-9166-f17e7ec0b3de/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Dispatch CyberPolice or CyberSoldiers? The Complexities of High and Low Policing in Cyberspace</itunes:title>
      <itunes:author>Chat Whelan</itunes:author>
      <itunes:duration>00:40:24</itunes:duration>
      <itunes:summary>What is cybercrime what is cybersecurity and who polices what? Dr Chad Whelan helps us to understand the nuanced and complex conversation about roles of high and low policing organizations in keeping us safe from cyber harms. We talk about cybersecurity, ransomware, national security and the nature of the competencies needed to address crime and secure the state. </itunes:summary>
      <itunes:subtitle>What is cybercrime what is cybersecurity and who polices what? Dr Chad Whelan helps us to understand the nuanced and complex conversation about roles of high and low policing organizations in keeping us safe from cyber harms. We talk about cybersecurity, ransomware, national security and the nature of the competencies needed to address crime and secure the state. </itunes:subtitle>
      <itunes:keywords>crime, darkside, research, cybercrime, criminology, ransomware, science, cybersecurity, policing, release the hounds, education, revil</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b0a8037-cfdd-46a5-af5f-b1c919aa1ac6</guid>
      <title>Red Flags: Supporting Seniors and a Nation victimized by Fraud</title>
      <description><![CDATA[<p><strong>About our Guest</strong></p><p>The Canadian Anti-Fraud Centre collects information on fraud and identity theft.</p><p><a href="https://www.antifraudcentre-centreantifraude.ca/index-eng.htm">https://www.antifraudcentre-centreantifraude.ca/index-eng.htm</a></p><p>The CAFC involves the <a href="https://www.rcmp-grc.gc.ca/en/home">Royal Canadian Mounted Police</a>, the <a href="https://www.competitionbureau.gc.ca/eic/site/cb-bc.nsf/eng/home">Competition Bureau Canada</a>, and the <a href="https://www.opp.ca/">Ontario Provincial Police </a> and recently come together with the <a href="https://cyber.gc.ca/en/">Canadian Centre for Cyber Security  </a>to fight fraud and cybercrime. </p><p><strong>Report Fraud</strong></p><p>Call the CAFC Toll free: 1-888-495-8501 <strong>Monday to Friday</strong>, from <strong>9 am to 4:45 pm</strong> (Eastern time) and close on holidays.</p><p>Online <a href="https://www.services.rcmp-grc.gc.ca/chooser-eng.html">with the RCMP </a></p><p><strong>Mentioned in this episode:</strong></p><p><strong>(KYC) Know Your Customer or Know Your Client</strong></p><p>Organizations that deal with large amounts of money are required to follow regulations related to the control of the proceeds of crime and terrorist financing. In Canada this is FINTRAC and you can find out more here.</p><p><a href="https://www.fintrac-canafe.gc.ca/guidance-directives/client-clientele/1-eng">https://www.fintrac-canafe.gc.ca/guidance-directives/client-clientele/1-eng</a></p><p>You can find out more about the KYC requirements of other countries here:</p><p><a href="https://en.wikipedia.org/wiki/Know_your_customer">https://en.wikipedia.org/wiki/Know_your_customer</a></p><p> </p><p><strong>Other:</strong></p><p>The introduction for this episode was from the film " How to Use the Dial Phone" By AT&T in 1927 and preserve by the Prelinger Archive at archive.org.<strong> </strong><a href="https://archive.org/details/HowtoUse1927">https://archive.org/details/HowtoUse1927</a></p><p>This was our 2 year anniversary. Yay Us.   </p>
]]></description>
      <pubDate>Fri, 15 Oct 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Carol Gilmour, Adrienne Whalen, Sergeant Guy Paul Larocque)</author>
      <link>https://cybercrimeology.com/episodes/red-flags-supporting-seniors-and-a-nation-victimized-by-fraud-zbIxoY1q</link>
      <content:encoded><![CDATA[<p><strong>About our Guest</strong></p><p>The Canadian Anti-Fraud Centre collects information on fraud and identity theft.</p><p><a href="https://www.antifraudcentre-centreantifraude.ca/index-eng.htm">https://www.antifraudcentre-centreantifraude.ca/index-eng.htm</a></p><p>The CAFC involves the <a href="https://www.rcmp-grc.gc.ca/en/home">Royal Canadian Mounted Police</a>, the <a href="https://www.competitionbureau.gc.ca/eic/site/cb-bc.nsf/eng/home">Competition Bureau Canada</a>, and the <a href="https://www.opp.ca/">Ontario Provincial Police </a> and recently come together with the <a href="https://cyber.gc.ca/en/">Canadian Centre for Cyber Security  </a>to fight fraud and cybercrime. </p><p><strong>Report Fraud</strong></p><p>Call the CAFC Toll free: 1-888-495-8501 <strong>Monday to Friday</strong>, from <strong>9 am to 4:45 pm</strong> (Eastern time) and close on holidays.</p><p>Online <a href="https://www.services.rcmp-grc.gc.ca/chooser-eng.html">with the RCMP </a></p><p><strong>Mentioned in this episode:</strong></p><p><strong>(KYC) Know Your Customer or Know Your Client</strong></p><p>Organizations that deal with large amounts of money are required to follow regulations related to the control of the proceeds of crime and terrorist financing. In Canada this is FINTRAC and you can find out more here.</p><p><a href="https://www.fintrac-canafe.gc.ca/guidance-directives/client-clientele/1-eng">https://www.fintrac-canafe.gc.ca/guidance-directives/client-clientele/1-eng</a></p><p>You can find out more about the KYC requirements of other countries here:</p><p><a href="https://en.wikipedia.org/wiki/Know_your_customer">https://en.wikipedia.org/wiki/Know_your_customer</a></p><p> </p><p><strong>Other:</strong></p><p>The introduction for this episode was from the film " How to Use the Dial Phone" By AT&T in 1927 and preserve by the Prelinger Archive at archive.org.<strong> </strong><a href="https://archive.org/details/HowtoUse1927">https://archive.org/details/HowtoUse1927</a></p><p>This was our 2 year anniversary. Yay Us.   </p>
]]></content:encoded>
      <enclosure length="41271297" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/108180bd-b9bf-42b7-a1ad-7ac448102436/audio/ae7ee896-8edd-4ee9-a30e-a8e512bb1a4e/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Red Flags: Supporting Seniors and a Nation victimized by Fraud</itunes:title>
      <itunes:author>Carol Gilmour, Adrienne Whalen, Sergeant Guy Paul Larocque</itunes:author>
      <itunes:duration>00:42:58</itunes:duration>
      <itunes:summary>Who are you going to call when you spot a fraud?  The Canadian Anti-Fraud Centre and the Senior Support Unit have been reducing the harm related to fraud for nearly 30 years.  Joining us to share about their work is Sergeant Guy Paul Larocque who is Acting Officer in Charge, Carol Gilmour  the Senior Support Unit Coordinator and SSU Senior Volunteer Adrienne Whalen. They share their thoughts about how best to work together to fight fraud and the experience of working at the front lines. </itunes:summary>
      <itunes:subtitle>Who are you going to call when you spot a fraud?  The Canadian Anti-Fraud Centre and the Senior Support Unit have been reducing the harm related to fraud for nearly 30 years.  Joining us to share about their work is Sergeant Guy Paul Larocque who is Acting Officer in Charge, Carol Gilmour  the Senior Support Unit Coordinator and SSU Senior Volunteer Adrienne Whalen. They share their thoughts about how best to work together to fight fraud and the experience of working at the front lines. </itunes:subtitle>
      <itunes:keywords>research, cybercrime, victims, fraud, canada, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c123dab1-a6ac-44dc-9f94-a7be2157d078</guid>
      <title>Smartphone Glass is always Tinted: The work of opening people&apos;s eyes to digital dangers</title>
      <description><![CDATA[<p><strong>About Our Guest</strong></p><p>Kara Brisson-Boivin</p><p><a href="https://mediasmarts.ca/about-us/staff#k_boivin">https://mediasmarts.ca/about-us/staff#k_boivin</a></p><p>MediaSmarts</p><p><a href="https://mediasmarts.ca/">https://mediasmarts.ca/</a></p><p>Take part in Cybersecurity Awareness Month Canada</p><p><a href="https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month">https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month</a></p><p><strong>Other</strong></p><p>The audio from the start of this episode is from a famous film called "Duck and Cover" available from the Prelinger archive online at <a href="http://archive.org">archive.org</a></p><p><a href="https://archive.org/details/DuckandC1951">https://archive.org/details/DuckandC1951</a></p><p> </p><p>Kara said I could use the title for the episode.  It is still hers though, you can ask her if you would like to use it somewhere. </p>
]]></description>
      <pubDate>Fri, 1 Oct 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/smartphone-glass-is-always-tinted-the-work-of-opening-peoples-eyes-to-digital-dangers-Fm5YJutk</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest</strong></p><p>Kara Brisson-Boivin</p><p><a href="https://mediasmarts.ca/about-us/staff#k_boivin">https://mediasmarts.ca/about-us/staff#k_boivin</a></p><p>MediaSmarts</p><p><a href="https://mediasmarts.ca/">https://mediasmarts.ca/</a></p><p>Take part in Cybersecurity Awareness Month Canada</p><p><a href="https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month">https://www.getcybersafe.gc.ca/en/cyber-security-awareness-month</a></p><p><strong>Other</strong></p><p>The audio from the start of this episode is from a famous film called "Duck and Cover" available from the Prelinger archive online at <a href="http://archive.org">archive.org</a></p><p><a href="https://archive.org/details/DuckandC1951">https://archive.org/details/DuckandC1951</a></p><p> </p><p>Kara said I could use the title for the episode.  It is still hers though, you can ask her if you would like to use it somewhere. </p>
]]></content:encoded>
      <enclosure length="31425346" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/0fe17518-55c9-408c-bc79-81804fe25863/audio/a0e141b4-73c6-4ae6-893a-1e9e55da24d1/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Smartphone Glass is always Tinted: The work of opening people&apos;s eyes to digital dangers</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:32:43</itunes:duration>
      <itunes:summary>We want to educate ourselves and our children to protect themselves from cybercrime, but we need tools to help us do that. We talk to Dr Kara Brisson-Boivin from MediaSmarts about how research is turned into teaching tools, the challenges that non-for-profits face and what we can do to develop the skills needed. </itunes:summary>
      <itunes:subtitle>We want to educate ourselves and our children to protect themselves from cybercrime, but we need tools to help us do that. We talk to Dr Kara Brisson-Boivin from MediaSmarts about how research is turned into teaching tools, the challenges that non-for-profits face and what we can do to develop the skills needed. </itunes:subtitle>
      <itunes:keywords>academia, research, cybercrime, youth, seta, fraud, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">241ffd6e-97de-4fdd-a419-e9e90fe4535b</guid>
      <title>E-Learning Talks and Puppy Walks: Police Training for Cybercrime</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr Tom Cockcroft</p><p><a href="https://www.leedsbeckett.ac.uk/staff/dr-tom-cockcroft/">https://www.leedsbeckett.ac.uk/staff/dr-tom-cockcroft/</a></p><p> </p><p><strong>Papers mentioned in this Episode:</strong></p><p>Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2021). Police cybercrime training: perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice, 15(1), 15-33.</p><p><a href="https://academic.oup.com/policing/article-abstract/15/1/15/5145767">https://academic.oup.com/policing/article-abstract/15/1/15/5145767</a></p><p>Cockcroft T (2020) Police Occupational Culture: Research and Practice. Bristol: Policy Press.</p><p>Cockcroft T (2012) Police culture: themes and concepts. Abingdon: Routledge.</p><p> </p><p><strong>Notes:</strong></p><p>The intro for this episode was from a 1951 film called "This is your Police Department" about the Detroit police department that romantically traces the training and career of a police officer in that city. Its available on the Prelinger archive.</p><p><a href="https://archive.org/details/ThisIsYo1951">https://archive.org/details/ThisIsYo1951</a></p>
]]></description>
      <pubDate>Wed, 15 Sep 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Tom Cockcroft)</author>
      <link>https://cybercrimeology.com/episodes/e-learning-talks-and-puppy-walks-police-training-for-cybercrime-iAk34JeZ</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p>Dr Tom Cockcroft</p><p><a href="https://www.leedsbeckett.ac.uk/staff/dr-tom-cockcroft/">https://www.leedsbeckett.ac.uk/staff/dr-tom-cockcroft/</a></p><p> </p><p><strong>Papers mentioned in this Episode:</strong></p><p>Cockcroft, T., Shan-A-Khuda, M., Schreuders, Z. C., & Trevorrow, P. (2021). Police cybercrime training: perceptions, pedagogy, and policy. Policing: A Journal of Policy and Practice, 15(1), 15-33.</p><p><a href="https://academic.oup.com/policing/article-abstract/15/1/15/5145767">https://academic.oup.com/policing/article-abstract/15/1/15/5145767</a></p><p>Cockcroft T (2020) Police Occupational Culture: Research and Practice. Bristol: Policy Press.</p><p>Cockcroft T (2012) Police culture: themes and concepts. Abingdon: Routledge.</p><p> </p><p><strong>Notes:</strong></p><p>The intro for this episode was from a 1951 film called "This is your Police Department" about the Detroit police department that romantically traces the training and career of a police officer in that city. Its available on the Prelinger archive.</p><p><a href="https://archive.org/details/ThisIsYo1951">https://archive.org/details/ThisIsYo1951</a></p>
]]></content:encoded>
      <enclosure length="39565568" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/929923e6-4211-4420-a69e-4d3cfc9d26ca/audio/6ccbbef3-b8a0-4e97-9258-12255aa02d35/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>E-Learning Talks and Puppy Walks: Police Training for Cybercrime</itunes:title>
      <itunes:author>Tom Cockcroft</itunes:author>
      <itunes:duration>00:41:12</itunes:duration>
      <itunes:summary>Why don&apos;t we just train the police to be better at cybercrime ? Dr Tom Cockcroft,  Reader in Criminology at Leeds Beckett University and author of &quot;Police Cybercrime Training: Perceptions, Pedagogy, and Policy&quot; helps us to better understand the issues around training the police and how to approach this issue of up-skilling for cybercrime.</itunes:summary>
      <itunes:subtitle>Why don&apos;t we just train the police to be better at cybercrime ? Dr Tom Cockcroft,  Reader in Criminology at Leeds Beckett University and author of &quot;Police Cybercrime Training: Perceptions, Pedagogy, and Policy&quot; helps us to better understand the issues around training the police and how to approach this issue of up-skilling for cybercrime.</itunes:subtitle>
      <itunes:keywords>funding, police, research, cybercrime, training, learning, policy, education</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">625e834c-032b-45e3-95a9-58c511de7591</guid>
      <title>Who moved my cheese: Engineering Smart farms, grids and AI</title>
      <description><![CDATA[<p><strong>About Our Guest</strong></p><p>The Smart CyberPhysical Systems Lab</p><p><a href="https://www.scpslab.org/">https://www.scpslab.org/</a></p><p> </p><p><strong>Resources Mentioned in this Episode</strong></p><p>Yazdinejad, A., Zolfaghari, B., Azmoodeh, A., Dehghantanha, A., Karimipour, H., Fraser, E., ... & Duncan, E. (2021). A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Applied Sciences, 11(16), 7518.</p><p><a href="https://www.mdpi.com/2076-3417/11/16/7518">https://www.mdpi.com/2076-3417/11/16/7518</a></p><p>You can watch their video for farmers here:</p><p><a href="https://www.youtube.com/watch?v=Ysv57jbMt7k">https://www.youtube.com/watch?v=Ysv57jbMt7k</a></p><p>Other:</p><p>The book "who moved my cheese?" is a good read if you would like to consider change and how to adapt. Everything is going to be connected to the internet and the cheese is going to move.</p><p><a href="https://en.wikipedia.org/wiki/Who_Moved_My_Cheese%3F">https://en.wikipedia.org/wiki/Who_Moved_My_Cheese%3F</a></p><p>I wanted to add a note of clarification here, I asked if Dr Karimipour had been toughened by her experiences. I said I don't like the term and that's becuase I don't see being 'toughened up' as a positive outcome. If you are forced to change by a situation that is still change by force and if that situation is created by discrimination then that is unacceptable in an equitable society.</p><p>I attempted to swap the phrase "a double edged sword" with "every rose has its thorns", I am not sure how well that went but perhaps it will catch one " thorns come with roses ? Something like that perhaps ?</p><p>The audio at the start of this episode was again from the Prelinger Archives at <a href="http://archive.org">archive.org</a>, a wonderful resources. Not the music though, that was courtesy of an MPC one, a Korg NTS-1 and a glass of Jamesons.</p>
]]></description>
      <pubDate>Wed, 1 Sep 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Hadis Karmipour)</author>
      <link>https://cybercrimeology.com/episodes/who-moved-my-cheese-engineering-smart-farms-grids-and-ai-OWhy1Zza</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest</strong></p><p>The Smart CyberPhysical Systems Lab</p><p><a href="https://www.scpslab.org/">https://www.scpslab.org/</a></p><p> </p><p><strong>Resources Mentioned in this Episode</strong></p><p>Yazdinejad, A., Zolfaghari, B., Azmoodeh, A., Dehghantanha, A., Karimipour, H., Fraser, E., ... & Duncan, E. (2021). A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures. Applied Sciences, 11(16), 7518.</p><p><a href="https://www.mdpi.com/2076-3417/11/16/7518">https://www.mdpi.com/2076-3417/11/16/7518</a></p><p>You can watch their video for farmers here:</p><p><a href="https://www.youtube.com/watch?v=Ysv57jbMt7k">https://www.youtube.com/watch?v=Ysv57jbMt7k</a></p><p>Other:</p><p>The book "who moved my cheese?" is a good read if you would like to consider change and how to adapt. Everything is going to be connected to the internet and the cheese is going to move.</p><p><a href="https://en.wikipedia.org/wiki/Who_Moved_My_Cheese%3F">https://en.wikipedia.org/wiki/Who_Moved_My_Cheese%3F</a></p><p>I wanted to add a note of clarification here, I asked if Dr Karimipour had been toughened by her experiences. I said I don't like the term and that's becuase I don't see being 'toughened up' as a positive outcome. If you are forced to change by a situation that is still change by force and if that situation is created by discrimination then that is unacceptable in an equitable society.</p><p>I attempted to swap the phrase "a double edged sword" with "every rose has its thorns", I am not sure how well that went but perhaps it will catch one " thorns come with roses ? Something like that perhaps ?</p><p>The audio at the start of this episode was again from the Prelinger Archives at <a href="http://archive.org">archive.org</a>, a wonderful resources. Not the music though, that was courtesy of an MPC one, a Korg NTS-1 and a glass of Jamesons.</p>
]]></content:encoded>
      <enclosure length="35072133" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/0efb2afc-0240-4f37-902c-80df591deb32/audio/da79f5a9-5e69-494d-a452-8ef2ff5a01c4/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Who moved my cheese: Engineering Smart farms, grids and AI</itunes:title>
      <itunes:author>Hadis Karmipour</itunes:author>
      <itunes:duration>00:36:31</itunes:duration>
      <itunes:summary>Dr Hadis Karmipour Director of the Smart-Cyber-Physcial Systems Lab joins us to talk about research and diversity in engineering and security for the cyber-physical systems that deliver us power, farm our food and increasingly service our modern world.   </itunes:summary>
      <itunes:subtitle>Dr Hadis Karmipour Director of the Smart-Cyber-Physcial Systems Lab joins us to talk about research and diversity in engineering and security for the cyber-physical systems that deliver us power, farm our food and increasingly service our modern world.   </itunes:subtitle>
      <itunes:keywords>smart grid, cyber-physical, research, cybercrime, iot, science, cybersecurity, operations technologies, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64a7b590-9ef9-481f-829f-9e633b91f67b</guid>
      <title>Vexing Validation Vectors: Password Creation Rules &amp; Game Design thinking</title>
      <description><![CDATA[<p><strong>About out Guest:</strong></p><p><a href="https://research.jcu.edu.au/portfolio/roberto.dillon/">https://research.jcu.edu.au/portfolio/roberto.dillon/</a></p><p> </p><p><strong>Papers Mentioned in this Episode</strong></p><p>Dillon, R., Chawla, S., Hristova, D., Göbl, B., & Jovicic, S. (2020). Password Policies vs. Usability: When Do Users Go “Bananas”?. In <i>2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</i> (pp. 148-153). <a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9343120&casa_token=PBqy9PI87s0AAAAA:FxcMcEsOyZC2pOczPzVfniLL15UP2XFlLLB5v1NG68X513tcRvVbhYrwZe5125Ve7DYx92p1Ks9H2g&tag=1">IEEE</a>.</p><p>Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A., Regenscheid, A. R., Burr, W. E., ... & Theofanos, M. F. (2017). Nist special publication 800-63b. digital identity guidelines: authentication and lifecycle management. <i>Bericht, NIST</i>.</p><p><a href="https://pages.nist.gov/800-63-3/sp800-63b.html">https://pages.nist.gov/800-63-3/sp800-63b.html</a></p><p> </p><p><strong>Other:</strong></p><p>Holiday from Rules? by Portafilms, part of the Prelinger archive available at archive.org. </p><p><a href="https://archive.org/details/Holidayf1959">https://archive.org/details/Holidayf1959</a></p><p> </p>
]]></description>
      <pubDate>Sun, 15 Aug 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/vexing-validation-vectors-password-creation-rules-game-design-thinking-DJLJQntH</link>
      <content:encoded><![CDATA[<p><strong>About out Guest:</strong></p><p><a href="https://research.jcu.edu.au/portfolio/roberto.dillon/">https://research.jcu.edu.au/portfolio/roberto.dillon/</a></p><p> </p><p><strong>Papers Mentioned in this Episode</strong></p><p>Dillon, R., Chawla, S., Hristova, D., Göbl, B., & Jovicic, S. (2020). Password Policies vs. Usability: When Do Users Go “Bananas”?. In <i>2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</i> (pp. 148-153). <a href="https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9343120&casa_token=PBqy9PI87s0AAAAA:FxcMcEsOyZC2pOczPzVfniLL15UP2XFlLLB5v1NG68X513tcRvVbhYrwZe5125Ve7DYx92p1Ks9H2g&tag=1">IEEE</a>.</p><p>Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A., Regenscheid, A. R., Burr, W. E., ... & Theofanos, M. F. (2017). Nist special publication 800-63b. digital identity guidelines: authentication and lifecycle management. <i>Bericht, NIST</i>.</p><p><a href="https://pages.nist.gov/800-63-3/sp800-63b.html">https://pages.nist.gov/800-63-3/sp800-63b.html</a></p><p> </p><p><strong>Other:</strong></p><p>Holiday from Rules? by Portafilms, part of the Prelinger archive available at archive.org. </p><p><a href="https://archive.org/details/Holidayf1959">https://archive.org/details/Holidayf1959</a></p><p> </p>
]]></content:encoded>
      <enclosure length="30295274" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/d0b7a7ed-7fa7-4a54-9aa7-21498afa6213/audio/4702afb1-fba3-401b-931b-e362e0014ff4/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Vexing Validation Vectors: Password Creation Rules &amp; Game Design thinking</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:31:33</itunes:duration>
      <itunes:summary>At what point do frustrating password rules start becoming a problem for computer security ? Dr Roberto Dillon, Associate Professor at James Cook University in Singapore talks to us about learning from the player centred approach from computer game design and a multi-disciplinary study that looked to find an optimal point between frustrating users with password creation restrictions and the resulting password strength.  </itunes:summary>
      <itunes:subtitle>At what point do frustrating password rules start becoming a problem for computer security ? Dr Roberto Dillon, Associate Professor at James Cook University in Singapore talks to us about learning from the player centred approach from computer game design and a multi-disciplinary study that looked to find an optimal point between frustrating users with password creation restrictions and the resulting password strength.  </itunes:subtitle>
      <itunes:keywords>passwords, crime, research, cybercrime, useable security, science, cybersecurity, game design, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0e88f52c-7826-4631-a861-67c1b0a58ac1</guid>
      <title>Every dạy dỗ more to prevent cybercrime.</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Fawn Ngo </p><p><a href="https://www.sarasotamanatee.usf.edu/academics/faculty-listing/dr-fawn-ngo.aspx">https://www.sarasotamanatee.usf.edu/academics/faculty-listing/dr-fawn-ngo.aspx</a></p><p>Papers Mentioned in this Episode:</p><p>Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. <i>International Journal of Cyber Criminology</i>, <i>5</i>(1), 773.</p><p><a href="https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context=cjp_facpub_sm">https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context=cjp_facpub_sm</a></p><p>Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. <i>Criminal Justice Review</i>, <i>45</i>(4), 430-451.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/0734016820934175?casa_token=Vt0COoV_h90AAAAA:kTqCfKrxt1gJxxbkX-7cX2lZPtHdLTt2koXK9bnTJAwlFvj3y4Gt-snnJN14xUWlfS5sK8y_RV6O5A">https://journals.sagepub.com/doi/pdf/10.1177/0734016820934175?casa_token=Vt0COoV_h90AAAAA:kTqCfKrxt1gJxxbkX-7cX2lZPtHdLTt2koXK9bnTJAwlFvj3y4Gt-snnJN14xUWlfS5sK8y_RV6O5A</a></p><p><strong>Other:</strong></p><p>The intro from this week was from the Prelinger archives and drew from an 1940s encyclopedia britannica film about immigration, and a Folgers coffee commercial. </p><p> </p>
]]></description>
      <pubDate>Sun, 1 Aug 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Fawn Ngo)</author>
      <link>https://cybercrimeology.com/episodes/every-dy-d-more-to-prevent-cybercrime-YoohRXAF</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Fawn Ngo </p><p><a href="https://www.sarasotamanatee.usf.edu/academics/faculty-listing/dr-fawn-ngo.aspx">https://www.sarasotamanatee.usf.edu/academics/faculty-listing/dr-fawn-ngo.aspx</a></p><p>Papers Mentioned in this Episode:</p><p>Ngo, F. T., & Paternoster, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. <i>International Journal of Cyber Criminology</i>, <i>5</i>(1), 773.</p><p><a href="https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context=cjp_facpub_sm">https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1015&context=cjp_facpub_sm</a></p><p>Ngo, F. T., Piquero, A. R., LaPrade, J., & Duong, B. (2020). Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. <i>Criminal Justice Review</i>, <i>45</i>(4), 430-451.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/0734016820934175?casa_token=Vt0COoV_h90AAAAA:kTqCfKrxt1gJxxbkX-7cX2lZPtHdLTt2koXK9bnTJAwlFvj3y4Gt-snnJN14xUWlfS5sK8y_RV6O5A">https://journals.sagepub.com/doi/pdf/10.1177/0734016820934175?casa_token=Vt0COoV_h90AAAAA:kTqCfKrxt1gJxxbkX-7cX2lZPtHdLTt2koXK9bnTJAwlFvj3y4Gt-snnJN14xUWlfS5sK8y_RV6O5A</a></p><p><strong>Other:</strong></p><p>The intro from this week was from the Prelinger archives and drew from an 1940s encyclopedia britannica film about immigration, and a Folgers coffee commercial. </p><p> </p>
]]></content:encoded>
      <enclosure length="31035664" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/1fac0de7-d82b-4cd1-a00c-5018983cfab4/audio/52e2b77c-b9cf-464a-ba38-20808224db63/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Every dạy dỗ more to prevent cybercrime.</itunes:title>
      <itunes:author>Fawn Ngo</itunes:author>
      <itunes:duration>00:32:18</itunes:duration>
      <itunes:summary>Dr Fawn Ngo inspires us to be more precise in the application of routine activities theory to cybercrime, and opens our eyes to a group that may have been overlooked and left without the knowledge they need to be protected agains cybercrime. </itunes:summary>
      <itunes:subtitle>Dr Fawn Ngo inspires us to be more precise in the application of routine activities theory to cybercrime, and opens our eyes to a group that may have been overlooked and left without the knowledge they need to be protected agains cybercrime. </itunes:subtitle>
      <itunes:keywords>crime, victimization, cybercrime, theory, science, vietnamese americans, immigrants, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2685a83f-9731-4c56-bc79-056876cbb9f9</guid>
      <title>This Podcast is Clean and Cared for: Crime Prevention through Digital Environment Design</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Daren Fisher</p><p><a href="https://www.citadel.edu/root/criminaljustice-faculty/193-academics/schools/shss/criminaljustice/24305-daren-fisher">https://www.citadel.edu/root/criminaljustice-faculty/193-academics/schools/shss/criminaljustice/24305-daren-fisher</a></p><p>Papers Mentioned in this Episode:</p><p>Fisher, D., Maimon, D., & Berenblum, T. (2021). Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment. <i>Security Journal</i>, 1-23.</p><p><a href="https://link.springer.com/article/10.1057/s41284-020-00282-y">https://link.springer.com/article/10.1057/s41284-020-00282-y</a></p><p>The death and life of great American cities by  Jane Jacobs;  Publisher: New York : Random House ©1961</p><p><a href="https://www.worldcat.org/title/death-and-life-of-great-american-cities/oclc/500754">https://www.worldcat.org/title/death-and-life-of-great-american-cities/oclc/500754</a></p><p><a href="https://en.wikipedia.org/wiki/The_Death_and_Life_of_Great_American_Cities">https://en.wikipedia.org/wiki/The_Death_and_Life_of_Great_American_Cities</a></p><p>You can learn more about the Maryland Scale for Scientific Evidence in this report Mapping the standards of evidence used in UK social Policy</p><p><a href="https://www.alliance4usefulevidence.org/assets/2018/05/Mapping-Standards-of-Evidence-A4UE-final.pdf">https://www.alliance4usefulevidence.org/assets/2018/05/Mapping-Standards-of-Evidence-A4UE-final.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>There were a fair few pops and clicks in the audio on this one, unfortunately that was the best I could do using automated tools.  I decided to leave it as is, the discussion was delightful and I was concerned that if  we re-recorded it would come out with the same flavour.  My apologies if it was too distracting, I hope you listened through until the end anyway as there was some good discussion there.  </p><p>This might be episode 42, and may as well be the answer to life the universe and everything but I still don't understand  the question and perhaps I never will.  </p><p> </p><p> </p>
]]></description>
      <pubDate>Thu, 15 Jul 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/this-podcast-is-clean-and-cared-for-crime-prevention-through-digital-environment-design-Yjz01SCl</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p>Dr Daren Fisher</p><p><a href="https://www.citadel.edu/root/criminaljustice-faculty/193-academics/schools/shss/criminaljustice/24305-daren-fisher">https://www.citadel.edu/root/criminaljustice-faculty/193-academics/schools/shss/criminaljustice/24305-daren-fisher</a></p><p>Papers Mentioned in this Episode:</p><p>Fisher, D., Maimon, D., & Berenblum, T. (2021). Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment. <i>Security Journal</i>, 1-23.</p><p><a href="https://link.springer.com/article/10.1057/s41284-020-00282-y">https://link.springer.com/article/10.1057/s41284-020-00282-y</a></p><p>The death and life of great American cities by  Jane Jacobs;  Publisher: New York : Random House ©1961</p><p><a href="https://www.worldcat.org/title/death-and-life-of-great-american-cities/oclc/500754">https://www.worldcat.org/title/death-and-life-of-great-american-cities/oclc/500754</a></p><p><a href="https://en.wikipedia.org/wiki/The_Death_and_Life_of_Great_American_Cities">https://en.wikipedia.org/wiki/The_Death_and_Life_of_Great_American_Cities</a></p><p>You can learn more about the Maryland Scale for Scientific Evidence in this report Mapping the standards of evidence used in UK social Policy</p><p><a href="https://www.alliance4usefulevidence.org/assets/2018/05/Mapping-Standards-of-Evidence-A4UE-final.pdf">https://www.alliance4usefulevidence.org/assets/2018/05/Mapping-Standards-of-Evidence-A4UE-final.pdf</a></p><p> </p><p><strong>Other:</strong></p><p>There were a fair few pops and clicks in the audio on this one, unfortunately that was the best I could do using automated tools.  I decided to leave it as is, the discussion was delightful and I was concerned that if  we re-recorded it would come out with the same flavour.  My apologies if it was too distracting, I hope you listened through until the end anyway as there was some good discussion there.  </p><p>This might be episode 42, and may as well be the answer to life the universe and everything but I still don't understand  the question and perhaps I never will.  </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="46154196" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/8a12e338-35ef-41c7-876c-cf069b870b7a/audio/a46a6798-3172-4f6b-b454-9a484277c76f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>This Podcast is Clean and Cared for: Crime Prevention through Digital Environment Design</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:48:04</itunes:duration>
      <itunes:summary>Can we prevent crime just by how we present virtual spaces and interfaces ? Dr Daren Fisher joins us to talk about Crime Prevention through Environmental Design and discuss research providing evidence for potential using these techniques to dissuade offenders online. </itunes:summary>
      <itunes:subtitle>Can we prevent crime just by how we present virtual spaces and interfaces ? Dr Daren Fisher joins us to talk about Crime Prevention through Environmental Design and discuss research providing evidence for potential using these techniques to dissuade offenders online. </itunes:subtitle>
      <itunes:keywords>academia, crime, design, cpted, crime prevention, research, cybercrime, science</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">88bdff03-bfc4-4ce2-b96e-b771195cd555</guid>
      <title>From Frankenstein to Hulk: Understanding Cybervictimology</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.shsu.edu/~icc_www/_inc/dir.php?mode=view&item=467">https://www.shsu.edu/~icc_www/_inc/dir.php?mode=view&item=467</a></p><p><a href="https://www.shsu.edu/today@sam/T@S/article/2020/victim-studies-chair">https://www.shsu.edu/today@sam/T@S/article/2020/victim-studies-chair</a></p><p> </p><p><strong>Papers Mentioned in this episode :</strong></p><p>Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). <i>Understanding victimology: an active-learning approach</i>. Routledge.</p><p><a href="https://www.routledge.com/Understanding-Victimology-An-Active-Learning-Approach/Clevenger-Navarro-Marcum-Higgins/p/book/9781498772846"><i>https://www.routledge.com/Understanding-Victimology-An-Active-Learning-Approach/Clevenger-Navarro-Marcum-Higgins/p/book/9781498772846</i></a></p><p> </p><p><a href="https://onlinelibrary.wiley.com/doi/pdf/10.1111/soc4.12639?casa_token=EFfeSQuYmFEAAAAA:u6_LFN8Bg-IHuUQ8jwyzUZbpBssMKAylWMG4uTI6WXoaYqzKofib43kBUS1TWa8lKoyMAatxG_DWSuiq">Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. <i>Sociology Compass</i>, <i>12</i>(12), e12639.</a></p><p>Clevenger, S., & Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. <i>The Palgrave Handbook of International Cybercrime and Cyberdeviance</i>, 1333-1351.</p><p><a href="https://link.springer.com/referenceworkentry/10.1007%2F978-3-319-78440-3_58">https://link.springer.com/referenceworkentry/10.1007%2F978-3-319-78440-3_58</a></p><p><strong>Other:</strong></p><p>Frankenstein; or, the Modern Prometheus 1818 by Mary Wollstonecraft (Godwin) Shelley</p><p><a href="https://www.gutenberg.org/files/84/84-h/84-h.htm">https://www.gutenberg.org/files/84/84-h/84-h.htm</a></p><p><a href="https://en.wikipedia.org/wiki/Captain_America">https://en.wikipedia.org/wiki/Captain_America</a></p><p><a href="https://en.wikipedia.org/wiki/The_Incredible_Hulk_(comic_book)">https://en.wikipedia.org/wiki/The_Incredible_Hulk_(comic_book)</a></p><p><a href="https://en.wikipedia.org/wiki/Squirrel_Girl">https://en.wikipedia.org/wiki/Squirrel_Girl</a></p><p>Clip at the start taken from the public domain film "Jesse James Meets Frankenstein's Daughter (1966)" online at <a href="https://publicdomainmovie.net/movie/jesse-james-meets-frankensteins-daughter-1966">https://publicdomainmovie.net/movie/jesse-james-meets-frankensteins-daughter-1966</a></p><p>Tiny clips from criminal minds used for an educative purpose.  </p>
]]></description>
      <pubDate>Thu, 1 Jul 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Shelly Clevenger)</author>
      <link>https://cybercrimeology.com/episodes/from-frankenstein-to-hulk-understanding-cybervictimology-PIHezoyv</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.shsu.edu/~icc_www/_inc/dir.php?mode=view&item=467">https://www.shsu.edu/~icc_www/_inc/dir.php?mode=view&item=467</a></p><p><a href="https://www.shsu.edu/today@sam/T@S/article/2020/victim-studies-chair">https://www.shsu.edu/today@sam/T@S/article/2020/victim-studies-chair</a></p><p> </p><p><strong>Papers Mentioned in this episode :</strong></p><p>Clevenger, S., Navarro, J. N., Marcum, C. D., & Higgins, G. E. (2018). <i>Understanding victimology: an active-learning approach</i>. Routledge.</p><p><a href="https://www.routledge.com/Understanding-Victimology-An-Active-Learning-Approach/Clevenger-Navarro-Marcum-Higgins/p/book/9781498772846"><i>https://www.routledge.com/Understanding-Victimology-An-Active-Learning-Approach/Clevenger-Navarro-Marcum-Higgins/p/book/9781498772846</i></a></p><p> </p><p><a href="https://onlinelibrary.wiley.com/doi/pdf/10.1111/soc4.12639?casa_token=EFfeSQuYmFEAAAAA:u6_LFN8Bg-IHuUQ8jwyzUZbpBssMKAylWMG4uTI6WXoaYqzKofib43kBUS1TWa8lKoyMAatxG_DWSuiq">Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. <i>Sociology Compass</i>, <i>12</i>(12), e12639.</a></p><p>Clevenger, S., & Gilliam, M. (2020). Intimate Partner Violence and the Internet: Perspectives. <i>The Palgrave Handbook of International Cybercrime and Cyberdeviance</i>, 1333-1351.</p><p><a href="https://link.springer.com/referenceworkentry/10.1007%2F978-3-319-78440-3_58">https://link.springer.com/referenceworkentry/10.1007%2F978-3-319-78440-3_58</a></p><p><strong>Other:</strong></p><p>Frankenstein; or, the Modern Prometheus 1818 by Mary Wollstonecraft (Godwin) Shelley</p><p><a href="https://www.gutenberg.org/files/84/84-h/84-h.htm">https://www.gutenberg.org/files/84/84-h/84-h.htm</a></p><p><a href="https://en.wikipedia.org/wiki/Captain_America">https://en.wikipedia.org/wiki/Captain_America</a></p><p><a href="https://en.wikipedia.org/wiki/The_Incredible_Hulk_(comic_book)">https://en.wikipedia.org/wiki/The_Incredible_Hulk_(comic_book)</a></p><p><a href="https://en.wikipedia.org/wiki/Squirrel_Girl">https://en.wikipedia.org/wiki/Squirrel_Girl</a></p><p>Clip at the start taken from the public domain film "Jesse James Meets Frankenstein's Daughter (1966)" online at <a href="https://publicdomainmovie.net/movie/jesse-james-meets-frankensteins-daughter-1966">https://publicdomainmovie.net/movie/jesse-james-meets-frankensteins-daughter-1966</a></p><p>Tiny clips from criminal minds used for an educative purpose.  </p>
]]></content:encoded>
      <enclosure length="28434908" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/bd08681e-1c96-4522-8cff-c4cd25936787/audio/558f8555-b7a6-4ad4-9746-14c5c2e0d1ba/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>From Frankenstein to Hulk: Understanding Cybervictimology</itunes:title>
      <itunes:author>Shelly Clevenger</itunes:author>
      <itunes:duration>00:29:36</itunes:duration>
      <itunes:summary>Dr Shelly Clevenger from Sam Houston State University joins us to help me understand victimology a little better. We discuss perspectives on victims of crimes through the lens of Dr Frankenstein, Capitan America and the Incredible Hulk.  We also try to understand how cybervictimology can be better placed in practice. </itunes:summary>
      <itunes:subtitle>Dr Shelly Clevenger from Sam Houston State University joins us to help me understand victimology a little better. We discuss perspectives on victims of crimes through the lens of Dr Frankenstein, Capitan America and the Incredible Hulk.  We also try to understand how cybervictimology can be better placed in practice. </itunes:subtitle>
      <itunes:keywords>capitan america, squirrel girl, intimate partner violence, research, frankenstein, cybercrime, cyber harrassment, hulk, cybersecurity, victimology, cybervictimology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f9ff6b1-d0a8-4982-8fc3-c778743d9e30</guid>
      <title>VIVA las villains: Exploring Cybercrime against Businesses</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.research.manchester.ac.uk/portal/david.builgil.html">https://www.research.manchester.ac.uk/portal/david.builgil.html</a></p><p><strong>Papers Mentioned in this Episode. </strong></p><p>Buil-Gil, D., Lord, N., & Barrett, E. (2021). The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention. Victims & Offenders, 16(3), 286-315. <a href="https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1814468">https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1814468</a><br /><br />Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior , 37(3), 263–280.<br /><a href="https://www.tandfonline.com/doi/full/10.1080/01639625.2015.1012409">https://www.tandfonline.com/doi/full/10.1080/01639625.2015.1012409</a><br /><br />Miró Llinares, F., & Johnson, S. D. (2017). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N.Bruinsma & S. D.Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press.<br /><a href="https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780190279707.001.0001/oxfordhb-9780190279707-e-39">https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780190279707.001.0001/oxfordhb-9780190279707-e-39</a><br /><br />Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology , 2(4), 407–427.<br /><a href="https://doi.org/10.1177/147737080556056">https://doi.org/10.1177/147737080556056</a><br /><br />Cyber Security Breaches Survey:<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8638">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8638</a> (2020)<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8480">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8480</a> (2019)<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8406">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8406</a> (2018)</p><p> </p><p><strong>Other:</strong></p><p>The except at the start is from a 1960s film on Safety by general Motors that is part of the Prelinger Archive, a most valuable resource and can be found here:</p><p><a href="https://archive.org/details/0257_Safest_Township_Anywhere_The_M04696_11_00_44_00">https://archive.org/details/0257_Safest_Township_Anywhere_The_M04696_11_00_44_00</a></p><p>The track segment at the end of the episode was made with a little <a href="https://www.korg.com/caen/products/dj/nts_1/">Korg NTS-1.</a>  What a wonderful time to be alive, when such things are obtainable and can make being stuck inside for fear of infection so much more bearable.  </p><p> </p>
]]></description>
      <pubDate>Tue, 15 Jun 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (David Buil-Gil)</author>
      <link>https://cybercrimeology.com/episodes/viva-las-villains-exploring-cybercrime-against-businesses-bqUDRQs2</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.research.manchester.ac.uk/portal/david.builgil.html">https://www.research.manchester.ac.uk/portal/david.builgil.html</a></p><p><strong>Papers Mentioned in this Episode. </strong></p><p>Buil-Gil, D., Lord, N., & Barrett, E. (2021). The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention. Victims & Offenders, 16(3), 286-315. <a href="https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1814468">https://www.tandfonline.com/doi/abs/10.1080/15564886.2020.1814468</a><br /><br />Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior , 37(3), 263–280.<br /><a href="https://www.tandfonline.com/doi/full/10.1080/01639625.2015.1012409">https://www.tandfonline.com/doi/full/10.1080/01639625.2015.1012409</a><br /><br />Miró Llinares, F., & Johnson, S. D. (2017). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N.Bruinsma & S. D.Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press.<br /><a href="https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780190279707.001.0001/oxfordhb-9780190279707-e-39">https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780190279707.001.0001/oxfordhb-9780190279707-e-39</a><br /><br />Yar, M. (2005). The novelty of ‘cybercrime’: An assessment in light of routine activity theory. European Journal of Criminology , 2(4), 407–427.<br /><a href="https://doi.org/10.1177/147737080556056">https://doi.org/10.1177/147737080556056</a><br /><br />Cyber Security Breaches Survey:<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8638">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8638</a> (2020)<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8480">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8480</a> (2019)<br /><a href="https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8406">https://beta.ukdataservice.ac.uk/datacatalogue/studies/study?id=8406</a> (2018)</p><p> </p><p><strong>Other:</strong></p><p>The except at the start is from a 1960s film on Safety by general Motors that is part of the Prelinger Archive, a most valuable resource and can be found here:</p><p><a href="https://archive.org/details/0257_Safest_Township_Anywhere_The_M04696_11_00_44_00">https://archive.org/details/0257_Safest_Township_Anywhere_The_M04696_11_00_44_00</a></p><p>The track segment at the end of the episode was made with a little <a href="https://www.korg.com/caen/products/dj/nts_1/">Korg NTS-1.</a>  What a wonderful time to be alive, when such things are obtainable and can make being stuck inside for fear of infection so much more bearable.  </p><p> </p>
]]></content:encoded>
      <enclosure length="46549361" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/28ab1b4c-4890-4b59-8839-a2596b02867e/audio/ebe0b161-ac3b-430e-b4b1-3f4860e9b754/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>VIVA las villains: Exploring Cybercrime against Businesses</itunes:title>
      <itunes:author>David Buil-Gil</itunes:author>
      <itunes:duration>00:48:28</itunes:duration>
      <itunes:summary>Dr David Buil Gil from the University of Manchester who I wanted to ask joins us to talk about about the paper &quot;The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention&quot; and so much more. </itunes:summary>
      <itunes:subtitle>Dr David Buil Gil from the University of Manchester who I wanted to ask joins us to talk about about the paper &quot;The Dynamics of Business, Cybersecurity and Cyber-Victimization: Foregrounding the Internal Guardian in Prevention&quot; and so much more. </itunes:subtitle>
      <itunes:keywords>statistics, uk, measurement error, research, cybercrime, sme, theory, science, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8644336f-92c6-4ee0-b3b2-6f3291d1b60c</guid>
      <title>Strained Dreams: Cybercrime and Institutional Anomie</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p>https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</p><p> </p><p><strong>Articles Mentioned in this Episode:</strong></p><p>Dearden, T. E., Parti, K., & Hawdon, J. (2021). Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online. Journal of Contemporary Criminal Justice, 10439862211001590.</p><p>Muftic, L. (2006). Advancing institutional anomie theory: A microlevel examination connecting culture, institutions, and deviance. International Journal of Offender Therapy and Comparative Criminology, 50(6), 630–653.</p><p> </p><p><strong>Other</strong></p><p>You should check out this book if these ideas were interesting:</p><p>Messner, S. F., & Rosenfeld, R. (1994). Crime and the American Dream </p><p>There are many new editions printed.  </p><p>Learn more about Skin Cancer here:</p><p>https://www.cancer.gov/types/skin</p><p>Seriously,  if you have spent anytime outside, make sure you are aware of skin cancer. Some forms of it might be rare, but it is anything but,  I know many many people both younger and older than me who have had them cut out. </p><p>The audio at the start of this episode was from a prelinger archive public domainfilm called "The Relaxed Wife", <a href="https://archive.org/details/RelaxedW1957">https://archive.org/details/RelaxedW1957.  </a></p><p>Pfizer started importing Atarax or Hydroxine into the US in the late 50s and promoted it with these kinds of films advocating that people just relax and stop worrying about things so much.   </p><p> </p><p> </p>
]]></description>
      <pubDate>Tue, 1 Jun 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/strained-dreams-cybercrime-and-institutional-anomie-r0CaPobM</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p>https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html</p><p> </p><p><strong>Articles Mentioned in this Episode:</strong></p><p>Dearden, T. E., Parti, K., & Hawdon, J. (2021). Institutional Anomie Theory and Cybercrime—Cybercrime and the American Dream, Now Available Online. Journal of Contemporary Criminal Justice, 10439862211001590.</p><p>Muftic, L. (2006). Advancing institutional anomie theory: A microlevel examination connecting culture, institutions, and deviance. International Journal of Offender Therapy and Comparative Criminology, 50(6), 630–653.</p><p> </p><p><strong>Other</strong></p><p>You should check out this book if these ideas were interesting:</p><p>Messner, S. F., & Rosenfeld, R. (1994). Crime and the American Dream </p><p>There are many new editions printed.  </p><p>Learn more about Skin Cancer here:</p><p>https://www.cancer.gov/types/skin</p><p>Seriously,  if you have spent anytime outside, make sure you are aware of skin cancer. Some forms of it might be rare, but it is anything but,  I know many many people both younger and older than me who have had them cut out. </p><p>The audio at the start of this episode was from a prelinger archive public domainfilm called "The Relaxed Wife", <a href="https://archive.org/details/RelaxedW1957">https://archive.org/details/RelaxedW1957.  </a></p><p>Pfizer started importing Atarax or Hydroxine into the US in the late 50s and promoted it with these kinds of films advocating that people just relax and stop worrying about things so much.   </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="32900849" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/c73eaed1-7f54-412f-8d80-bc1c5d00d676/audio/b2492a26-b775-469e-9643-9e83d0237777/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Strained Dreams: Cybercrime and Institutional Anomie</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:34:15</itunes:duration>
      <itunes:summary>Dr Thomas Dearden joins us for a wide-ranging chat about Strain theories, the American Dream, cybercrime and some of the  practicalities of inter-disciplinary research .</itunes:summary>
      <itunes:subtitle>Dr Thomas Dearden joins us for a wide-ranging chat about Strain theories, the American Dream, cybercrime and some of the  practicalities of inter-disciplinary research .</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a2b908d-5f64-4c59-99b0-e9460221b796</guid>
      <title>Dishonest Criminals: Disputes in Cybercriminal markets</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.benoitdupont.net/en/benoit/bio/">https://www.benoitdupont.net/en/benoit/bio/</a></p><p><strong>Articles Mentioned in this Episode:</strong></p><p>Dupont, B., & Lusthaus, J. (2021). Countering distrust in illicit online networks: the dispute resolution strategies of cybercriminals. Social science computer review, 0894439321994623.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/0894439321994623?casa_token=k6AMoVBDNwYAAAAA:hQWSXEoBVsFl1xnq6bu4L9jsAz3VhI8A-QzOg8FY6ijAWi5nyEPNQXmg2F6Z2or3HJgFNhRr-TtTQQ">https://journals.sagepub.com/doi/pdf/10.1177/0894439321994623?casa_token=k6AMoVBDNwYAAAAA:hQWSXEoBVsFl1xnq6bu4L9jsAz3VhI8A-QzOg8FY6ijAWi5nyEPNQXmg2F6Z2or3HJgFNhRr-TtTQQ</a></p><p>"Policing in the information age: technological errors of the past in perspective" is a chapter in</p><p>Enders, M., & Dupont, B. (Eds.). (2001). Policing the lucky country. Hawkins Press.</p><p><a href="http://books.google.com/books?hl=en&lr=&id=THpskGENKeEC&oi=fnd&pg=PA34&dq=info:m23vwOmMaUgJ:scholar.google.com&ots=15MvrMneT-&sig=KUn-qnNx0NXXy0QtisWl3NgIxaA">http://books.google.com/books?hl=en&lr=&id=THpskGENKeEC&oi=fnd&pg=PA34&dq=info:m23vwOmMaUgJ:scholar.google.com&ots=15MvrMneT-&sig=KUn-qnNx0NXXy0QtisWl3NgIxaA</a></p><p>Dr Dupont mentioned the work of Dr Gabriela Coleman, a book to read if you are interested is here:</p><p>Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso books.</p><p><strong>Other:</strong></p><p>We mentioned Xylitol, their blog can be found here:</p><p><a href="https://www.xylibox.com/2013/04/darkode-leak.html">https://www.xylibox.com/2013/04/darkode-leak.html</a></p><p> </p><p>Draw an iceberg and see how it will float </p><p><a href="https://joshdata.me/iceberger.html">https://joshdata.me/iceberger.html</a></p><p> </p><p>The sample from the start of this episode is from Kansas City Confidential</p><p><a href="https://publicdomainmovie.net/movie/kansas-city-confidential">https://publicdomainmovie.net/movie/kansas-city-confidential</a></p><p>I was very busy when I was editing this one so the sound is not quite smooth as it usually is. We used Zoom as well, and sometime it sounds like it has made an edit when it is managing bandwidth. So, Apologies for that. Also, I had allergies when doing the interviews, but it cleared up by the time I got to doing some inserts to help with the story flow, it sounds a little odd because of that. I wouldn't tell this to just anyone, but as you have been reading these show notes for so long I feel like we have gotten to be a little closer.</p>
]]></description>
      <pubDate>Sat, 15 May 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Benoit Dupont)</author>
      <link>https://cybercrimeology.com/episodes/dishonest-criminals-disputes-in-cybercriminal-markets-NOGbVuwR</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.benoitdupont.net/en/benoit/bio/">https://www.benoitdupont.net/en/benoit/bio/</a></p><p><strong>Articles Mentioned in this Episode:</strong></p><p>Dupont, B., & Lusthaus, J. (2021). Countering distrust in illicit online networks: the dispute resolution strategies of cybercriminals. Social science computer review, 0894439321994623.</p><p><a href="https://journals.sagepub.com/doi/pdf/10.1177/0894439321994623?casa_token=k6AMoVBDNwYAAAAA:hQWSXEoBVsFl1xnq6bu4L9jsAz3VhI8A-QzOg8FY6ijAWi5nyEPNQXmg2F6Z2or3HJgFNhRr-TtTQQ">https://journals.sagepub.com/doi/pdf/10.1177/0894439321994623?casa_token=k6AMoVBDNwYAAAAA:hQWSXEoBVsFl1xnq6bu4L9jsAz3VhI8A-QzOg8FY6ijAWi5nyEPNQXmg2F6Z2or3HJgFNhRr-TtTQQ</a></p><p>"Policing in the information age: technological errors of the past in perspective" is a chapter in</p><p>Enders, M., & Dupont, B. (Eds.). (2001). Policing the lucky country. Hawkins Press.</p><p><a href="http://books.google.com/books?hl=en&lr=&id=THpskGENKeEC&oi=fnd&pg=PA34&dq=info:m23vwOmMaUgJ:scholar.google.com&ots=15MvrMneT-&sig=KUn-qnNx0NXXy0QtisWl3NgIxaA">http://books.google.com/books?hl=en&lr=&id=THpskGENKeEC&oi=fnd&pg=PA34&dq=info:m23vwOmMaUgJ:scholar.google.com&ots=15MvrMneT-&sig=KUn-qnNx0NXXy0QtisWl3NgIxaA</a></p><p>Dr Dupont mentioned the work of Dr Gabriela Coleman, a book to read if you are interested is here:</p><p>Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous. Verso books.</p><p><strong>Other:</strong></p><p>We mentioned Xylitol, their blog can be found here:</p><p><a href="https://www.xylibox.com/2013/04/darkode-leak.html">https://www.xylibox.com/2013/04/darkode-leak.html</a></p><p> </p><p>Draw an iceberg and see how it will float </p><p><a href="https://joshdata.me/iceberger.html">https://joshdata.me/iceberger.html</a></p><p> </p><p>The sample from the start of this episode is from Kansas City Confidential</p><p><a href="https://publicdomainmovie.net/movie/kansas-city-confidential">https://publicdomainmovie.net/movie/kansas-city-confidential</a></p><p>I was very busy when I was editing this one so the sound is not quite smooth as it usually is. We used Zoom as well, and sometime it sounds like it has made an edit when it is managing bandwidth. So, Apologies for that. Also, I had allergies when doing the interviews, but it cleared up by the time I got to doing some inserts to help with the story flow, it sounds a little odd because of that. I wouldn't tell this to just anyone, but as you have been reading these show notes for so long I feel like we have gotten to be a little closer.</p>
]]></content:encoded>
      <enclosure length="35483582" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/9726253e-de31-454f-ae52-7afa3d930eac/audio/2ef8cc68-2eda-4761-98fd-fff029374ea4/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Dishonest Criminals: Disputes in Cybercriminal markets</itunes:title>
      <itunes:author>Benoit Dupont</itunes:author>
      <itunes:duration>00:36:56</itunes:duration>
      <itunes:summary>Dr Benoît Dupont joins us to talk about closed cybercrime markets and the mechanisms for trust and resolving disputes within these communities. </itunes:summary>
      <itunes:subtitle>Dr Benoît Dupont joins us to talk about closed cybercrime markets and the mechanisms for trust and resolving disputes within these communities. </itunes:subtitle>
      <itunes:keywords>crime, complaint, resolution, dispute, research, cybercrime, science, hackers, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">58821533-d240-4b5b-98ce-f270f3c3cc60</guid>
      <title>To put it bluntly: The unintended harms of cybersecurity</title>
      <description><![CDATA[<p><i>About our Guest:</i></p><p>Dr Yi Ting Chua:</p><p><a href="https://www.cl.cam.ac.uk/~ytc36/">https://www.cl.cam.ac.uk/~ytc36/</a></p><p><i>Papers Mentioned in this Episode:</i></p><p>Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/9037589">https://ieeexplore.ieee.org/abstract/document/9037589</a></p><p>Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours</p><p>Parkin, S., & Chua, Y. T. (2021, March). Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Springer.</p><p><a href="https://discovery.ucl.ac.uk/id/eprint/10112991/">https://discovery.ucl.ac.uk/id/eprint/10112991/</a></p><p><i>Other:</i></p><p>The voice at the start of the episode is from a video on increasing precision in the manufacture of automobiles at general motors from the 1960s. It is available at the valuable <a href="http://archive.org">archive.org</a> as part of the Prelinger archives.</p><p>I use Ikea FANTAST temperature probes, there are probably better ones out there, but these are cheap enough that I don't feel bad when they break.</p><p><a href="https://www.ikea.com/ca/en/p/fantast-meat-thermometer-timer-digital-black-80100406/">https://www.ikea.com/ca/en/p/fantast-meat-thermometer-timer-digital-black-80100406/</a></p>
]]></description>
      <pubDate>Sat, 1 May 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Yi Ting Chua)</author>
      <link>https://cybercrimeology.com/episodes/to-put-it-bluntly-the-unintended-harms-of-cybersecurity-osBfg66q</link>
      <content:encoded><![CDATA[<p><i>About our Guest:</i></p><p>Dr Yi Ting Chua:</p><p><a href="https://www.cl.cam.ac.uk/~ytc36/">https://www.cl.cam.ac.uk/~ytc36/</a></p><p><i>Papers Mentioned in this Episode:</i></p><p>Chua, Y. T., Parkin, S., Edwards, M., Oliveira, D., Schiffner, S., Tyson, G., & Hutchings, A. (2019, November). Identifying unintended harms of cybersecurity countermeasures. In 2019 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-15). IEEE.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/9037589">https://ieeexplore.ieee.org/abstract/document/9037589</a></p><p>Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours</p><p>Parkin, S., & Chua, Y. T. (2021, March). Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours. Springer.</p><p><a href="https://discovery.ucl.ac.uk/id/eprint/10112991/">https://discovery.ucl.ac.uk/id/eprint/10112991/</a></p><p><i>Other:</i></p><p>The voice at the start of the episode is from a video on increasing precision in the manufacture of automobiles at general motors from the 1960s. It is available at the valuable <a href="http://archive.org">archive.org</a> as part of the Prelinger archives.</p><p>I use Ikea FANTAST temperature probes, there are probably better ones out there, but these are cheap enough that I don't feel bad when they break.</p><p><a href="https://www.ikea.com/ca/en/p/fantast-meat-thermometer-timer-digital-black-80100406/">https://www.ikea.com/ca/en/p/fantast-meat-thermometer-timer-digital-black-80100406/</a></p>
]]></content:encoded>
      <enclosure length="23292532" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3d81c5e8-2d65-41e0-91e3-e5fd811c1330/audio/8619f04e-6c9f-4920-ae33-8d639d4362d8/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>To put it bluntly: The unintended harms of cybersecurity</itunes:title>
      <itunes:author>Yi Ting Chua</itunes:author>
      <itunes:duration>00:24:14</itunes:duration>
      <itunes:summary>Dr Yi Ting Chua joins us to talk about the unintended consequences that cybersecurity controls can have and provide a framework for recognizing the potential harms that can come from our benevolent intentions. </itunes:summary>
      <itunes:subtitle>Dr Yi Ting Chua joins us to talk about the unintended consequences that cybersecurity controls can have and provide a framework for recognizing the potential harms that can come from our benevolent intentions. </itunes:subtitle>
      <itunes:keywords>unintended consequences, risk management, research, cybercrime, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b455a522-e3df-4731-8f0d-2fcfe8ba0e24</guid>
      <title>Cybercriminals are People Too</title>
      <description><![CDATA[<p>About our Guest:</p><p>Dr. Jonathan Lusthaus</p><p><a href="https://www.sociology.ox.ac.uk/people/jonathan-lusthaus#/">https://www.sociology.ox.ac.uk/people/jonathan-lusthaus#/</a></p><p>Articles Mentioned in this episode:</p><p>Industry of Anonymity: Inside the Business of Cybercrime by Jonathan Lusthaus</p><p><a href="https://www.goodreads.com/book/show/38502106-industry-of-anonymity">https://www.goodreads.com/book/show/38502106-industry-of-anonymity</a></p><p>DarkMarket: Cyberthieves, Cybercops and You by Misha Glenny</p><p><a href="https://www.goodreads.com/book/show/11024696-darkmarket">https://www.goodreads.com/book/show/11024696-darkmarket</a></p><p>Jonathan Lusthaus (2012) Trust in the world of cybercrime, Global Crime, 13:2, 71-94, DOI: 10.1080/17440572.2012.674183</p><p><a href="https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.674183">https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.674183</a></p><p>J. Lusthaus, M. Bruce and N. Phair, "Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country," 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 2020, pp. 448-453, doi: 10.1109/EuroSPW51379.2020.00066.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/9229673">https://ieeexplore.ieee.org/abstract/document/9229673</a></p><p>Other:</p><p>Flappy Bird.</p><p><a href="https://en.wikipedia.org/wiki/Flappy_Bird">https://en.wikipedia.org/wiki/Flappy_Bird</a></p><p>The voice sample is from the Prelinger archive at archive.org. An important resource. </p><p>The song this week is called "Departed on Platform 2". I write all the songs we use on the show, I just thought you might like to know why I thought this one was appropriate for this episode.  </p><p> </p>
]]></description>
      <pubDate>Thu, 15 Apr 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Jonathan Lusthaus)</author>
      <link>https://cybercrimeology.com/episodes/cybercriminals-are-people-too-6UEm_huh</link>
      <content:encoded><![CDATA[<p>About our Guest:</p><p>Dr. Jonathan Lusthaus</p><p><a href="https://www.sociology.ox.ac.uk/people/jonathan-lusthaus#/">https://www.sociology.ox.ac.uk/people/jonathan-lusthaus#/</a></p><p>Articles Mentioned in this episode:</p><p>Industry of Anonymity: Inside the Business of Cybercrime by Jonathan Lusthaus</p><p><a href="https://www.goodreads.com/book/show/38502106-industry-of-anonymity">https://www.goodreads.com/book/show/38502106-industry-of-anonymity</a></p><p>DarkMarket: Cyberthieves, Cybercops and You by Misha Glenny</p><p><a href="https://www.goodreads.com/book/show/11024696-darkmarket">https://www.goodreads.com/book/show/11024696-darkmarket</a></p><p>Jonathan Lusthaus (2012) Trust in the world of cybercrime, Global Crime, 13:2, 71-94, DOI: 10.1080/17440572.2012.674183</p><p><a href="https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.674183">https://www.tandfonline.com/doi/abs/10.1080/17440572.2012.674183</a></p><p>J. Lusthaus, M. Bruce and N. Phair, "Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country," 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 2020, pp. 448-453, doi: 10.1109/EuroSPW51379.2020.00066.</p><p><a href="https://ieeexplore.ieee.org/abstract/document/9229673">https://ieeexplore.ieee.org/abstract/document/9229673</a></p><p>Other:</p><p>Flappy Bird.</p><p><a href="https://en.wikipedia.org/wiki/Flappy_Bird">https://en.wikipedia.org/wiki/Flappy_Bird</a></p><p>The voice sample is from the Prelinger archive at archive.org. An important resource. </p><p>The song this week is called "Departed on Platform 2". I write all the songs we use on the show, I just thought you might like to know why I thought this one was appropriate for this episode.  </p><p> </p>
]]></content:encoded>
      <enclosure length="36421483" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/12ee2429-0875-4171-b841-f6fa69907fb9/audio/fb623c94-f27e-4789-b2d6-adb14b2c9841/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercriminals are People Too</itunes:title>
      <itunes:author>Jonathan Lusthaus</itunes:author>
      <itunes:duration>00:37:56</itunes:duration>
      <itunes:summary>We talk with Dr Jonathan Lusthaus about how he came to research cybercriminals as people around the world and the impact that relationships, educational traditions and opportunity might have in pulling people toward a life of crime</itunes:summary>
      <itunes:subtitle>We talk with Dr Jonathan Lusthaus about how he came to research cybercriminals as people around the world and the impact that relationships, educational traditions and opportunity might have in pulling people toward a life of crime</itunes:subtitle>
      <itunes:keywords>anonymity, qualitative, research, criminals, cybercrime, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d71f606b-55d6-43d1-9f4b-3353986b8a71</guid>
      <title>Social Cybersecurity: How to BEND a universe</title>
      <description><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.cmu.edu/epp/people/faculty/kathleen-m-carley.html">https://www.cmu.edu/epp/people/faculty/kathleen-m-carley.html</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>Carley, K. M. (2020). Social cybersecurity: an emerging science. <i>Computational and Mathematical Organization Theory</i>, <i>26</i>(4), 365-381</p><p><a href="https://link.springer.com/article/10.1007/s10588-020-09322-9">https://link.springer.com/article/10.1007/s10588-020-09322-9</a></p><p>The Advertisement at the end was from the mid 1990s (1995) and was used to advertise the America Online (AOL) web service.  Even in Australia everyone ended up with dozens of AOL CDs that were supposed to help us get online somehow.  </p><p>The Audio from the start of the episode is from the Prelinger Archive.  A Movie from 1968 explaining the US perspective on the use of Psychological Operations (PsyOps) in another country to influence the feelings of the populace. </p><p>https://archive.org/details/Psycholo1968_2</p>
]]></description>
      <pubDate>Thu, 1 Apr 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Kathleen Carley)</author>
      <link>https://cybercrimeology.com/episodes/social-cybersecurity-how-to-bend-a-universe-Y782mCp5</link>
      <content:encoded><![CDATA[<p><strong>About our Guest:</strong></p><p><a href="https://www.cmu.edu/epp/people/faculty/kathleen-m-carley.html">https://www.cmu.edu/epp/people/faculty/kathleen-m-carley.html</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>Carley, K. M. (2020). Social cybersecurity: an emerging science. <i>Computational and Mathematical Organization Theory</i>, <i>26</i>(4), 365-381</p><p><a href="https://link.springer.com/article/10.1007/s10588-020-09322-9">https://link.springer.com/article/10.1007/s10588-020-09322-9</a></p><p>The Advertisement at the end was from the mid 1990s (1995) and was used to advertise the America Online (AOL) web service.  Even in Australia everyone ended up with dozens of AOL CDs that were supposed to help us get online somehow.  </p><p>The Audio from the start of the episode is from the Prelinger Archive.  A Movie from 1968 explaining the US perspective on the use of Psychological Operations (PsyOps) in another country to influence the feelings of the populace. </p><p>https://archive.org/details/Psycholo1968_2</p>
]]></content:encoded>
      <enclosure length="25524206" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3ee16c20-1618-4ffd-b072-142b81ec283f/audio/be2ec51c-bfce-4f71-93aa-71745249b230/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Social Cybersecurity: How to BEND a universe</itunes:title>
      <itunes:author>Kathleen Carley</itunes:author>
      <itunes:duration>00:26:35</itunes:duration>
      <itunes:summary>We talk with Dr Kathleen Carley about social cybersecurity and the challenges and promise of developing understandings and technologies on how to manage the safety of online discourse.    </itunes:summary>
      <itunes:subtitle>We talk with Dr Kathleen Carley about social cybersecurity and the challenges and promise of developing understandings and technologies on how to manage the safety of online discourse.    </itunes:subtitle>
      <itunes:keywords>social network, research, cybercrime, hate speech, criminology, science, cybersecurity, social, technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">89d222c0-cf03-4056-9a90-3553f3d228c1</guid>
      <title>Are you available .... for fraud?</title>
      <description><![CDATA[<p><strong>About our guest:</strong></p><p>Dr Olivier Ribaux.</p><p><a href="https://applicationspub.unil.ch/interpub/noauth/php/Un/UnPers.php?PerNum=922493&LanCode=37">https://applicationspub.unil.ch/interpub/noauth/php/Un/UnPers.php?PerNum=922493&LanCode=37</a></p><p><strong>Papers Mentioned in this Episode:</strong></p><p>Ribaux, O., & Souvignet, T. R. (2020). “Hello are you available?” Dealing with online frauds and the role of forensic science. Forensic Science International: Digital Investigation, 33, 300978.</p><p><a href="https://doi.org/10.1016/j.fsidi.2020.300978">https://doi.org/10.1016/j.fsidi.2020.300978</a></p><p><strong>Assistance with this episode provided by:</strong></p><p>Vicky Desjardins and Traian Toma from the CRPC (<a href="https://www.prevention-cybercrime.ca/etudiants-et-stagiaires-1">https://www.prevention-cybercrime.ca/etudiants-et-stagiaires-1</a>)</p><p>Louis Melançon from the University of McGill (<a href="https://lmelancon.net/a-propos/">https://lmelancon.net/a-propos/</a>)</p><p><strong>Other:</strong></p><p>I am aware that the sound of music was set in Austria but the two countries share a mountain range and I couldn't think of a better way to evince the feeling of grassy foothills, glacial lakes and packed lunches in wicker baskets.   </p><p> </p>
]]></description>
      <pubDate>Mon, 15 Mar 2021 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Vicky Desjardin, Louis Melançon, Olivier Ribaux, Traian Toma)</author>
      <link>https://cybercrimeology.com/episodes/are-you-available-for-fraud-9_DfjNQI</link>
      <content:encoded><![CDATA[<p><strong>About our guest:</strong></p><p>Dr Olivier Ribaux.</p><p><a href="https://applicationspub.unil.ch/interpub/noauth/php/Un/UnPers.php?PerNum=922493&LanCode=37">https://applicationspub.unil.ch/interpub/noauth/php/Un/UnPers.php?PerNum=922493&LanCode=37</a></p><p><strong>Papers Mentioned in this Episode:</strong></p><p>Ribaux, O., & Souvignet, T. R. (2020). “Hello are you available?” Dealing with online frauds and the role of forensic science. Forensic Science International: Digital Investigation, 33, 300978.</p><p><a href="https://doi.org/10.1016/j.fsidi.2020.300978">https://doi.org/10.1016/j.fsidi.2020.300978</a></p><p><strong>Assistance with this episode provided by:</strong></p><p>Vicky Desjardins and Traian Toma from the CRPC (<a href="https://www.prevention-cybercrime.ca/etudiants-et-stagiaires-1">https://www.prevention-cybercrime.ca/etudiants-et-stagiaires-1</a>)</p><p>Louis Melançon from the University of McGill (<a href="https://lmelancon.net/a-propos/">https://lmelancon.net/a-propos/</a>)</p><p><strong>Other:</strong></p><p>I am aware that the sound of music was set in Austria but the two countries share a mountain range and I couldn't think of a better way to evince the feeling of grassy foothills, glacial lakes and packed lunches in wicker baskets.   </p><p> </p>
]]></content:encoded>
      <enclosure length="35374704" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/98c18476-b28a-4e59-bf61-2f1f00a676ae/audio/387607eb-650b-42dd-955f-fd3424b4d887/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Are you available .... for fraud?</itunes:title>
      <itunes:author>Vicky Desjardin, Louis Melançon, Olivier Ribaux, Traian Toma</itunes:author>
      <itunes:duration>00:36:49</itunes:duration>
      <itunes:summary>What is it like to be the target of identity theft and have your identity in turn used to victimize those you are responsible for ? Dr. Olivier Ribaux shares his experience of dealing with a fraud crisis, and the insights that his background in digital forensics provides for researchers and academics both dealing with and researching fraud. Are academics at greater risk? How can we understand fraud in terms of forensic traces? What impact is Artificial Intelligence having on &apos;low tech&apos; fraud? How could we do better ? </itunes:summary>
      <itunes:subtitle>What is it like to be the target of identity theft and have your identity in turn used to victimize those you are responsible for ? Dr. Olivier Ribaux shares his experience of dealing with a fraud crisis, and the insights that his background in digital forensics provides for researchers and academics both dealing with and researching fraud. Are academics at greater risk? How can we understand fraud in terms of forensic traces? What impact is Artificial Intelligence having on &apos;low tech&apos; fraud? How could we do better ? </itunes:subtitle>
      <itunes:keywords>crime, experience, research, cybercrime, science, fraud, victim, digital forensics, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3af518d2-3751-44c5-bc8e-2353a7e6e255</guid>
      <title>Fraud Victims are no different to you.</title>
      <description><![CDATA[<p><strong>About Our Guest:</strong></p><p><a href="https://staff.qut.edu.au/staff/ca.cross">https://staff.qut.edu.au/staff/ca.cross</a></p><p><strong>Papers Mentioned in the Show</strong></p><p>Cassandra Cross & Thomas J. Holt (2021) The Use of Military Profiles in Romance Fraud Schemes, Victims & Offenders, 16:3, 385-406, DOI: 10.1080/15564886.2020.1850582</p><p>Cross, C. (2020). ‘Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, 20(3), 358–375. <a href="https://doi.org/10.1177/1748895819835910">https://doi.org/10.1177/1748895819835910</a></p><p>Cross, C. (2019), "Who is to blame? Exploring accountability in fraud victimisation", Journal of Criminological Research, Policy and Practice, Vol. 6 No. 1, pp. 35-48. <a href="https://doi.org/10.1108/JCRPP-07-2019-0054">https://doi.org/10.1108/JCRPP-07-2019-0054</a></p><p>Cassandra Cross, Molly Dragiewicz, Kelly Richards, Understanding Romance Fraud: Insights From Domestic Violence Research, The British Journal of Criminology, Volume 58, Issue 6, November 2018, Pages 1303–1322, <a href="https://doi.org/10.1093/bjc/azy005">https://doi.org/10.1093/bjc/azy005 </a></p><p> </p><p><strong>Other:</strong></p><p>Introduction voices are from the Prelinger Archives at archive.org.  </p><p>Bonus points are not redeemable for anything at all.  All the same, its still nice to get some points isn't it? </p><p> </p><p> </p><p> </p>
]]></description>
      <pubDate>Mon, 1 Mar 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/fraud-victims-are-no-different-to-you-B_O99wsE</link>
      <content:encoded><![CDATA[<p><strong>About Our Guest:</strong></p><p><a href="https://staff.qut.edu.au/staff/ca.cross">https://staff.qut.edu.au/staff/ca.cross</a></p><p><strong>Papers Mentioned in the Show</strong></p><p>Cassandra Cross & Thomas J. Holt (2021) The Use of Military Profiles in Romance Fraud Schemes, Victims & Offenders, 16:3, 385-406, DOI: 10.1080/15564886.2020.1850582</p><p>Cross, C. (2020). ‘Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, 20(3), 358–375. <a href="https://doi.org/10.1177/1748895819835910">https://doi.org/10.1177/1748895819835910</a></p><p>Cross, C. (2019), "Who is to blame? Exploring accountability in fraud victimisation", Journal of Criminological Research, Policy and Practice, Vol. 6 No. 1, pp. 35-48. <a href="https://doi.org/10.1108/JCRPP-07-2019-0054">https://doi.org/10.1108/JCRPP-07-2019-0054</a></p><p>Cassandra Cross, Molly Dragiewicz, Kelly Richards, Understanding Romance Fraud: Insights From Domestic Violence Research, The British Journal of Criminology, Volume 58, Issue 6, November 2018, Pages 1303–1322, <a href="https://doi.org/10.1093/bjc/azy005">https://doi.org/10.1093/bjc/azy005 </a></p><p> </p><p><strong>Other:</strong></p><p>Introduction voices are from the Prelinger Archives at archive.org.  </p><p>Bonus points are not redeemable for anything at all.  All the same, its still nice to get some points isn't it? </p><p> </p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="37981813" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/990305b9-5594-4b00-b230-e0e9887d0790/audio/d225d135-051f-4d93-a86e-1981d49f472e/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Fraud Victims are no different to you.</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:39:33</itunes:duration>
      <itunes:summary>This episode we talk with online fraud and its victims with Dr. Cassandra Cross. We discuss the victims and the profound impacts that fraud can have on their lives, beyond the loss of property. </itunes:summary>
      <itunes:subtitle>This episode we talk with online fraud and its victims with Dr. Cassandra Cross. We discuss the victims and the profound impacts that fraud can have on their lives, beyond the loss of property. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4d40e6bc-af64-410d-835c-5c2c0663e728</guid>
      <title>Browser Windows of opportunity: Cyberspace and Changes in Crime</title>
      <description><![CDATA[<p><strong>More about our Guest:</strong></p><p>Dr. Fernando Miró-Llinares</p><p><a href="https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html">https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html</a></p><p><strong>Papers mentioned in this Episode:</strong></p><p>Asier Moneva, Fernando Miró-Llinares & Timothy C. Hart (2020) Hunter or Prey? Exploring the Situational Profiles that Define Repeated Online Harassment Victims and Offenders, Deviant Behavior, DOI: 10.1080/01639625.2020.1746135</p><p>Miró-Llinares F., Moneva A. (2020) Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles. In: Holt T., Bossler A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. <a href="https://doi.org/10.1007/978-3-319-78440-3_30">https://doi.org/10.1007/978-3-319-78440-3_30</a></p><p>David Buil-Gil, Fernando Miró-Llinares, Asier Moneva, Steven Kemp & Nacho Díaz-Castaño (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK, European Societies, DOI: 10.1080/14616696.2020.1804973</p><p>Kemp, S., Miró-Llinares, F. & Moneva, A. The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain. Eur J Crim Policy Res 26, 293–312 (2020). <a href="https://doi.org/10.1007/s10610-020-09439-2">https://doi.org/10.1007/s10610-020-09439-2</a></p><p>Farrell, G., Birks, D. Did cybercrime cause the crime drop?. Crime Sci 7, 8 (2018). <a href="https://doi.org/10.1186/s40163-018-0082-8">https://doi.org/10.1186/s40163-018-0082-8</a></p><p>Miró-Llinares, F., Moneva, A. What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Sci 8, 12 (2019). <a href="https://doi.org/10.1186/s40163-019-0107-y">https://doi.org/10.1186/s40163-019-0107-y</a></p><p>Farrell, G., & Birks, D. (2020). Further rejection of the cybercrime hypothesis. Crime Science, 9, 1-4.<a href="https://doi.org/10.1186/s40163-020-00113-w">https://doi.org/10.1186/s40163-020-00113-w</a></p><p><strong>Other:</strong></p><p>The introduction referenced the Spanish dubbed version of the 1983 movie "Juegos de guerra" or "War Games" a Metro-Goldwin Mayer film that is available for streaming online from <a href="https://www.mgm.com/">MGM</a>.</p><p>You can play dig dug from 1983 online here: <a href="https://archive.org/details/msdos_Dig_Dug_1983">https://archive.org/details/msdos_Dig_Dug_1983</a></p>
]]></description>
      <pubDate>Mon, 15 Feb 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/browser-windows-of-opportunity-cyberspace-and-changes-in-crime-hFRgoOfl</link>
      <content:encoded><![CDATA[<p><strong>More about our Guest:</strong></p><p>Dr. Fernando Miró-Llinares</p><p><a href="https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html">https://www.umh.es/contenido/Estudiantes/:persona_27957/datos_es.html</a></p><p><strong>Papers mentioned in this Episode:</strong></p><p>Asier Moneva, Fernando Miró-Llinares & Timothy C. Hart (2020) Hunter or Prey? Exploring the Situational Profiles that Define Repeated Online Harassment Victims and Offenders, Deviant Behavior, DOI: 10.1080/01639625.2020.1746135</p><p>Miró-Llinares F., Moneva A. (2020) Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles. In: Holt T., Bossler A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. <a href="https://doi.org/10.1007/978-3-319-78440-3_30">https://doi.org/10.1007/978-3-319-78440-3_30</a></p><p>David Buil-Gil, Fernando Miró-Llinares, Asier Moneva, Steven Kemp & Nacho Díaz-Castaño (2020) Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK, European Societies, DOI: 10.1080/14616696.2020.1804973</p><p>Kemp, S., Miró-Llinares, F. & Moneva, A. The Dark Figure and the Cyber Fraud Rise in Europe: Evidence from Spain. Eur J Crim Policy Res 26, 293–312 (2020). <a href="https://doi.org/10.1007/s10610-020-09439-2">https://doi.org/10.1007/s10610-020-09439-2</a></p><p>Farrell, G., Birks, D. Did cybercrime cause the crime drop?. Crime Sci 7, 8 (2018). <a href="https://doi.org/10.1186/s40163-018-0082-8">https://doi.org/10.1186/s40163-018-0082-8</a></p><p>Miró-Llinares, F., Moneva, A. What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”. Crime Sci 8, 12 (2019). <a href="https://doi.org/10.1186/s40163-019-0107-y">https://doi.org/10.1186/s40163-019-0107-y</a></p><p>Farrell, G., & Birks, D. (2020). Further rejection of the cybercrime hypothesis. Crime Science, 9, 1-4.<a href="https://doi.org/10.1186/s40163-020-00113-w">https://doi.org/10.1186/s40163-020-00113-w</a></p><p><strong>Other:</strong></p><p>The introduction referenced the Spanish dubbed version of the 1983 movie "Juegos de guerra" or "War Games" a Metro-Goldwin Mayer film that is available for streaming online from <a href="https://www.mgm.com/">MGM</a>.</p><p>You can play dig dug from 1983 online here: <a href="https://archive.org/details/msdos_Dig_Dug_1983">https://archive.org/details/msdos_Dig_Dug_1983</a></p>
]]></content:encoded>
      <enclosure length="38846833" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/9409e9b5-4b81-434f-9abb-4227997d3aa0/audio/7476e0c9-f141-49e6-aca4-12b94d698070/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Browser Windows of opportunity: Cyberspace and Changes in Crime</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:40:27</itunes:duration>
      <itunes:summary>Dr. Fernando Miró-Llinares joins us to talk about the complicated intersection of crime and place in cyberspace and meatspace and how environmental criminology can offer insights into crime online.  </itunes:summary>
      <itunes:subtitle>Dr. Fernando Miró-Llinares joins us to talk about the complicated intersection of crime and place in cyberspace and meatspace and how environmental criminology can offer insights into crime online.  </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1ab7ff37-24a3-448d-9236-fd22a3e51c1a</guid>
      <title>Questioning Advice: Rethinking Cybercrime Education</title>
      <description><![CDATA[<p>Show Notes:</p><p>Elissa Redmiles:</p><p><a href="https://www.cs.umd.edu/~eredmiles/">https://www.cs.umd.edu/~eredmiles/</a></p><p>Papers Mentioned in this Episode.</p><p>Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016, October). How i learned to be secure: a census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 666-677).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/2976749.2978307">https://dl.acm.org/doi/abs/10.1145/2976749.2978307</a></p><p>Redmiles, E. M., Kross, S., & Mazurek, M. L. (2017, May). Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931-936).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3025453.3025673">https://dl.acm.org/doi/abs/10.1145/3025453.3025673</a></p><p>Redmiles, E. M., Warford, N., Jayanti, A., Koneru, A., Kross, S., Morales, M., ... & Mazurek, M. L. (2020). A comprehensive quality evaluation of security and privacy advice on the web. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 89-108).</p><p><a href="https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles">https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles</a></p><p>Redmiles, E. M., Mazurek, M. L., & Dickerson, J. P. (2018, June). Dancing pigs or externalities? measuring the rationality of security decisions. In Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 215-232).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3219166.3219185">https://dl.acm.org/doi/abs/10.1145/3219166.3219185</a></p><p>Redmiles, E. M. (2019). Quality and Inequity in Digital Security Education (Doctoral dissertation).</p><p><a href="https://drum.lib.umd.edu/handle/1903/25404">https://drum.lib.umd.edu/handle/1903/25404</a></p><p>The Evening statesman., March 20, 1906, Page TWO</p><p><a href="https://chroniclingamerica.loc.gov/lccn/sn88085421/1906-03-20/ed-1/seq-2/#date1=1777&index=4&rows=20&words=Prisoner+prisoner+Spanish&searchType=basic&sequence=0&state=&date2=1963&proxtext=Spanish+Prisoner&y=0&x=0&dateFilterType=yearRange&page=1">https://chroniclingamerica.loc.gov/lccn/sn88085421/1906-03-20/ed-1/seq-2/#date1=1777&index=4&rows=20&words=Prisoner+prisoner+Spanish&searchType=basic&sequence=0&state=&date2=1963&proxtext=Spanish+Prisoner&y=0&x=0&dateFilterType=yearRange&page=1</a></p><p>This scam was about Spanish prisoner fraud, which is an old form of advance fee fraud.  You can see an example of one from 1903  that is being sold from an action house here:</p><p><a href="https://www.pbagalleries.com/images/lot/1209/12090_0.jpg">https://www.pbagalleries.com/images/lot/1209/12090_0.jpg</a></p><p>Probably the first record of these is in a New York Times articles titled "<i>AN OLD SWINDLE REVIVED", from </i>Dec. 26, 1878 </p><p><strong>Read more here:</strong></p><p>https://www.atlasobscura.com/articles/the-9-lives-of-the-spanish-prisoner-the-treasure-dangling-scam-that-wont-die</p><p> </p><p>This episodes music samples old traffic safety videos found at the Prelinger Archives available at archive.org. </p>
]]></description>
      <pubDate>Mon, 1 Feb 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Elissa Redmiles)</author>
      <link>https://cybercrimeology.com/episodes/questioning-advice-rethinking-cybercrime-education-ZTXQKe2h</link>
      <content:encoded><![CDATA[<p>Show Notes:</p><p>Elissa Redmiles:</p><p><a href="https://www.cs.umd.edu/~eredmiles/">https://www.cs.umd.edu/~eredmiles/</a></p><p>Papers Mentioned in this Episode.</p><p>Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016, October). How i learned to be secure: a census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 666-677).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/2976749.2978307">https://dl.acm.org/doi/abs/10.1145/2976749.2978307</a></p><p>Redmiles, E. M., Kross, S., & Mazurek, M. L. (2017, May). Where is the digital divide? a survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931-936).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3025453.3025673">https://dl.acm.org/doi/abs/10.1145/3025453.3025673</a></p><p>Redmiles, E. M., Warford, N., Jayanti, A., Koneru, A., Kross, S., Morales, M., ... & Mazurek, M. L. (2020). A comprehensive quality evaluation of security and privacy advice on the web. In 29th {USENIX} Security Symposium ({USENIX} Security 20) (pp. 89-108).</p><p><a href="https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles">https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles</a></p><p>Redmiles, E. M., Mazurek, M. L., & Dickerson, J. P. (2018, June). Dancing pigs or externalities? measuring the rationality of security decisions. In Proceedings of the 2018 ACM Conference on Economics and Computation (pp. 215-232).</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3219166.3219185">https://dl.acm.org/doi/abs/10.1145/3219166.3219185</a></p><p>Redmiles, E. M. (2019). Quality and Inequity in Digital Security Education (Doctoral dissertation).</p><p><a href="https://drum.lib.umd.edu/handle/1903/25404">https://drum.lib.umd.edu/handle/1903/25404</a></p><p>The Evening statesman., March 20, 1906, Page TWO</p><p><a href="https://chroniclingamerica.loc.gov/lccn/sn88085421/1906-03-20/ed-1/seq-2/#date1=1777&index=4&rows=20&words=Prisoner+prisoner+Spanish&searchType=basic&sequence=0&state=&date2=1963&proxtext=Spanish+Prisoner&y=0&x=0&dateFilterType=yearRange&page=1">https://chroniclingamerica.loc.gov/lccn/sn88085421/1906-03-20/ed-1/seq-2/#date1=1777&index=4&rows=20&words=Prisoner+prisoner+Spanish&searchType=basic&sequence=0&state=&date2=1963&proxtext=Spanish+Prisoner&y=0&x=0&dateFilterType=yearRange&page=1</a></p><p>This scam was about Spanish prisoner fraud, which is an old form of advance fee fraud.  You can see an example of one from 1903  that is being sold from an action house here:</p><p><a href="https://www.pbagalleries.com/images/lot/1209/12090_0.jpg">https://www.pbagalleries.com/images/lot/1209/12090_0.jpg</a></p><p>Probably the first record of these is in a New York Times articles titled "<i>AN OLD SWINDLE REVIVED", from </i>Dec. 26, 1878 </p><p><strong>Read more here:</strong></p><p>https://www.atlasobscura.com/articles/the-9-lives-of-the-spanish-prisoner-the-treasure-dangling-scam-that-wont-die</p><p> </p><p>This episodes music samples old traffic safety videos found at the Prelinger Archives available at archive.org. </p>
]]></content:encoded>
      <enclosure length="30245005" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/3f59d3b8-75c7-4ea1-bcbe-108ae8aa4c9a/audio/c18586a3-5553-47ef-a65b-05b755fcca54/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Questioning Advice: Rethinking Cybercrime Education</itunes:title>
      <itunes:author>Elissa Redmiles</itunes:author>
      <itunes:duration>00:31:29</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>human-factor, research, cybercrime, advice, cybersecurity, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2245b6ba-587c-4e30-89eb-937eadda3a5b</guid>
      <title>The Right Number of Cybercrimes</title>
      <description><![CDATA[<p><strong>About our guest:</strong></p><p>Howard Bilodeau is an economist at Statistics Canada.</p><p><strong>Mentioned in the Show.</strong></p><p>Cyber Security and Cybercrime in Canada, 2017</p><p><a href="https://www150.statcan.gc.ca/n1/pub/71-607-x/71-607-x2018007-eng.htm">https://www150.statcan.gc.ca/n1/pub/71-607-x/71-607-x2018007-eng.htm</a></p><p>About one-fifth of Canadian businesses were impacted by cyber security incidents in 2019</p><p><a href="https://www150.statcan.gc.ca/n1/daily-quotidien/201020/dq201020a-eng.htm">https://www150.statcan.gc.ca/n1/daily-quotidien/201020/dq201020a-eng.htm</a></p><p>~~~</p><p>I really liked this episode, I hope you did as well.  Did you know that the end piece on a tape measure is loose accurately to the width of the metal catch so that you can put it against a wall or over the edge of a board without it being off by a milimetre or so.  The little gap in that metal tab is there so you can put it over the head of a screw and then mark out a circle radius. Very handy measure.  </p><p> </p>
]]></description>
      <pubDate>Fri, 15 Jan 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/the-right-number-of-cybercrimes-0_5RBxUa</link>
      <content:encoded><![CDATA[<p><strong>About our guest:</strong></p><p>Howard Bilodeau is an economist at Statistics Canada.</p><p><strong>Mentioned in the Show.</strong></p><p>Cyber Security and Cybercrime in Canada, 2017</p><p><a href="https://www150.statcan.gc.ca/n1/pub/71-607-x/71-607-x2018007-eng.htm">https://www150.statcan.gc.ca/n1/pub/71-607-x/71-607-x2018007-eng.htm</a></p><p>About one-fifth of Canadian businesses were impacted by cyber security incidents in 2019</p><p><a href="https://www150.statcan.gc.ca/n1/daily-quotidien/201020/dq201020a-eng.htm">https://www150.statcan.gc.ca/n1/daily-quotidien/201020/dq201020a-eng.htm</a></p><p>~~~</p><p>I really liked this episode, I hope you did as well.  Did you know that the end piece on a tape measure is loose accurately to the width of the metal catch so that you can put it against a wall or over the edge of a board without it being off by a milimetre or so.  The little gap in that metal tab is there so you can put it over the head of a screw and then mark out a circle radius. Very handy measure.  </p><p> </p>
]]></content:encoded>
      <enclosure length="23450479" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/5ea29828-a91f-4ba7-8eab-942b512cf7fe/audio/61defc70-0e69-42e3-b9cd-da2bf633b9b7/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Right Number of Cybercrimes</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:24:25</itunes:duration>
      <itunes:summary>Howard Bilodeau from Statistics Canada joins us to talk about the process of gathering data and producing national statistics and in particular the 2017 and 2019 cybercrime survey series. </itunes:summary>
      <itunes:subtitle>Howard Bilodeau from Statistics Canada joins us to talk about the process of gathering data and producing national statistics and in particular the 2017 and 2019 cybercrime survey series. </itunes:subtitle>
      <itunes:keywords>data, statistics, research, cybercrime, security, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">addfc607-6aa2-4abc-afc3-0baf377682bd</guid>
      <title>Twenty 21</title>
      <description><![CDATA[<p><strong>More about our Guests</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.</p><p><a href="https://cj.msu.edu/directory/holt-thomas.html"><strong>https://cj.msu.edu/directory/holt-thomas.html</strong></a></p><p>Dr Yi Ting Chua is a research associate at the Cambridge Cybercrime Centreat the Department of Computer Science and Technology, Cambridge University.</p><p><a href="https://www.cl.cam.ac.uk/~ytc36/">https://www.cl.cam.ac.uk/~ytc36/</a></p><p>Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences.</p><p><a href="https://www.nscr.nl/en/author/rutger/"><strong>https://www.nscr.nl/en/author/rutger/</strong></a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt"><strong>https://www.cybercrimeworkingroup.com/rutger-leukfeldt</strong></a></p><p>
Parler - The Social network
</p><p>
[<a href="https://www.pbs.org/newshour/nation/right-wing-users-flock-to-parler-as-social-media-giants-rein-in-misinformation"><https://www.pbs.org/newshour/nation/right-wing-users-flock-to-parler-as-social-media-giants-rein-in-misinformation</a>
</p><p> </p><p>Big thanks to the acrobatic elephants upstairs and the snow movers for making recording and mixing this episode such a joy.</p><p>I have had the song for this episode stuck in my head for a month.  I hope it isn't such an earworm for you as well.</p>
]]></description>
      <pubDate>Fri, 1 Jan 2021 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rutger Leukfeldt, Tom Holt, YiTing Chua)</author>
      <link>https://cybercrimeology.com/episodes/twenty-21-L__ykB1q</link>
      <content:encoded><![CDATA[<p><strong>More about our Guests</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University.</p><p><a href="https://cj.msu.edu/directory/holt-thomas.html"><strong>https://cj.msu.edu/directory/holt-thomas.html</strong></a></p><p>Dr Yi Ting Chua is a research associate at the Cambridge Cybercrime Centreat the Department of Computer Science and Technology, Cambridge University.</p><p><a href="https://www.cl.cam.ac.uk/~ytc36/">https://www.cl.cam.ac.uk/~ytc36/</a></p><p>Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences.</p><p><a href="https://www.nscr.nl/en/author/rutger/"><strong>https://www.nscr.nl/en/author/rutger/</strong></a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt"><strong>https://www.cybercrimeworkingroup.com/rutger-leukfeldt</strong></a></p><p>
Parler - The Social network
</p><p>
[<a href="https://www.pbs.org/newshour/nation/right-wing-users-flock-to-parler-as-social-media-giants-rein-in-misinformation"><https://www.pbs.org/newshour/nation/right-wing-users-flock-to-parler-as-social-media-giants-rein-in-misinformation</a>
</p><p> </p><p>Big thanks to the acrobatic elephants upstairs and the snow movers for making recording and mixing this episode such a joy.</p><p>I have had the song for this episode stuck in my head for a month.  I hope it isn't such an earworm for you as well.</p>
]]></content:encoded>
      <enclosure length="18064441" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/86c8cf13-dc78-4f51-a8a9-813ff11d7b2f/audio/d72567f1-23da-489c-8730-51da5c510cf2/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Twenty 21</itunes:title>
      <itunes:author>Rutger Leukfeldt, Tom Holt, YiTing Chua</itunes:author>
      <itunes:duration>00:18:47</itunes:duration>
      <itunes:summary>what can we expect from 2021 ? We welcome back Dr Tom Holt, professor at Michigan state university  and Dr Rutger Leukfedlt, senior researcher at NSCR and also at The Hague university of applied sciences as well as Dr Yi Ting Chua, Research associate at the Cambridge Cybercrime Centre for some advice.</itunes:summary>
      <itunes:subtitle>what can we expect from 2021 ? We welcome back Dr Tom Holt, professor at Michigan state university  and Dr Rutger Leukfedlt, senior researcher at NSCR and also at The Hague university of applied sciences as well as Dr Yi Ting Chua, Research associate at the Cambridge Cybercrime Centre for some advice.</itunes:subtitle>
      <itunes:keywords>2021, cybercrime, science, dis-information</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46664e27-e144-4b21-9434-5ec1b646c39e</guid>
      <title>Cybercrime Futures: Sect Social, Seek Global, Act Local.</title>
      <description><![CDATA[<p><strong>More about our Guests</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. </p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p>Dr. Hyunwook Chun is a Deputy Director at the Korean Institute of Criminology and affiliated professor at Dongguk University </p><p><a href="https://eng.kic.re.kr/">https://eng.kic.re.kr/. </a></p><p>Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences. </p><p><a href="https://www.nscr.nl/en/author/rutger/">https://www.nscr.nl/en/author/rutger/</a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt">https://www.cybercrimeworkingroup.com/rutger-leukfeldt</a></p><p>~~~ </p><p>This episode was about the future so there isn't much to link about here, I guess in a few years I might have to come back and put the links in for the things that haven't happened yet.  </p><p>~~~ </p><p>This episode took a lot more mixing than usual. I hope you like the result.  </p><p> </p>
]]></description>
      <pubDate>Tue, 15 Dec 2020 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Hyunwook Chun, Rutger Leukfeldt, Tom Holt)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-futures-sect-social-seek-global-act-local-c8VNiEyv</link>
      <content:encoded><![CDATA[<p><strong>More about our Guests</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. </p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p>Dr. Hyunwook Chun is a Deputy Director at the Korean Institute of Criminology and affiliated professor at Dongguk University </p><p><a href="https://eng.kic.re.kr/">https://eng.kic.re.kr/. </a></p><p>Dr Rutger Leukfeldt is senior researcher and the cybercrime cluster coordinator at the NSCR. as well as the director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences. </p><p><a href="https://www.nscr.nl/en/author/rutger/">https://www.nscr.nl/en/author/rutger/</a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt">https://www.cybercrimeworkingroup.com/rutger-leukfeldt</a></p><p>~~~ </p><p>This episode was about the future so there isn't much to link about here, I guess in a few years I might have to come back and put the links in for the things that haven't happened yet.  </p><p>~~~ </p><p>This episode took a lot more mixing than usual. I hope you like the result.  </p><p> </p>
]]></content:encoded>
      <enclosure length="25885465" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/e302df06-de6c-44d1-8f6a-67b15a4a2db2/audio/c9afe010-6992-443e-8475-617d5eec4f2c/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime Futures: Sect Social, Seek Global, Act Local.</itunes:title>
      <itunes:author>Hyunwook Chun, Rutger Leukfeldt, Tom Holt</itunes:author>
      <itunes:duration>00:26:57</itunes:duration>
      <itunes:summary>We don&apos;t know what the future will hold, but what might it hold, what to we think it should ? 
Dr. Tom Holt, Dr Hyunwook Chun and Dr Rutger Leukfeldt all join us to share their thoughts on what the next decade could bring for cybercrime and its research. </itunes:summary>
      <itunes:subtitle>We don&apos;t know what the future will hold, but what might it hold, what to we think it should ? 
Dr. Tom Holt, Dr Hyunwook Chun and Dr Rutger Leukfeldt all join us to share their thoughts on what the next decade could bring for cybercrime and its research. </itunes:subtitle>
      <itunes:keywords>future, research, cybercrime, law, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">500f814b-bcd0-4981-a20e-0545b3e16ea6</guid>
      <title>Cybercrime History: New Fashioned Laundry</title>
      <description><![CDATA[<p><strong>Show Notes</strong></p><p>More About Our Guest:</p><p><a href="https://www.cardiff.ac.uk/people/view/38041-levi-michael">https://www.cardiff.ac.uk/people/view/38041-levi-michael</a></p><p><strong>Names Dropped</strong></p><p>Peter Grabosky</p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p>David Wall</p><p><a href="https://essl.leeds.ac.uk/law/staff/238/professor-david-s-wall-facss">https://essl.leeds.ac.uk/law/staff/238/professor-david-s-wall-facss</a></p><p>Benoit Dupont</p><p><a href="https://recherche.umontreal.ca/english/our-researchers/professors-directory/researcher/is/in15263/">https://recherche.umontreal.ca/english/our-researchers/professors-directory/researcher/is/in15263/</a></p><p>Cassandra Cross</p><p><a href="https://staff.qut.edu.au/staff/ca.cross">https://staff.qut.edu.au/staff/ca.cross</a></p><p>Monica Whitty</p><p><a href="https://unsw.adfa.edu.au/our-people/professor-monica-whitty">https://unsw.adfa.edu.au/our-people/professor-monica-whitty</a></p><p>Mark Button</p><p><a href="https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-button">https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-button</a></p><p><strong>Papers Mentioned</strong></p><p>Evidence-based approaches to regulating 'organized crime'</p><p><a href="https://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16095637">https://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16095637</a></p><p>You can see a rather interesting regulatory response to the problem of cell phone theft here:</p><p><a href="https://www.zdnet.com/article/south-korea-to-mandate-anti-theft-mobile-feature/">https://www.zdnet.com/article/south-korea-to-mandate-anti-theft-mobile-feature/</a></p><p>This interview went for over an hour and a half. What a great discipline of research where people are willing to share their time for the benefit of others.</p>
]]></description>
      <pubDate>Wed, 2 Dec 2020 03:31:56 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Mike Levi)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-new-fashioned-laundry-BsT_pYGH</link>
      <content:encoded><![CDATA[<p><strong>Show Notes</strong></p><p>More About Our Guest:</p><p><a href="https://www.cardiff.ac.uk/people/view/38041-levi-michael">https://www.cardiff.ac.uk/people/view/38041-levi-michael</a></p><p><strong>Names Dropped</strong></p><p>Peter Grabosky</p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p>David Wall</p><p><a href="https://essl.leeds.ac.uk/law/staff/238/professor-david-s-wall-facss">https://essl.leeds.ac.uk/law/staff/238/professor-david-s-wall-facss</a></p><p>Benoit Dupont</p><p><a href="https://recherche.umontreal.ca/english/our-researchers/professors-directory/researcher/is/in15263/">https://recherche.umontreal.ca/english/our-researchers/professors-directory/researcher/is/in15263/</a></p><p>Cassandra Cross</p><p><a href="https://staff.qut.edu.au/staff/ca.cross">https://staff.qut.edu.au/staff/ca.cross</a></p><p>Monica Whitty</p><p><a href="https://unsw.adfa.edu.au/our-people/professor-monica-whitty">https://unsw.adfa.edu.au/our-people/professor-monica-whitty</a></p><p>Mark Button</p><p><a href="https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-button">https://www.port.ac.uk/about-us/structure-and-governance/our-people/our-staff/mark-button</a></p><p><strong>Papers Mentioned</strong></p><p>Evidence-based approaches to regulating 'organized crime'</p><p><a href="https://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16095637">https://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16095637</a></p><p>You can see a rather interesting regulatory response to the problem of cell phone theft here:</p><p><a href="https://www.zdnet.com/article/south-korea-to-mandate-anti-theft-mobile-feature/">https://www.zdnet.com/article/south-korea-to-mandate-anti-theft-mobile-feature/</a></p><p>This interview went for over an hour and a half. What a great discipline of research where people are willing to share their time for the benefit of others.</p>
]]></content:encoded>
      <enclosure length="31522400" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/8071b710-d031-45a3-9639-1673daa593d5/audio/4aa73126-91e7-42f1-89a9-8344f927095f/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: New Fashioned Laundry</itunes:title>
      <itunes:author>Mike Levi</itunes:author>
      <itunes:duration>00:32:49</itunes:duration>
      <itunes:summary>The final episode of our series of histories we share with Dr Mike Levi. We talk about cybercrime as a phenomenon and he provides us with some food for thought for cybercrime researchers.  Dr Levi is professor of criminology at Cardiff University and a deserving recipient of the Outstanding Achievement award for criminology from the British Society of Criminology.</itunes:summary>
      <itunes:subtitle>The final episode of our series of histories we share with Dr Mike Levi. We talk about cybercrime as a phenomenon and he provides us with some food for thought for cybercrime researchers.  Dr Levi is professor of criminology at Cardiff University and a deserving recipient of the Outstanding Achievement award for criminology from the British Society of Criminology.</itunes:subtitle>
      <itunes:keywords>research, cybercrime, cybersecurity, money laundering, fraud, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5c6420e-3c7d-4426-bf35-50139717f3b0</guid>
      <title>Cybercrime History: Who would take this opportunity?</title>
      <description><![CDATA[<p><strong>More about our Guest:</strong></p><p><a href="https://www.cardiff.ac.uk/people/view/38041-levi-michael">https://www.cardiff.ac.uk/people/view/38041-levi-michael</a></p><p> </p><p><strong>Mentioned in this Show:</strong></p><p><strong>SNC Lavalin and Trudeau</strong></p><p><a href="https://en.wikipedia.org/wiki/SNC-Lavalin_affair">https://en.wikipedia.org/wiki/SNC-Lavalin_affair</a></p><p> </p><p><strong>The Hungarian Circle</strong></p><p><a href="https://en.wikipedia.org/wiki/Henry_Oberlander">https://en.wikipedia.org/wiki/Henry_Oberlander</a></p><p>There have been a lot of Riots in Bristol</p><p><a href="https://en.wikipedia.org/wiki/Bristol_riots#National_riots,_August_2011">https://en.wikipedia.org/wiki/Bristol_riots#National_riots,_August_2011</a></p><p> </p><p><strong>Displacement</strong></p><p><a href="https://en.wikipedia.org/wiki/Crime_displacement">https://en.wikipedia.org/wiki/Crime_displacement</a></p><p> </p><p><strong>Dr Carlo Morselli</strong></p><p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in14440/sg/Carlo">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in14440/sg/Carlo</a><strong> Morselli/</strong></p><p>I am very much paraphrasing Dr Morselli at the end of this episode, I unfortunately only took short hand notes as he delivered this message in french in a speech that tied together a class on criminology that included much discussion and exercises that was as awesome, engaging, funny, and inspiring as it was inimitable.</p><p> </p><p><strong>A Thousand Cuts</strong></p><p>Death by a thousand paper cuts is a figure of speech that refers to the failure of an organization by the introduction of bureaucracy and many small inefficiencies and issues that slowly leads to bankruptcy.</p><p><strong>Obligatory Joke:</strong></p><p><i>I laughed quite a bit during the taping of this episode but I had to edit most of it out so as not to distract from Dr Levi. I probably owe you a laugh.</i></p><p>When I was a kid, my mother told me I could be anyone I wanted to be.</p><p>Turns out, identity theft is a crime.</p><p><i>This episode was recorded in July 2020. </i></p>
]]></description>
      <pubDate>Sun, 15 Nov 2020 05:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Mike Levi)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-who-would-take-this-opportunity-_G3vMMEW</link>
      <content:encoded><![CDATA[<p><strong>More about our Guest:</strong></p><p><a href="https://www.cardiff.ac.uk/people/view/38041-levi-michael">https://www.cardiff.ac.uk/people/view/38041-levi-michael</a></p><p> </p><p><strong>Mentioned in this Show:</strong></p><p><strong>SNC Lavalin and Trudeau</strong></p><p><a href="https://en.wikipedia.org/wiki/SNC-Lavalin_affair">https://en.wikipedia.org/wiki/SNC-Lavalin_affair</a></p><p> </p><p><strong>The Hungarian Circle</strong></p><p><a href="https://en.wikipedia.org/wiki/Henry_Oberlander">https://en.wikipedia.org/wiki/Henry_Oberlander</a></p><p>There have been a lot of Riots in Bristol</p><p><a href="https://en.wikipedia.org/wiki/Bristol_riots#National_riots,_August_2011">https://en.wikipedia.org/wiki/Bristol_riots#National_riots,_August_2011</a></p><p> </p><p><strong>Displacement</strong></p><p><a href="https://en.wikipedia.org/wiki/Crime_displacement">https://en.wikipedia.org/wiki/Crime_displacement</a></p><p> </p><p><strong>Dr Carlo Morselli</strong></p><p><a href="https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in14440/sg/Carlo">https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in14440/sg/Carlo</a><strong> Morselli/</strong></p><p>I am very much paraphrasing Dr Morselli at the end of this episode, I unfortunately only took short hand notes as he delivered this message in french in a speech that tied together a class on criminology that included much discussion and exercises that was as awesome, engaging, funny, and inspiring as it was inimitable.</p><p> </p><p><strong>A Thousand Cuts</strong></p><p>Death by a thousand paper cuts is a figure of speech that refers to the failure of an organization by the introduction of bureaucracy and many small inefficiencies and issues that slowly leads to bankruptcy.</p><p><strong>Obligatory Joke:</strong></p><p><i>I laughed quite a bit during the taping of this episode but I had to edit most of it out so as not to distract from Dr Levi. I probably owe you a laugh.</i></p><p>When I was a kid, my mother told me I could be anyone I wanted to be.</p><p>Turns out, identity theft is a crime.</p><p><i>This episode was recorded in July 2020. </i></p>
]]></content:encoded>
      <enclosure length="27325145" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/aaad959a-4405-48d7-8c9b-1cd3c34e1802/audio/ffb4a0d2-daba-4c29-a23c-527d51c7458d/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Who would take this opportunity?</itunes:title>
      <itunes:author>Mike Levi</itunes:author>
      <itunes:duration>00:28:27</itunes:duration>
      <itunes:summary>In the penultimate episode of our series of histories we put cybercrime  and particular fraud into its historical context with Dr Mike Levi. Dr Levi is professor of criminology at Cardiff University and a deserving recipient of the Outstanding Achievement award for criminology from the British Society of Criminology.</itunes:summary>
      <itunes:subtitle>In the penultimate episode of our series of histories we put cybercrime  and particular fraud into its historical context with Dr Mike Levi. Dr Levi is professor of criminology at Cardiff University and a deserving recipient of the Outstanding Achievement award for criminology from the British Society of Criminology.</itunes:subtitle>
      <itunes:keywords>cybercrime, cybersecurity, fraud, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4114a34-1979-406d-9e6b-84c91a9b5cb2</guid>
      <title>Cybercrime History: Virtually Reflecting Reality, Part 6</title>
      <description><![CDATA[<p>More about Our Guest</p><p><a href="https://faculty.nps.edu/dedennin/">https://faculty.nps.edu/dedennin/</a></p><p>From this Episode:</p><p>Morris Wilkes: <a href="https://en.wikipedia.org/wiki/Maurice_Wilkes">https://en.wikipedia.org/wiki/Maurice_Wilkes</a></p><p>His book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give <a href="https://www.wsj.com/articles/the-man-who-wrote-those-password-rules-has-a-new-tip-n3v-r-m1-d-1502124118">Bill Burr</a> a break. I learned about that line from a <a href="https://www.youtube.com/watch?v=n5W0_2grkF0">Dorothy Denning Lecture</a></p><p>A Declaration of the Independence of Cyberspace by John Perry Barlow</p><p><a href="https://www.eff.org/cyberspace-independence">https://www.eff.org/cyberspace-independence</a></p><p>the Cult of the Dead Cow</p><p><a href="https://cultdeadcow.com/">https://cultdeadcow.com/</a></p><p><a href="https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow">https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow</a></p><p>CARNAVORE</p><p><a href="https://en.wikipedia.org/wiki/Carnivore_(software)">https://en.wikipedia.org/wiki/Carnivore_(software)</a></p><p><a href="https://computer.howstuffworks.com/carnivore.htm">https://computer.howstuffworks.com/carnivore.htm</a></p><p>Honeypots</p><p><a href="https://en.wikipedia.org/wiki/Honeypot_(computing)">https://en.wikipedia.org/wiki/Honeypot_(computing)</a></p><p><a href="https://www.projecthoneypot.org/index.php">https://www.projecthoneypot.org/index.php</a></p><p><a href="https://www.honeynet.org/">https://www.honeynet.org/</a></p><p>Napster</p><p><a href="https://en.wikipedia.org/wiki/Napster">https://en.wikipedia.org/wiki/Napster</a></p><p>Did you know there were viral videos and memes before Facebook, YouTube and even Gmail?</p><p>Money Good. Napster Bad</p><p><a href="https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad">https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad</a></p>
]]></description>
      <pubDate>Sun, 1 Nov 2020 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Dorothy Denning)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-virtually-reflecting-reality-part-6-T6W3CL9t</link>
      <content:encoded><![CDATA[<p>More about Our Guest</p><p><a href="https://faculty.nps.edu/dedennin/">https://faculty.nps.edu/dedennin/</a></p><p>From this Episode:</p><p>Morris Wilkes: <a href="https://en.wikipedia.org/wiki/Maurice_Wilkes">https://en.wikipedia.org/wiki/Maurice_Wilkes</a></p><p>His book "Time-sharing computer systems" from 1968 provide for the Security of the System on page 91 noting that "Passwords, if used must be carefully guarded and changed frequently; the console printing should be switched off when the users is invited to type in his password". So perhaps we can give <a href="https://www.wsj.com/articles/the-man-who-wrote-those-password-rules-has-a-new-tip-n3v-r-m1-d-1502124118">Bill Burr</a> a break. I learned about that line from a <a href="https://www.youtube.com/watch?v=n5W0_2grkF0">Dorothy Denning Lecture</a></p><p>A Declaration of the Independence of Cyberspace by John Perry Barlow</p><p><a href="https://www.eff.org/cyberspace-independence">https://www.eff.org/cyberspace-independence</a></p><p>the Cult of the Dead Cow</p><p><a href="https://cultdeadcow.com/">https://cultdeadcow.com/</a></p><p><a href="https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow">https://en.wikipedia.org/wiki/Cult_of_the_Dead_Cow</a></p><p>CARNAVORE</p><p><a href="https://en.wikipedia.org/wiki/Carnivore_(software)">https://en.wikipedia.org/wiki/Carnivore_(software)</a></p><p><a href="https://computer.howstuffworks.com/carnivore.htm">https://computer.howstuffworks.com/carnivore.htm</a></p><p>Honeypots</p><p><a href="https://en.wikipedia.org/wiki/Honeypot_(computing)">https://en.wikipedia.org/wiki/Honeypot_(computing)</a></p><p><a href="https://www.projecthoneypot.org/index.php">https://www.projecthoneypot.org/index.php</a></p><p><a href="https://www.honeynet.org/">https://www.honeynet.org/</a></p><p>Napster</p><p><a href="https://en.wikipedia.org/wiki/Napster">https://en.wikipedia.org/wiki/Napster</a></p><p>Did you know there were viral videos and memes before Facebook, YouTube and even Gmail?</p><p>Money Good. Napster Bad</p><p><a href="https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad">https://tvtropes.org/pmwiki/pmwiki.php/WebAnimation/NapsterBad</a></p>
]]></content:encoded>
      <enclosure length="31457914" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bcee5-b99b-424f-8223-8b3062f7085b/episodes/a9f5c2b9-851c-474f-a254-ef26f131fad0/audio/2f57c6ff-80fd-4030-b520-74bd07a2b076/default_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Virtually Reflecting Reality, Part 6</itunes:title>
      <itunes:author>Dorothy Denning</itunes:author>
      <itunes:duration>00:32:46</itunes:duration>
      <itunes:summary>In this episode of our histories mini-series, we get a little bit more technical and discuss a history of computer security with Dr Dorothy Denning.  Dr Denning is Emeritus Distinguished Professor Of Defence Analysis at the US Naval Postgraduate school.</itunes:summary>
      <itunes:subtitle>In this episode of our histories mini-series, we get a little bit more technical and discuss a history of computer security with Dr Dorothy Denning.  Dr Denning is Emeritus Distinguished Professor Of Defence Analysis at the US Naval Postgraduate school.</itunes:subtitle>
      <itunes:keywords>cybercrime, clipper chip, cybersecurity, encryption, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">20db700f-c66a-4706-9e56-4353e50aeb6b</guid>
      <title>Cybercrime History: Weapons and Worries Worldwide, Part 5</title>
      <description><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p>Janke, Art (2005) Alexey Ivanov and Vasiliy Gorshkov: Russian Hacker Roulette</p><p><a href="https://www.csoonline.com/article/2118241/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html">https://www.csoonline.com/article/2118241/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html</a></p><p>Hacking Theft of $10 Million From Citibank Revealed</p><p><a href="https://www.latimes.com/archives/la-xpm-1995-08-19-fi-36656-story.html">https://www.latimes.com/archives/la-xpm-1995-08-19-fi-36656-story.html</a></p><p>Vladimir Levin</p><p><a href="https://en.wikipedia.org/wiki/Vladimir_Levin">https://en.wikipedia.org/wiki/Vladimir_Levin</a></p><p>2007 cyberattacks on Estonia</p><p><a href="https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia">https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia</a></p><p>Operation Olympic Games</p><p><a href="https://en.wikipedia.org/wiki/Operation_Olympic_Games">https://en.wikipedia.org/wiki/Operation_Olympic_Games</a></p><p>Cyber Resiliency: A Clear and Urgent Necessity for Modern Railroads</p><p><a href="https://www.railwayage.com/regulatory/cyber-resiliency-a-clear-and-urgent-necessity-for-modern-railroads/">https://www.railwayage.com/regulatory/cyber-resiliency-a-clear-and-urgent-necessity-for-modern-railroads/</a></p><p>Sanger, D. E. (2019) <i>The perfect weapon: War, sabotage, and fear in the cyber age</i></p><p>C. Stoll (1989) <i>Cuckoo’s Egg</i></p>
]]></description>
      <pubDate>Thu, 15 Oct 2020 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Peter Grabosky)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-weapons-and-worries-worldwide-part-5-eWdDAopp</link>
      <content:encoded><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p>Janke, Art (2005) Alexey Ivanov and Vasiliy Gorshkov: Russian Hacker Roulette</p><p><a href="https://www.csoonline.com/article/2118241/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html">https://www.csoonline.com/article/2118241/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html</a></p><p>Hacking Theft of $10 Million From Citibank Revealed</p><p><a href="https://www.latimes.com/archives/la-xpm-1995-08-19-fi-36656-story.html">https://www.latimes.com/archives/la-xpm-1995-08-19-fi-36656-story.html</a></p><p>Vladimir Levin</p><p><a href="https://en.wikipedia.org/wiki/Vladimir_Levin">https://en.wikipedia.org/wiki/Vladimir_Levin</a></p><p>2007 cyberattacks on Estonia</p><p><a href="https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia">https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia</a></p><p>Operation Olympic Games</p><p><a href="https://en.wikipedia.org/wiki/Operation_Olympic_Games">https://en.wikipedia.org/wiki/Operation_Olympic_Games</a></p><p>Cyber Resiliency: A Clear and Urgent Necessity for Modern Railroads</p><p><a href="https://www.railwayage.com/regulatory/cyber-resiliency-a-clear-and-urgent-necessity-for-modern-railroads/">https://www.railwayage.com/regulatory/cyber-resiliency-a-clear-and-urgent-necessity-for-modern-railroads/</a></p><p>Sanger, D. E. (2019) <i>The perfect weapon: War, sabotage, and fear in the cyber age</i></p><p>C. Stoll (1989) <i>Cuckoo’s Egg</i></p>
]]></content:encoded>
      <enclosure length="21996986" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/8773f732-93ad-4cf7-b2ac-cf6929e30a40/cybercrimology-ep24-peter-grabosky-pt3_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Weapons and Worries Worldwide, Part 5</itunes:title>
      <itunes:author>Peter Grabosky</itunes:author>
      <itunes:duration>00:22:53</itunes:duration>
      <itunes:summary>This is the fifth episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history continues with new millenium concerns such as mafiaboy, the vacation plans of cybercriminals, the iloveyou virus and operation olympic games.</itunes:summary>
      <itunes:subtitle>This is the fifth episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history continues with new millenium concerns such as mafiaboy, the vacation plans of cybercriminals, the iloveyou virus and operation olympic games.</itunes:subtitle>
      <itunes:keywords>cybercrime, cybersecurity, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">00bc8179-8b95-43dc-a7d6-b69c19f96ffb</guid>
      <title>Cybercrime History: Managing a Manifest Mitnick, Part 4</title>
      <description><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p><i><strong>From this Episode:</strong></i></p><p>Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489</p><p><a href="https://scholarship.law.duke.edu/djcil/vol9/iss2/5/">https://scholarship.law.duke.edu/djcil/vol9/iss2/5/</a></p><p>Kim Dotcom</p><p><a href="https://en.wikipedia.org/wiki/Kim_Dotcom">https://en.wikipedia.org/wiki/Kim_Dotcom</a></p><p>Malaysian Cybercrime Law</p><p>Yew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)</p><p><a href="https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670">https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670</a></p><p>Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.</p><p><a href="https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl">https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl</a></p><p>Drink or Die</p><p><a href="https://en.wikipedia.org/wiki/DrinkOrDie">https://en.wikipedia.org/wiki/DrinkOrDie</a></p><p>Sanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age</p><p>Bruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)</p>
]]></description>
      <pubDate>Thu, 1 Oct 2020 04:00:00 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Peter Grabosky)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-managing-a-manifest-mitnick-part-4-f4v_CYqN</link>
      <content:encoded><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p><i><strong>From this Episode:</strong></i></p><p>Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489</p><p><a href="https://scholarship.law.duke.edu/djcil/vol9/iss2/5/">https://scholarship.law.duke.edu/djcil/vol9/iss2/5/</a></p><p>Kim Dotcom</p><p><a href="https://en.wikipedia.org/wiki/Kim_Dotcom">https://en.wikipedia.org/wiki/Kim_Dotcom</a></p><p>Malaysian Cybercrime Law</p><p>Yew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)</p><p><a href="https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670">https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670</a></p><p>Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.</p><p><a href="https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl">https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl</a></p><p>Drink or Die</p><p><a href="https://en.wikipedia.org/wiki/DrinkOrDie">https://en.wikipedia.org/wiki/DrinkOrDie</a></p><p>Sanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age</p><p>Bruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)</p>
]]></content:encoded>
      <enclosure length="21932762" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/c4ff93fd-3fad-4695-beb9-c3c1f63c74fc/cybercrimology-ep23-peter-grabosky-pt2_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Managing a Manifest Mitnick, Part 4</itunes:title>
      <itunes:author>Peter Grabosky</itunes:author>
      <itunes:duration>00:22:49</itunes:duration>
      <itunes:summary>This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history continues from the 1980s and the growing problem of international crime.</itunes:summary>
      <itunes:subtitle>This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history continues from the 1980s and the growing problem of international crime.</itunes:subtitle>
      <itunes:keywords>kevin mitnick, cybercrime, cybersecurity, law, society, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e5f73f9-ef10-484a-bf56-a8f17c2d7427</guid>
      <title>Cybercrime History: Curious Captains are Calling, Pt 3</title>
      <description><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p><i><strong>Persons of Note:</strong></i></p><p>Abbie Hoffman</p><p><a href="https://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/">https://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/</a></p><p>JoyBubbles, Josef Carl Engressia Jr.</p><p><a href="https://en.wikipedia.org/wiki/Joybubbles">https://en.wikipedia.org/wiki/Joybubbles</a></p><p>Captain Crunch</p><p>(VIDEO) 2015: "History of Hacking" by John "Captain Crunch" Draper</p><p><a href="https://www.youtube.com/watch?v=DK-352AWaKk">https://www.youtube.com/watch?v=DK-352AWaKk</a></p><p>Yan Laura (22 Oct 2019) An Early Hacker Used a Cereal Box Whistle to Take Over Phone Lines</p><p><a href="https://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/">https://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/</a></p><p>CSO, (20 Nov, 2017) Captain Crunch aka John Draper banned from DefCon for sexual misconduct</p><p><a href="https://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.html">https://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.html</a></p><p>Captain Zap</p><p>Delio, Michelle (Feb 6, 2001) The Greatest Hacks of All Time</p><p><a href="https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/">https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/</a></p><p>CaptainZap</p><p><a href="https://hackstory.net/Captain_Zap">https://hackstory.net/Captain_Zap</a></p><p>Steve Jobs and Steve Wozniak</p><p>Lapsley, Phil (Feb 20, 2013) The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking</p><p>(VIDEO) 1984: "Wozniak Meets Steve Jobs: Blue Box Free Phone Calls Worldwide" by Steve Wozniak</p><p><a href="https://www.youtube.com/watch?v=oeVOpDUWwpU">https://www.youtube.com/watch?v=oeVOpDUWwpU</a></p><p> </p><p><i><strong>Reading</strong></i></p><p>Donn B Parker <i>Crime by Computer</i> (1976)</p><p>August Bequai <i>Computer Crime</i> (1978)</p><p>Steve Levy <i>Hackers: Heroes of the computer revolution</i> (1984)</p><p>Gordon Meyer & Jim Thomas <i>COMPUTER UNDERGROUND DIGEST</i> (1990-2000)</p><p><a href="http://www.computer-underground-digest.org/">http://www.computer-underground-digest.org/</a></p><p>Clough and Mungo <i>Approaching Zero</i> 1992</p><p>C. Stoll <i>Cuckoo’s Egg</i> (1989)</p><p> </p><p><i><strong>Other</strong></i></p><p>A few things that you missed:</p><p>You could read this paper from 1977, in which August Bequai attempts to define and illustrate the then 100 million dollar problem of computer crime :</p><p><a href="https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22">https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22</a></p><p>The Equity Funding Scam.</p><p><a href="https://en.wikipedia.org/wiki/Equity_Funding">https://en.wikipedia.org/wiki/Equity_Funding</a></p><p>Barbash, Fred(Nov 16, 1982) High Court to Review SEC Action on Whistleblower,</p><p><a href="https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/">https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/</a></p><p>Initial findings of the SEC on The Equity Funding Corporation</p><p><a href="https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf">https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf</a></p><p> </p><p>MIT still has a Model railway club</p><p><a href="http://tmrc.mit.edu/">http://tmrc.mit.edu/</a></p><p>Rod Stewart (<a href="https://en.wikipedia.org/wiki/Rod_Stewart">https://en.wikipedia.org/wiki/Rod_Stewart</a>) is a railway enthusiast. I once worked with a guy who had a beer with Rod Stewart and insisted he was a good bloke.</p><p><a href="https://www.bbc.com/news/entertainment-arts-50403561">https://www.bbc.com/news/entertainment-arts-50403561</a></p><p>Information wants to be free</p><p><a href="https://en.wikipedia.org/wiki/Information_wants_to_be_free">https://en.wikipedia.org/wiki/Information_wants_to_be_free</a></p><p>What is a punch card?</p><p><a href="https://www.computerhope.com/jargon/p/punccard.htm">https://www.computerhope.com/jargon/p/punccard.htm</a></p><p>DARPA, the group behind the internet infrastructure, still exists</p><p><a href="https://www.darpa.mil/">https://www.darpa.mil/</a></p>
]]></description>
      <pubDate>Tue, 15 Sep 2020 04:00:05 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Peter Grabosky)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-curious-captains-are-calling-pt-3-c5GWvwBs</link>
      <content:encoded><![CDATA[<p><i><strong>More about Our Guest</strong></i></p><p><a href="https://researchers.anu.edu.au/researchers/grabosky-pn">https://researchers.anu.edu.au/researchers/grabosky-pn</a></p><p><i><strong>Persons of Note:</strong></i></p><p>Abbie Hoffman</p><p><a href="https://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/">https://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/</a></p><p>JoyBubbles, Josef Carl Engressia Jr.</p><p><a href="https://en.wikipedia.org/wiki/Joybubbles">https://en.wikipedia.org/wiki/Joybubbles</a></p><p>Captain Crunch</p><p>(VIDEO) 2015: "History of Hacking" by John "Captain Crunch" Draper</p><p><a href="https://www.youtube.com/watch?v=DK-352AWaKk">https://www.youtube.com/watch?v=DK-352AWaKk</a></p><p>Yan Laura (22 Oct 2019) An Early Hacker Used a Cereal Box Whistle to Take Over Phone Lines</p><p><a href="https://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/">https://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/</a></p><p>CSO, (20 Nov, 2017) Captain Crunch aka John Draper banned from DefCon for sexual misconduct</p><p><a href="https://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.html">https://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.html</a></p><p>Captain Zap</p><p>Delio, Michelle (Feb 6, 2001) The Greatest Hacks of All Time</p><p><a href="https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/">https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/</a></p><p>CaptainZap</p><p><a href="https://hackstory.net/Captain_Zap">https://hackstory.net/Captain_Zap</a></p><p>Steve Jobs and Steve Wozniak</p><p>Lapsley, Phil (Feb 20, 2013) The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking</p><p>(VIDEO) 1984: "Wozniak Meets Steve Jobs: Blue Box Free Phone Calls Worldwide" by Steve Wozniak</p><p><a href="https://www.youtube.com/watch?v=oeVOpDUWwpU">https://www.youtube.com/watch?v=oeVOpDUWwpU</a></p><p> </p><p><i><strong>Reading</strong></i></p><p>Donn B Parker <i>Crime by Computer</i> (1976)</p><p>August Bequai <i>Computer Crime</i> (1978)</p><p>Steve Levy <i>Hackers: Heroes of the computer revolution</i> (1984)</p><p>Gordon Meyer & Jim Thomas <i>COMPUTER UNDERGROUND DIGEST</i> (1990-2000)</p><p><a href="http://www.computer-underground-digest.org/">http://www.computer-underground-digest.org/</a></p><p>Clough and Mungo <i>Approaching Zero</i> 1992</p><p>C. Stoll <i>Cuckoo’s Egg</i> (1989)</p><p> </p><p><i><strong>Other</strong></i></p><p>A few things that you missed:</p><p>You could read this paper from 1977, in which August Bequai attempts to define and illustrate the then 100 million dollar problem of computer crime :</p><p><a href="https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22">https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22</a></p><p>The Equity Funding Scam.</p><p><a href="https://en.wikipedia.org/wiki/Equity_Funding">https://en.wikipedia.org/wiki/Equity_Funding</a></p><p>Barbash, Fred(Nov 16, 1982) High Court to Review SEC Action on Whistleblower,</p><p><a href="https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/">https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/</a></p><p>Initial findings of the SEC on The Equity Funding Corporation</p><p><a href="https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf">https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf</a></p><p> </p><p>MIT still has a Model railway club</p><p><a href="http://tmrc.mit.edu/">http://tmrc.mit.edu/</a></p><p>Rod Stewart (<a href="https://en.wikipedia.org/wiki/Rod_Stewart">https://en.wikipedia.org/wiki/Rod_Stewart</a>) is a railway enthusiast. I once worked with a guy who had a beer with Rod Stewart and insisted he was a good bloke.</p><p><a href="https://www.bbc.com/news/entertainment-arts-50403561">https://www.bbc.com/news/entertainment-arts-50403561</a></p><p>Information wants to be free</p><p><a href="https://en.wikipedia.org/wiki/Information_wants_to_be_free">https://en.wikipedia.org/wiki/Information_wants_to_be_free</a></p><p>What is a punch card?</p><p><a href="https://www.computerhope.com/jargon/p/punccard.htm">https://www.computerhope.com/jargon/p/punccard.htm</a></p><p>DARPA, the group behind the internet infrastructure, still exists</p><p><a href="https://www.darpa.mil/">https://www.darpa.mil/</a></p>
]]></content:encoded>
      <enclosure length="33279517" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/ea7e19a4-1e0d-4769-bd3e-e8bfe8083fa5/cybercrimology-ep22-peter-grabosky_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Curious Captains are Calling, Pt 3</itunes:title>
      <itunes:author>Peter Grabosky</itunes:author>
      <itunes:duration>00:34:38</itunes:duration>
      <itunes:summary>This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history begins with the very origins of computer crime back in the 1960s. </itunes:summary>
      <itunes:subtitle>This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky,  Professor Emeritus at the Australian National University.  The history begins with the very origins of computer crime back in the 1960s. </itunes:subtitle>
      <itunes:keywords>phreaking, cybercrime, cybersecurity, morris worm, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d9aa71ce-4a5f-4592-91d0-88239cd0a2c7</guid>
      <title>Cybercrime History: Global Regulators Part 2</title>
      <description><![CDATA[<p>About the Guest:</p><p><a href="https://www.cybercrimelaw.net/biography.html"><strong>https://www.cybercrimelaw.net/biography.html</strong></a></p><p>The History of Cybercrime: 1976-2016 by Stein Schjolberg.</p><p><a href="https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T"><strong>https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T</strong></a></p><p>In this episode we spoke about:</p><p>The Council of Europe convention of cybercrime: <a href="https://www.coe.int/en/web/cybercrime/home">https://www.coe.int/en/web/cybercrime/home</a></p><p>The United Nations program on cybercrime. </p><p><a href="https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html">https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html</a></p><p>~~~~</p><p><strong>Light Reading</strong></p><p>Clough, J. (2014). A world of difference: the Budapest convention of cybercrime and the challenges of harmonisation. <i>Monash UL Rev.</i>, <i>40</i>, 698.</p><p><a href="https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf">https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf</a></p><p>Cnews.ru via CCRC (Mar 28, 2008)Putin defies Convention on Cybercrime</p><p><a href="http://www.crime-research.org/news/28.03.2008/3277/">http://www.crime-research.org/news/28.03.2008/3277/</a></p><p>David Ignatius (Oct 24, 2017) Russia is pushing to control cyberspace. We should all be worried.</p><p><a href="https://www.washingtonpost.com/opinions/global-opinions/russia-is-pushing-to-control-cyberspace-we-should-all-be-worried/2017/10/24/7014bcc6-b8f1-11e7-be94-fabb0f1e9ffb_story.html">https://www.washingtonpost.com/opinions/global-opinions/russia-is-pushing-to-control-cyberspace-we-should-all-be-worried/2017/10/24/7014bcc6-b8f1-11e7-be94-fabb0f1e9ffb_story.html</a></p><p>Allison Peters (Sept. 16, 2019) Russia and China Are Trying to Set the U.N.’s Rules on Cybercrime</p><p><a href="https://foreignpolicy.com/2019/09/16/russia-and-china-are-trying-to-set-the-u-n-s-rules-on-cybercrime/">https://foreignpolicy.com/2019/09/16/russia-and-china-are-trying-to-set-the-u-n-s-rules-on-cybercrime/</a></p><p> </p><p> </p>
]]></description>
      <pubDate>Tue, 1 Sep 2020 04:00:10 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Stein Schjolberg)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-global-regulators-part-2-P_2ejH8j</link>
      <content:encoded><![CDATA[<p>About the Guest:</p><p><a href="https://www.cybercrimelaw.net/biography.html"><strong>https://www.cybercrimelaw.net/biography.html</strong></a></p><p>The History of Cybercrime: 1976-2016 by Stein Schjolberg.</p><p><a href="https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T"><strong>https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T</strong></a></p><p>In this episode we spoke about:</p><p>The Council of Europe convention of cybercrime: <a href="https://www.coe.int/en/web/cybercrime/home">https://www.coe.int/en/web/cybercrime/home</a></p><p>The United Nations program on cybercrime. </p><p><a href="https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html">https://www.unodc.org/unodc/en/cybercrime/global-programme-cybercrime.html</a></p><p>~~~~</p><p><strong>Light Reading</strong></p><p>Clough, J. (2014). A world of difference: the Budapest convention of cybercrime and the challenges of harmonisation. <i>Monash UL Rev.</i>, <i>40</i>, 698.</p><p><a href="https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf">https://www.monash.edu/__data/assets/pdf_file/0019/232525/clough.pdf</a></p><p>Cnews.ru via CCRC (Mar 28, 2008)Putin defies Convention on Cybercrime</p><p><a href="http://www.crime-research.org/news/28.03.2008/3277/">http://www.crime-research.org/news/28.03.2008/3277/</a></p><p>David Ignatius (Oct 24, 2017) Russia is pushing to control cyberspace. We should all be worried.</p><p><a href="https://www.washingtonpost.com/opinions/global-opinions/russia-is-pushing-to-control-cyberspace-we-should-all-be-worried/2017/10/24/7014bcc6-b8f1-11e7-be94-fabb0f1e9ffb_story.html">https://www.washingtonpost.com/opinions/global-opinions/russia-is-pushing-to-control-cyberspace-we-should-all-be-worried/2017/10/24/7014bcc6-b8f1-11e7-be94-fabb0f1e9ffb_story.html</a></p><p>Allison Peters (Sept. 16, 2019) Russia and China Are Trying to Set the U.N.’s Rules on Cybercrime</p><p><a href="https://foreignpolicy.com/2019/09/16/russia-and-china-are-trying-to-set-the-u-n-s-rules-on-cybercrime/">https://foreignpolicy.com/2019/09/16/russia-and-china-are-trying-to-set-the-u-n-s-rules-on-cybercrime/</a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="21162183" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/f433dc95-0154-413f-81af-41946fdd5b52/cybercrimeology-ep21-stein-scholberg-pt2_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Global Regulators Part 2</itunes:title>
      <itunes:author>Stein Schjolberg</itunes:author>
      <itunes:duration>00:22:00</itunes:duration>
      <itunes:summary>We continue our series on cybercrime history with Judge Stein Schjolberg and talk about the council of Europe Convention on cybercrime, why it is difficult to have a truly global cybercrime law, and what we might be concerned about for the future.   </itunes:summary>
      <itunes:subtitle>We continue our series on cybercrime history with Judge Stein Schjolberg and talk about the council of Europe Convention on cybercrime, why it is difficult to have a truly global cybercrime law, and what we might be concerned about for the future.   </itunes:subtitle>
      <itunes:keywords>cybercrime, convention on cybercrime, cybersecurity, law, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f08cebef-880d-4759-8da5-8b52a9596d7d</guid>
      <title>Cybercrime History: Pioneers in Law, Part 1</title>
      <description><![CDATA[<p>About the Guest:</p><p><a href="https://www.cybercrimelaw.net/biography.html">https://www.cybercrimelaw.net/biography.html</a></p><p> </p><p>The History of Cybercrime: 1976-2016  by Stein Schjolberg.</p><p><a href="https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T">https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T</a></p><p>~~~~</p><p>We mentioned Donn Parker. </p><p><a href="https://en.wikipedia.org/wiki/Donn_B._Parker">https://en.wikipedia.org/wiki/Donn_B._Parker</a></p><p> </p><p>The Santayana reference is from the book "The Life of Reason" by George Santayana, which can be found at : <a href="https://www.gutenberg.org/files/15000/15000-h/15000-h.htm">https://www.gutenberg.org/files/15000/15000-h/15000-h.htm</a></p><p> </p><p> </p>
]]></description>
      <pubDate>Sat, 15 Aug 2020 04:00:04 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Stein Schjolberg)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-history-pioneers-in-law-part-1-qy9JbF_r</link>
      <content:encoded><![CDATA[<p>About the Guest:</p><p><a href="https://www.cybercrimelaw.net/biography.html">https://www.cybercrimelaw.net/biography.html</a></p><p> </p><p>The History of Cybercrime: 1976-2016  by Stein Schjolberg.</p><p><a href="https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T">https://www.amazon.co.uk/dp/B01N7XVFY8/ref=cm_sw_em_r_mt_dp_EmUnFb8VZZ79T</a></p><p>~~~~</p><p>We mentioned Donn Parker. </p><p><a href="https://en.wikipedia.org/wiki/Donn_B._Parker">https://en.wikipedia.org/wiki/Donn_B._Parker</a></p><p> </p><p>The Santayana reference is from the book "The Life of Reason" by George Santayana, which can be found at : <a href="https://www.gutenberg.org/files/15000/15000-h/15000-h.htm">https://www.gutenberg.org/files/15000/15000-h/15000-h.htm</a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="28090813" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/626b4a4e-e01a-41f3-8186-f56d0cb875b5/cybercrimeology-ep20-stein-scholberg-pt1_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime History: Pioneers in Law, Part 1</itunes:title>
      <itunes:author>Stein Schjolberg</itunes:author>
      <itunes:duration>00:29:13</itunes:duration>
      <itunes:summary>We start our series on cybercrime history with Judge Stein Schjolberg presenting the pioneering researchers, pioneering laws and pioneering countries in setting out what cybercrime is. </itunes:summary>
      <itunes:subtitle>We start our series on cybercrime history with Judge Stein Schjolberg presenting the pioneering researchers, pioneering laws and pioneering countries in setting out what cybercrime is. </itunes:subtitle>
      <itunes:keywords>cybercrime, cybersecurity, law, history, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59eff1f2-ac66-4415-8a99-dcfd5875f799</guid>
      <title>Too Good to be True: Cybersecurity advice and susceptibility to fraud</title>
      <description><![CDATA[<p><i>About the Guest</i></p><p><a href="https://unsw.adfa.edu.au/our-people/professor-monica-whitty">https://unsw.adfa.edu.au/our-people/professor-monica-whitty</a></p><p><i>Papers Mentioned:</i></p><p>Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime.</p><p><a href="https://www.emerald.com/insight/content/doi/10.1108/JFC-10-2017-0095/full/html">https://www.emerald.com/insight/content/doi/10.1108/JFC-10-2017-0095/full/html</a></p><p>~~~</p><p><i>Other:</i></p><p>The cybersafety library resource program I mentioned is called cybersec101, you can find it here <a href="https://cybersec101.ca">https://cybersec101.ca</a></p><p>The hilarious PSA film "Safety: Harm Hides at home" used for the sample at the start can be found in the Prelinger archives at archive.org here: <a href="https://archive.org/details/safety_harm_hides">https://archive.org/details/safety_harm_hides</a></p><p>Music made with software (looper) from AudioKit. <a href="https://audiokitpro.com/">https://audiokitpro.com/ </a></p>
]]></description>
      <pubDate>Sat, 1 Aug 2020 04:00:19 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Monica Whitty)</author>
      <link>https://cybercrimeology.com/episodes/too-good-to-be-true-cybersecurity-advice-and-susceptibility-to-fraud-MhAWRIb9</link>
      <content:encoded><![CDATA[<p><i>About the Guest</i></p><p><a href="https://unsw.adfa.edu.au/our-people/professor-monica-whitty">https://unsw.adfa.edu.au/our-people/professor-monica-whitty</a></p><p><i>Papers Mentioned:</i></p><p>Whitty, M. T. (2019). Predicting susceptibility to cyber-fraud victimhood. Journal of Financial Crime.</p><p><a href="https://www.emerald.com/insight/content/doi/10.1108/JFC-10-2017-0095/full/html">https://www.emerald.com/insight/content/doi/10.1108/JFC-10-2017-0095/full/html</a></p><p>~~~</p><p><i>Other:</i></p><p>The cybersafety library resource program I mentioned is called cybersec101, you can find it here <a href="https://cybersec101.ca">https://cybersec101.ca</a></p><p>The hilarious PSA film "Safety: Harm Hides at home" used for the sample at the start can be found in the Prelinger archives at archive.org here: <a href="https://archive.org/details/safety_harm_hides">https://archive.org/details/safety_harm_hides</a></p><p>Music made with software (looper) from AudioKit. <a href="https://audiokitpro.com/">https://audiokitpro.com/ </a></p>
]]></content:encoded>
      <enclosure length="21839302" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/97d43375-625b-43c2-a01a-0c74e6476841/cybercrimeology-ep19-monica-whitty_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Too Good to be True: Cybersecurity advice and susceptibility to fraud</itunes:title>
      <itunes:author>Monica Whitty</itunes:author>
      <itunes:duration>00:22:43</itunes:duration>
      <itunes:summary>Why do people fall for scams and what can we do about it ? Dr Monica Whitty joins us to talk about the multi-disciplinary approach to the paper &quot;Predicting susceptibility to cyber-fraud victimhood.&quot; and cybersecurity awareness campaigns.  </itunes:summary>
      <itunes:subtitle>Why do people fall for scams and what can we do about it ? Dr Monica Whitty joins us to talk about the multi-disciplinary approach to the paper &quot;Predicting susceptibility to cyber-fraud victimhood.&quot; and cybersecurity awareness campaigns.  </itunes:subtitle>
      <itunes:keywords>cybercrime, advice, cybersecurity, education, psychology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f06b13a5-593d-4291-aa58-8969879cbeb8</guid>
      <title>Will you comply?: Why employees follow IT Security Policy, or not.</title>
      <description><![CDATA[<p><i>About the Guest:</i></p><p><a href="https://uwaterloo.ca/school-of-accounting-and-finance/people-profiles/w-alec-cram">https://uwaterloo.ca/school-of-accounting-and-finance/people-profiles/w-alec-cram</a></p><p><i>Papers Mentioned in this Episode:</i></p><p>Cram, W. A., D'arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. <i>MIS Quarterly</i>, <i>43</i>(2), 525-554.</p><p><i>Other Notes:</i><br /> </p><p>There was the punchline for an old joke in there, the original version is needlessly gendered, so I'll switch it and give the setup, </p><p>An engineer (Practitioner) and a Mathematician (Theorist) were drinking at a bar. They both order a pint, and the Mathematician shares, "If I drink half of this beer now, half of the remainder in after a minute, half again in two minutes, and so on I will be able to drink for the rest of time". The Engineer replies, "Yes but in five minutes you will be drunk enough to order another (Close enough to finished for all practical purposes)".  </p><p>~~~ </p><p>The sample from the start is from a film about factory safety that is in the Prelinger archives available at archive.org <a href="https://archive.org/details/1280FactorySafety">https://archive.org/details/1280FactorySafety</a></p><p>Piano is .... a piano. Cheezy casio drums are from <a href="https://lmms.io/">https://lmms.io/.  </a></p>
]]></description>
      <pubDate>Wed, 15 Jul 2020 04:00:02 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Alec Cram)</author>
      <link>https://cybercrimeology.com/episodes/will-you-comply-why-employees-follow-it-security-policy-or-not-TEW4__MG</link>
      <content:encoded><![CDATA[<p><i>About the Guest:</i></p><p><a href="https://uwaterloo.ca/school-of-accounting-and-finance/people-profiles/w-alec-cram">https://uwaterloo.ca/school-of-accounting-and-finance/people-profiles/w-alec-cram</a></p><p><i>Papers Mentioned in this Episode:</i></p><p>Cram, W. A., D'arcy, J., & Proudfoot, J. G. (2019). Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance. <i>MIS Quarterly</i>, <i>43</i>(2), 525-554.</p><p><i>Other Notes:</i><br /> </p><p>There was the punchline for an old joke in there, the original version is needlessly gendered, so I'll switch it and give the setup, </p><p>An engineer (Practitioner) and a Mathematician (Theorist) were drinking at a bar. They both order a pint, and the Mathematician shares, "If I drink half of this beer now, half of the remainder in after a minute, half again in two minutes, and so on I will be able to drink for the rest of time". The Engineer replies, "Yes but in five minutes you will be drunk enough to order another (Close enough to finished for all practical purposes)".  </p><p>~~~ </p><p>The sample from the start is from a film about factory safety that is in the Prelinger archives available at archive.org <a href="https://archive.org/details/1280FactorySafety">https://archive.org/details/1280FactorySafety</a></p><p>Piano is .... a piano. Cheezy casio drums are from <a href="https://lmms.io/">https://lmms.io/.  </a></p>
]]></content:encoded>
      <enclosure length="53039204" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/50a50a28-02b5-4c9b-a242-3ac99021cc73/cybercrimeology-ep18-alec-cram_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Will you comply?: Why employees follow IT Security Policy, or not.</itunes:title>
      <itunes:author>Alec Cram</itunes:author>
      <itunes:duration>00:55:12</itunes:duration>
      <itunes:summary>Why doesn&apos;t everyone follow the IT Security policy at their organization ?  Dr. Alec Cram from the University of Waterloo is with us to talk through a recent paper &quot;Seeing the forest and the trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance&quot; published in Management Information Systems Quarterly.</itunes:summary>
      <itunes:subtitle>Why doesn&apos;t everyone follow the IT Security policy at their organization ?  Dr. Alec Cram from the University of Waterloo is with us to talk through a recent paper &quot;Seeing the forest and the trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance&quot; published in Management Information Systems Quarterly.</itunes:subtitle>
      <itunes:keywords>compliance, mis, it security, cybercrime, cybersecurity, education, security policy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">83e58159-567a-4d95-a39e-827d88f68bd5</guid>
      <title>Town and Country: The role of Space, Place and Technology in Domestic and Family Violence</title>
      <description><![CDATA[<p><i>About the Guest:</i></p><p><a href="https://research.qut.edu.au/qut-law-lab/people/bridget-harris/">https://research.qut.edu.au/qut-law-lab/people/bridget-harris/</a></p><p> </p><p><i>Papers Mentioned in this Episode:</i></p><p>Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology, 59(3), 530-550.</p><p><a href="https://doi.org/10.1093/bjc/azy052">https://doi.org/10.1093/bjc/azy052</a></p><p> DeKeseredy, W. S., Schwartz, M. D., Harris, B., Woodlock, D., Nolan, J., & Hall-Sanchez, A. (2019). Technology-Facilitated Stalking and Unwanted Sexual Messages/Images in a College Campus Community: The Role of Negative Peer Support. SAGE Open. <a href="https://doi.org/10.1177/2158244019828231">https://doi.org/10.1177/2158244019828231</a></p><p>Stark, E. (2007). Coercive control: The entrapment of women in personal life. Oxford University Press.</p><p>Harris, Bridget (2020) Technology, domestic and family violence: perpetration, experiences and responses. QUT Centre for Justice.</p><p><a href="https://eprints.qut.edu.au/199781/">https://eprints.qut.edu.au/199781/</a></p><p> </p><p>~~~~~~</p><p>Monkey Fashion Incident was referring to the events of the article below.  It is hard to describe visual thinks like this without being offensive, my apologies if the reference was upsetting. </p><p>Blanchard, Tasmin (2019/02/08) Courting controversy: from H&M’s ‘coolest monkey’ to Gucci’s blackface jumper, The Guardian </p><p>https://www.theguardian.com/fashion/2019/feb/08/courting-controversy-from-hms-coolest-monkey-to-guccis-blackface-jumper</p><p>~~~~~~~~~</p><p> Online Safety resources in Australia :</p><p>https://wesnet.org.au/</p><p>https://www.esafety.gov.au/</p><p>~~~~</p><p>I drank a cup of tea before recording the introduction and close. Black Tea can make your mouth a little dry and it is not a good idea to drink it before recording voice.  I put the milk in after the hot water, I can not dismiss the suggestion that it is better that way(<a href="https://en.wikipedia.org/wiki/Lady_tasting_tea">https://en.wikipedia.org/wiki/Lady_tasting_tea)</a>.  If you listen to this with good quality headphones, I am sorry about the mouth noise.  The tea was good.  </p><p>~~~~~~~</p><p>Introduction was sampled from the "The Town and the Telephone" part of the Prelinger archives available at Archive.org. (<a href="https://archive.org/details/Townandt1950">https://archive.org/details/Townandt1950)</a></p><p>Music made with software from AudioKit. <a href="https://audiokitpro.com/">https://audiokitpro.com/ </a></p>
]]></description>
      <pubDate>Wed, 1 Jul 2020 04:00:03 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Bridget Harris)</author>
      <link>https://cybercrimeology.com/episodes/town-and-country-the-role-of-space-place-and-technology-in-domestic-and-family-violence-H5JcCCXr</link>
      <content:encoded><![CDATA[<p><i>About the Guest:</i></p><p><a href="https://research.qut.edu.au/qut-law-lab/people/bridget-harris/">https://research.qut.edu.au/qut-law-lab/people/bridget-harris/</a></p><p> </p><p><i>Papers Mentioned in this Episode:</i></p><p>Harris, B. A., & Woodlock, D. (2019). Digital coercive control: Insights from two landmark domestic violence studies. The British Journal of Criminology, 59(3), 530-550.</p><p><a href="https://doi.org/10.1093/bjc/azy052">https://doi.org/10.1093/bjc/azy052</a></p><p> DeKeseredy, W. S., Schwartz, M. D., Harris, B., Woodlock, D., Nolan, J., & Hall-Sanchez, A. (2019). Technology-Facilitated Stalking and Unwanted Sexual Messages/Images in a College Campus Community: The Role of Negative Peer Support. SAGE Open. <a href="https://doi.org/10.1177/2158244019828231">https://doi.org/10.1177/2158244019828231</a></p><p>Stark, E. (2007). Coercive control: The entrapment of women in personal life. Oxford University Press.</p><p>Harris, Bridget (2020) Technology, domestic and family violence: perpetration, experiences and responses. QUT Centre for Justice.</p><p><a href="https://eprints.qut.edu.au/199781/">https://eprints.qut.edu.au/199781/</a></p><p> </p><p>~~~~~~</p><p>Monkey Fashion Incident was referring to the events of the article below.  It is hard to describe visual thinks like this without being offensive, my apologies if the reference was upsetting. </p><p>Blanchard, Tasmin (2019/02/08) Courting controversy: from H&M’s ‘coolest monkey’ to Gucci’s blackface jumper, The Guardian </p><p>https://www.theguardian.com/fashion/2019/feb/08/courting-controversy-from-hms-coolest-monkey-to-guccis-blackface-jumper</p><p>~~~~~~~~~</p><p> Online Safety resources in Australia :</p><p>https://wesnet.org.au/</p><p>https://www.esafety.gov.au/</p><p>~~~~</p><p>I drank a cup of tea before recording the introduction and close. Black Tea can make your mouth a little dry and it is not a good idea to drink it before recording voice.  I put the milk in after the hot water, I can not dismiss the suggestion that it is better that way(<a href="https://en.wikipedia.org/wiki/Lady_tasting_tea">https://en.wikipedia.org/wiki/Lady_tasting_tea)</a>.  If you listen to this with good quality headphones, I am sorry about the mouth noise.  The tea was good.  </p><p>~~~~~~~</p><p>Introduction was sampled from the "The Town and the Telephone" part of the Prelinger archives available at Archive.org. (<a href="https://archive.org/details/Townandt1950">https://archive.org/details/Townandt1950)</a></p><p>Music made with software from AudioKit. <a href="https://audiokitpro.com/">https://audiokitpro.com/ </a></p>
]]></content:encoded>
      <enclosure length="38697249" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/374a9ea4-b7f0-4e63-9f43-6dce18679c06/cybercrimeology-ep17-bridget-harris_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Town and Country: The role of Space, Place and Technology in Domestic and Family Violence</itunes:title>
      <itunes:author>Bridget Harris</itunes:author>
      <itunes:duration>00:40:16</itunes:duration>
      <itunes:summary>Both the online and offline places and spaces where technology-facilitated domestic and violence happens can affect the experience.  Dr Bridget Harris, a senior researcher at the Queensland University of Technology School of Justice joins us to discuss her the &quot;Digital Coercive Control: Insights from two Landmark Domestic Violence Studies&quot;.</itunes:summary>
      <itunes:subtitle>Both the online and offline places and spaces where technology-facilitated domestic and violence happens can affect the experience.  Dr Bridget Harris, a senior researcher at the Queensland University of Technology School of Justice joins us to discuss her the &quot;Digital Coercive Control: Insights from two Landmark Domestic Violence Studies&quot;.</itunes:subtitle>
      <itunes:keywords>intimate partner violence, family violence, cybercrime, cyber harrassment, domestic violence, rural, cybersecurity, technology, education, diversity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7453c5e0-96a2-4ae5-a248-9333ed10b37a</guid>
      <title>The Online Frontline: Investigating and Preventing Cybercrime</title>
      <description><![CDATA[<p>Find out more about the Ontario Provincial Police here:</p><p><a href="https://www.opp.ca/">https://www.opp.ca/</a></p><p>~~~</p><p>No papers in this episode, it was so very practical. </p><p>The Office of the privacy Commissioner of Canada was mentioned. </p><p><a href="https://www.priv.gc.ca/en/">https://www.priv.gc.ca/en/</a></p><p>SERENE-RISC was mentioned a few times. That's my day job. You can find them (us) here: <a href="www.serene-risc.ca">www.serene-risc.ca</a>.</p><p>The opening was from a 1940s recruitment advertisement for the police service, part of the Prelinger archives on archive.org.</p><p><a href="https://archive.org/details/0456ElementsOfInvestigation01010403">https://archive.org/details/0456ElementsOfInvestigation01010403</a></p><p>If you do go and watch that movie, immediately cleanse your palate with episode 23 of the reducing crime podcast, to hear Mo McGough talk about the work to change this presentation and reality of the police.  </p><p><a href="https://www.reducingcrime.com/podcast">https://www.reducingcrime.com/podcast</a></p><p> </p>
]]></description>
      <pubDate>Mon, 15 Jun 2020 04:00:09 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Vern Crowley)</author>
      <link>https://cybercrimeology.com/episodes/the-online-frontline-l6UhoYyh</link>
      <content:encoded><![CDATA[<p>Find out more about the Ontario Provincial Police here:</p><p><a href="https://www.opp.ca/">https://www.opp.ca/</a></p><p>~~~</p><p>No papers in this episode, it was so very practical. </p><p>The Office of the privacy Commissioner of Canada was mentioned. </p><p><a href="https://www.priv.gc.ca/en/">https://www.priv.gc.ca/en/</a></p><p>SERENE-RISC was mentioned a few times. That's my day job. You can find them (us) here: <a href="www.serene-risc.ca">www.serene-risc.ca</a>.</p><p>The opening was from a 1940s recruitment advertisement for the police service, part of the Prelinger archives on archive.org.</p><p><a href="https://archive.org/details/0456ElementsOfInvestigation01010403">https://archive.org/details/0456ElementsOfInvestigation01010403</a></p><p>If you do go and watch that movie, immediately cleanse your palate with episode 23 of the reducing crime podcast, to hear Mo McGough talk about the work to change this presentation and reality of the police.  </p><p><a href="https://www.reducingcrime.com/podcast">https://www.reducingcrime.com/podcast</a></p><p> </p>
]]></content:encoded>
      <enclosure length="41971903" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/71a2672a-0d4e-4d61-92b9-54a3caa174ee/cybercrimeology-ep16-vern-crowley_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Online Frontline: Investigating and Preventing Cybercrime</itunes:title>
      <itunes:author>Vern Crowley</itunes:author>
      <itunes:duration>00:43:41</itunes:duration>
      <itunes:summary>In the criminal sytem, internet based offences are considered especially ... complex. In Ontario, the dedicated detectives who investigate these crimes are members of an elite squad known as the Cybercrime Investigation Team.  

To help us understand more of what this team does and the issues that they face, Detective Sargent Vern Crowley of the OPP Cybercrime Investigation Team joined me to explain some of the practice of cyber policing.  </itunes:summary>
      <itunes:subtitle>In the criminal sytem, internet based offences are considered especially ... complex. In Ontario, the dedicated detectives who investigate these crimes are members of an elite squad known as the Cybercrime Investigation Team.  

To help us understand more of what this team does and the issues that they face, Detective Sargent Vern Crowley of the OPP Cybercrime Investigation Team joined me to explain some of the practice of cyber policing.  </itunes:subtitle>
      <itunes:keywords>dfir, police, cybercrime, ransomware, cybersecurity, education, investigation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">710002de-7a92-4b0c-8c99-6cdc7d791e43</guid>
      <title>The Things of Internet: Actor Network Theory and Cybercrime</title>
      <description><![CDATA[<p><strong>About the guest:</strong></p><p>https://www.eur.nl/people/wytske-van-der-wagen</p><p><strong>Papers mentioned in this episode:</strong></p><p>Wytske van der Wagen, The Significance of ‘Things’ in Cybercrime: How to Apply Actor-network Theory in (Cyber)criminological Research and Why it Matters, Journal of Extreme Anthropology, Volume 3 Number 1, 2019</p><p>Assistant Professor at Erasmus University, Department of Criminology</p><p>DOI: https://doi.org/10.5617/jea.6895</p><p>Wytske van der Wagen, Wolter Pieters, From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 578–595,</p><p>https://doi.org/10.1093/bjc/azv009</p><p>van der Wagen, W., & Pieters, W. (2018). The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology. https://doi.org/10.1177/1477370818812016</p><p>Wytske van der Wagen, From cybercrime to cyborg crime</p><p><i>Authors Manuscript version:</i></p><p>https://www.rug.nl/research/portal/files/61493330/Chapter_1.pdf</p><p>Extract from:</p><p>van der Wagen, W. (2018). From cybercrime to cyborg crime: An exploration of high-tech cybercrime,</p><p>offenders and victims through the lens of Actor-Network Theory. [Groningen]: Rijksuniversiteit Groningen.</p><p>https://www.rug.nl/research/portal/en/publications/from-cybercrime-to-cyborg-crime(f3a5c5e0-ff0f-4dad-ac6c-2bc91d96a1b4).html</p><p><strong>Other:</strong></p><p><i>The Samy Kamkar MySpace Worm</i></p><p>Greatest Moments in Hacking History: Samy Kamkar Takes Down Myspace</p><p>5 minute Video from MotherBoard.</p><p><a href="https://www.youtube.com/watch?v=DtnuaHl378M">https://www.youtube.com/watch?v=DtnuaHl378M</a></p><p>~~~~~</p><p><i>That EternalBlue thing that became crimeware</i></p><p>The Leaked NSA Spy Tool That Hacked the World by Lily Hay Newman on Wired.com (03/07/2018)</p><p><a href="https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/">https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/</a></p><p>WannaCry – Important lessons from the first NSA-powered ransomware cyberattack</p><p>By Pierluigi Paganini, May 16, 2017</p><p><a href="http://securityaffairs.co/wordpress/59154/cyber-crime/wannacry-nsa-powered-ransomware-cyberattack.html">http://securityaffairs.co/wordpress/59154/cyber-crime/wannacry-nsa-powered-ransomware-cyberattack.html</a></p><p>~~~~</p><p><i>The BredoLab Botnet</i></p><p>Bredolab: Jail for man who masterminded botnet of 30 million computers</p><p>by Graham Cluley, 23 MAY 2012</p><p><a href="https://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/">https://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/</a></p><p> </p><p>Wikipedia on the BedoLab botnet</p><p>https://en.wikipedia.org/wiki/Bredolab_botnet</p><p>~~~~~</p><p>Sorry for the Pronunciation of Kubernētēs, I tried, but I am not sure than I managed more than a "foreign word" accent.</p><p>If all you have is a hammer, all you see is nails, but every tool's a hammer.  </p><p>https://en.wikipedia.org/wiki/Law_of_the_instrument</p><p>https://www.goodreads.com/book/show/43319933-every-tool-s-a-hammer</p><p> </p>
]]></description>
      <pubDate>Mon, 1 Jun 2020 04:00:16 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Wytske van der Wagen)</author>
      <link>https://cybercrimeology.com/episodes/the-things-of-internet-actor-network-theory-and-cybercrime-UVooahfb</link>
      <content:encoded><![CDATA[<p><strong>About the guest:</strong></p><p>https://www.eur.nl/people/wytske-van-der-wagen</p><p><strong>Papers mentioned in this episode:</strong></p><p>Wytske van der Wagen, The Significance of ‘Things’ in Cybercrime: How to Apply Actor-network Theory in (Cyber)criminological Research and Why it Matters, Journal of Extreme Anthropology, Volume 3 Number 1, 2019</p><p>Assistant Professor at Erasmus University, Department of Criminology</p><p>DOI: https://doi.org/10.5617/jea.6895</p><p>Wytske van der Wagen, Wolter Pieters, From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 578–595,</p><p>https://doi.org/10.1093/bjc/azv009</p><p>van der Wagen, W., & Pieters, W. (2018). The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology. https://doi.org/10.1177/1477370818812016</p><p>Wytske van der Wagen, From cybercrime to cyborg crime</p><p><i>Authors Manuscript version:</i></p><p>https://www.rug.nl/research/portal/files/61493330/Chapter_1.pdf</p><p>Extract from:</p><p>van der Wagen, W. (2018). From cybercrime to cyborg crime: An exploration of high-tech cybercrime,</p><p>offenders and victims through the lens of Actor-Network Theory. [Groningen]: Rijksuniversiteit Groningen.</p><p>https://www.rug.nl/research/portal/en/publications/from-cybercrime-to-cyborg-crime(f3a5c5e0-ff0f-4dad-ac6c-2bc91d96a1b4).html</p><p><strong>Other:</strong></p><p><i>The Samy Kamkar MySpace Worm</i></p><p>Greatest Moments in Hacking History: Samy Kamkar Takes Down Myspace</p><p>5 minute Video from MotherBoard.</p><p><a href="https://www.youtube.com/watch?v=DtnuaHl378M">https://www.youtube.com/watch?v=DtnuaHl378M</a></p><p>~~~~~</p><p><i>That EternalBlue thing that became crimeware</i></p><p>The Leaked NSA Spy Tool That Hacked the World by Lily Hay Newman on Wired.com (03/07/2018)</p><p><a href="https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/">https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/</a></p><p>WannaCry – Important lessons from the first NSA-powered ransomware cyberattack</p><p>By Pierluigi Paganini, May 16, 2017</p><p><a href="http://securityaffairs.co/wordpress/59154/cyber-crime/wannacry-nsa-powered-ransomware-cyberattack.html">http://securityaffairs.co/wordpress/59154/cyber-crime/wannacry-nsa-powered-ransomware-cyberattack.html</a></p><p>~~~~</p><p><i>The BredoLab Botnet</i></p><p>Bredolab: Jail for man who masterminded botnet of 30 million computers</p><p>by Graham Cluley, 23 MAY 2012</p><p><a href="https://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/">https://nakedsecurity.sophos.com/2012/05/23/bredolab-jail-botnet/</a></p><p> </p><p>Wikipedia on the BedoLab botnet</p><p>https://en.wikipedia.org/wiki/Bredolab_botnet</p><p>~~~~~</p><p>Sorry for the Pronunciation of Kubernētēs, I tried, but I am not sure than I managed more than a "foreign word" accent.</p><p>If all you have is a hammer, all you see is nails, but every tool's a hammer.  </p><p>https://en.wikipedia.org/wiki/Law_of_the_instrument</p><p>https://www.goodreads.com/book/show/43319933-every-tool-s-a-hammer</p><p> </p>
]]></content:encoded>
      <enclosure length="37516622" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/a7336591-b541-49d1-906f-166f7a536d2e/cybercrimeology-ep15-wystkevandewagen_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Things of Internet: Actor Network Theory and Cybercrime</itunes:title>
      <itunes:author>Wytske van der Wagen</itunes:author>
      <itunes:duration>00:39:03</itunes:duration>
      <itunes:summary>What is the role of the technology in cybercrime.

If that role is substantial, shouldn&apos;t we consider it in our models of criminal activity?
Dr Wystke Van der Wagen help us better understand Actor Network Theory and its application to the study of cybercrime.</itunes:summary>
      <itunes:subtitle>What is the role of the technology in cybercrime.

If that role is substantial, shouldn&apos;t we consider it in our models of criminal activity?
Dr Wystke Van der Wagen help us better understand Actor Network Theory and its application to the study of cybercrime.</itunes:subtitle>
      <itunes:keywords>crime, cybercrime, science, cybersecurity, actor network theory, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cdf5ed96-91cf-47d6-8b12-0fd993a4b341</guid>
      <title>Cybercrime and Deterrence: The Theory behind Stop it!, or else ...</title>
      <description><![CDATA[<p><strong>About the Guest:</strong></p><p><a href="https://aysps.gsu.edu/profile/david-maimon-2/">https://aysps.gsu.edu/profile/david-maimon-2/</a></p><p>The Evidence-Based Cybersecurity Research Group</p><p><a href="https://ebcs.gsu.edu/">https://ebcs.gsu.edu/</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>MAIMON, D., ALPER, M., SOBESTO, B. and CUKIER, M. (2014), RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM. Criminology, 52: 33-59. doi:<a href="https://doi.org/10.1111/1745-9125.12028">10.1111/1745-9125.12028</a></p><p>Testa, A., Maimon, D., Sobesto, B. and Cukier, M. (2017), Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy, 16: 689-726. doi:<a href="https://doi.org/10.1111/1745-9133.12312">10.1111/1745-9133.12312</a></p><p>David Maimon, Theodore Wilson, Wuling Ren, Tamar Berenblum, On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, <i>The British Journal of Criminology</i>, Volume 55, Issue 3, May 2015, Pages 615–634, <a href="https://doi.org/10.1093/bjc/azu104">https://doi.org/10.1093/bjc/azu104</a></p><p><strong>Other:</strong></p><p>Not mentioned at all but this series of white papers compiling evidence for particular defensive tools or strategies is very handy.  </p><ul><li>Existing Evidence for the Effectiveness of Antivirus in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Firewalls in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Honeypots in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of IDS/IPS in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Passwords in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Prompt Vulnerability Patching in Preventing Cyber Crime Incidents, David Maimon</li></ul><p><a href="https://scholarworks.gsu.edu/ebcs_tools/">https://scholarworks.gsu.edu/ebcs_tools/</a> </p><p> </p>
]]></description>
      <pubDate>Fri, 15 May 2020 04:00:15 +0000</pubDate>
      <author>cybercrimeology@gmail.com (David Maimon)</author>
      <link>https://cybercrimeology.com/episodes/cybercrime-and-deterrence-the-theory-behind-stop-it-or-else-czc63A7g</link>
      <content:encoded><![CDATA[<p><strong>About the Guest:</strong></p><p><a href="https://aysps.gsu.edu/profile/david-maimon-2/">https://aysps.gsu.edu/profile/david-maimon-2/</a></p><p>The Evidence-Based Cybersecurity Research Group</p><p><a href="https://ebcs.gsu.edu/">https://ebcs.gsu.edu/</a></p><p><strong>Papers mentioned in this episode:</strong></p><p>MAIMON, D., ALPER, M., SOBESTO, B. and CUKIER, M. (2014), RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM. Criminology, 52: 33-59. doi:<a href="https://doi.org/10.1111/1745-9125.12028">10.1111/1745-9125.12028</a></p><p>Testa, A., Maimon, D., Sobesto, B. and Cukier, M. (2017), Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy, 16: 689-726. doi:<a href="https://doi.org/10.1111/1745-9133.12312">10.1111/1745-9133.12312</a></p><p>David Maimon, Theodore Wilson, Wuling Ren, Tamar Berenblum, On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, <i>The British Journal of Criminology</i>, Volume 55, Issue 3, May 2015, Pages 615–634, <a href="https://doi.org/10.1093/bjc/azu104">https://doi.org/10.1093/bjc/azu104</a></p><p><strong>Other:</strong></p><p>Not mentioned at all but this series of white papers compiling evidence for particular defensive tools or strategies is very handy.  </p><ul><li>Existing Evidence for the Effectiveness of Antivirus in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Firewalls in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Honeypots in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of IDS/IPS in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Passwords in Preventing Cyber Crime Incidents, David Maimon</li><li>Existing Evidence for the Effectiveness of Prompt Vulnerability Patching in Preventing Cyber Crime Incidents, David Maimon</li></ul><p><a href="https://scholarworks.gsu.edu/ebcs_tools/">https://scholarworks.gsu.edu/ebcs_tools/</a> </p><p> </p>
]]></content:encoded>
      <enclosure length="35668832" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/72bce926-3008-4367-8813-76c4e30d5418/cybercrimeology-ep14-maimon-david_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cybercrime and Deterrence: The Theory behind Stop it!, or else ...</itunes:title>
      <itunes:author>David Maimon</itunes:author>
      <itunes:duration>00:37:08</itunes:duration>
      <itunes:summary>Deterrence Theory might be deceptively simple, but complex in its application, and there may well be no place more complicated for application than cyberspace. Dr David Maimon helps us understand better the detail of Deterrence Theory and its practical uses online. David Maimon is the Director of the Evidence Based Cybersecurity Research Group and an Associate Professor in the department of Criminal Justice and Criminology at Georgia State University.</itunes:summary>
      <itunes:subtitle>Deterrence Theory might be deceptively simple, but complex in its application, and there may well be no place more complicated for application than cyberspace. Dr David Maimon helps us understand better the detail of Deterrence Theory and its practical uses online. David Maimon is the Director of the Evidence Based Cybersecurity Research Group and an Associate Professor in the department of Criminal Justice and Criminology at Georgia State University.</itunes:subtitle>
      <itunes:keywords>situational crime prevention, cpted, deterrence, cybercrime, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13fdb56c-e097-44d7-ba02-ccfb1d0336c3</guid>
      <title>Cyber-Routine Activities Theory: Risky business</title>
      <description><![CDATA[<p>About the Guest:</p><p><a href="https://www.bu.edu/met/faculty/full-time/kyung-shick-choi/">https://www.bu.edu/met/faculty/full-time/kyung-shick-choi/</a></p><p><a href="https://services.bridgew.edu/Directory/search_person.cfm?personList=1361">https://services.bridgew.edu/Directory/search_person.cfm?personList=1361</a></p><p>Papers mentioned in this episode:</p><p>Choi, K. S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. <i>Computers in Human Behavior</i>, <i>73</i>, 394-402.</p><p><a href="https://www.sciencedirect.com/science/article/pii/S0747563217302212">https://www.sciencedirect.com/science/article/pii/S0747563217302212</a></p><p>Choi, K. S. (2010). <i>Risk factors in computer-crime victimization</i>. LFB Scholarly Pub..</p><p><a href="https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=260371">https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=260371</a></p><p>Other:</p><p>International Journal of Cybersecurity Intelligence & Cybercrime</p><p><a href="https://vc.bridgew.edu/ijcic/">https://vc.bridgew.edu/ijcic/</a></p><p> </p>
]]></description>
      <pubDate>Fri, 1 May 2020 04:00:16 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Kyung-shik Choi)</author>
      <link>https://cybercrimeology.com/episodes/cyber-routine-activities-theory-risky-business-q4Unximp</link>
      <content:encoded><![CDATA[<p>About the Guest:</p><p><a href="https://www.bu.edu/met/faculty/full-time/kyung-shick-choi/">https://www.bu.edu/met/faculty/full-time/kyung-shick-choi/</a></p><p><a href="https://services.bridgew.edu/Directory/search_person.cfm?personList=1361">https://services.bridgew.edu/Directory/search_person.cfm?personList=1361</a></p><p>Papers mentioned in this episode:</p><p>Choi, K. S., & Lee, J. R. (2017). Theoretical analysis of cyber-interpersonal violence victimization and offending using cyber-routine activities theory. <i>Computers in Human Behavior</i>, <i>73</i>, 394-402.</p><p><a href="https://www.sciencedirect.com/science/article/pii/S0747563217302212">https://www.sciencedirect.com/science/article/pii/S0747563217302212</a></p><p>Choi, K. S. (2010). <i>Risk factors in computer-crime victimization</i>. LFB Scholarly Pub..</p><p><a href="https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=260371">https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=260371</a></p><p>Other:</p><p>International Journal of Cybersecurity Intelligence & Cybercrime</p><p><a href="https://vc.bridgew.edu/ijcic/">https://vc.bridgew.edu/ijcic/</a></p><p> </p>
]]></content:encoded>
      <enclosure length="32197270" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/9c64d7be-1e59-40a3-9a91-6dcf5d260225/cybercrimeology-ep12a-choi-kyung-shik_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Cyber-Routine Activities Theory: Risky business</itunes:title>
      <itunes:author>Kyung-shik Choi</itunes:author>
      <itunes:duration>00:33:31</itunes:duration>
      <itunes:summary>Continuing on our quest to learn cybercrime theory, we talk with Dr Kyung-shick Choi about Cyber-Routine Activities theory and its application in the dynamic environment of the fourth industrial revolution. Dr. Choi is the Director of cybercrime and cybersecurity at Boston University and Professor at the Bridgewater state university College of Criminal Justice. </itunes:summary>
      <itunes:subtitle>Continuing on our quest to learn cybercrime theory, we talk with Dr Kyung-shick Choi about Cyber-Routine Activities theory and its application in the dynamic environment of the fourth industrial revolution. Dr. Choi is the Director of cybercrime and cybersecurity at Boston University and Professor at the Bridgewater state university College of Criminal Justice. </itunes:subtitle>
      <itunes:keywords>cybercrime, theory, science, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cd1387d2-9b23-41e2-94ff-71c42fe639e8</guid>
      <title>Social Learning Theory and Cybercrime: The impact of Family, Friends and Bronies</title>
      <description><![CDATA[<p>More about the Guest :</p><p><a href="http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659">http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659</a></p><p>Papers Mentioned in this episode:</p><p>Thomas J. Holt, George W. Burruss & Adam M. Bossler (2010) SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD, Journal of Crime and Justice, 33:2, 31-61, DOI: <a href="https://doi.org/10.1080/0735648X.2010.9721287">10.1080/0735648X.2010.9721287</a></p><p>Burruss, G. W., Bossler, A. M., & Holt, T. J. (2013). Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control’s Influence on Software Piracy. Crime & Delinquency, 59(8), 1157–1184. <a href="https://doi.org/10.1177/0011128712437915">https://doi.org/10.1177/0011128712437915</a></p><p> </p><p>Burruss, G. W., Holt, T. J., & Bossler, A. (2019). Revisiting the Suppression Relationship Between Social Learning and Self-Control on Software Piracy. Social Science Computer Review, 37(2), 178–195. <a href="https://doi.org/10.1177/0894439317753820">https://doi.org/10.1177/0894439317753820</a></p><p>Other:</p><p>It is important to note that criminological theories discuss 'deviance' using the term without a negative connotation.  It is used in the sense that a set of behaviours or attitudes diverge from the usual standards for a particular society.  In this sense there is little difference between gang members, drug users, monks or fans of the insane clown posse.  To make the idea of deviancy less alien, it helps to think of non-criminal groups that are different from the mainstream. In this case we discussed drug use and bronies as a way of placing hacking and digital piracy in a context of a different social group with associated definitions and values.  Neither of us has a problem with bronies. Personally, I think that they are an important group helping to expose and break down traditional and potentially toxic gender roles.  Also, they are a great example of the importance of art in both shaping and permitting wider societal expression.  If you don't know what a brony is there are plenty of documentaries, but this page is quite helpful : <a href="https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/">https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/ </a></p><p> </p><p> </p>
]]></description>
      <pubDate>Wed, 15 Apr 2020 04:00:02 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Michael)</author>
      <link>https://cybercrimeology.com/episodes/social-learning-theory-and-cybercrime-the-impact-of-family-friends-and-bronies-yBkcbI8L</link>
      <content:encoded><![CDATA[<p>More about the Guest :</p><p><a href="http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659">http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659</a></p><p>Papers Mentioned in this episode:</p><p>Thomas J. Holt, George W. Burruss & Adam M. Bossler (2010) SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD, Journal of Crime and Justice, 33:2, 31-61, DOI: <a href="https://doi.org/10.1080/0735648X.2010.9721287">10.1080/0735648X.2010.9721287</a></p><p>Burruss, G. W., Bossler, A. M., & Holt, T. J. (2013). Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control’s Influence on Software Piracy. Crime & Delinquency, 59(8), 1157–1184. <a href="https://doi.org/10.1177/0011128712437915">https://doi.org/10.1177/0011128712437915</a></p><p> </p><p>Burruss, G. W., Holt, T. J., & Bossler, A. (2019). Revisiting the Suppression Relationship Between Social Learning and Self-Control on Software Piracy. Social Science Computer Review, 37(2), 178–195. <a href="https://doi.org/10.1177/0894439317753820">https://doi.org/10.1177/0894439317753820</a></p><p>Other:</p><p>It is important to note that criminological theories discuss 'deviance' using the term without a negative connotation.  It is used in the sense that a set of behaviours or attitudes diverge from the usual standards for a particular society.  In this sense there is little difference between gang members, drug users, monks or fans of the insane clown posse.  To make the idea of deviancy less alien, it helps to think of non-criminal groups that are different from the mainstream. In this case we discussed drug use and bronies as a way of placing hacking and digital piracy in a context of a different social group with associated definitions and values.  Neither of us has a problem with bronies. Personally, I think that they are an important group helping to expose and break down traditional and potentially toxic gender roles.  Also, they are a great example of the importance of art in both shaping and permitting wider societal expression.  If you don't know what a brony is there are plenty of documentaries, but this page is quite helpful : <a href="https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/">https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/ </a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="40473900" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/cea81ec6-7c72-41e2-ad13-8185902ffe40/cybercrimeology-ep12-burruss-george_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Social Learning Theory and Cybercrime: The impact of Family, Friends and Bronies</itunes:title>
      <itunes:author>Michael</itunes:author>
      <itunes:duration>00:42:08</itunes:duration>
      <itunes:summary>This is the third part of a series on Theory and cybercrime.  We talk with Dr. George Burruss,  Associate Professor and Associate Chair in the Department of Criminology at the university of south florida and affiliated with the Florida Cybersecurity Center. Dr Burruss has authored a number of papers working with social learning theory and is well qualified to help us learn more about how this theory can provide explanations for why people become cybercriminals.  </itunes:summary>
      <itunes:subtitle>This is the third part of a series on Theory and cybercrime.  We talk with Dr. George Burruss,  Associate Professor and Associate Chair in the Department of Criminology at the university of south florida and affiliated with the Florida Cybersecurity Center. Dr Burruss has authored a number of papers working with social learning theory and is well qualified to help us learn more about how this theory can provide explanations for why people become cybercriminals.  </itunes:subtitle>
      <itunes:keywords>social learning theory, cybercrime, theory, science, cybersecurity, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc22636c-763b-4c03-b8de-328860580538</guid>
      <title>General Theory and Cybercrime: Low Self-Control and crime online</title>
      <description><![CDATA[<p><strong>Find out more about the guest:</strong></p><p>Dr Catherine Marcum is an Assistant Chair of Government and Justice studies at Appalachian State University</p><p> </p><p>https://gjs.appstate.edu/directory/dr-cathy-marcum</p><p>~~~~</p><p><strong>Texts Mentioned in this show:</strong></p><p>Marcum, C.D., Higgins, G.E., & Nicholson, J. (2018). Crossing Boundaries Online in Romantic Relationships: An Exploratory Study of the Perceptions of Impact on Partners by Cyberstalking Offenders. Deviant Behavior, 39(6</p><p>Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.</p><p>Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Sexting behaviors among adolescents in rural North Carolina: a theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2).</p><p> </p><p>Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581-591.</p><p><strong>More:</strong></p><p>You can learn about the DARE Program here:</p><p>https://www.history.com/topics/1980s/just-say-no</p><p>https://en.wikipedia.org/wiki/Drug_Abuse_Resistance_Education</p><p> </p><p>The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource.  https://archive.org/details/prelinger</p>
]]></description>
      <pubDate>Wed, 1 Apr 2020 04:00:24 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Catherine Marcum)</author>
      <link>https://cybercrimeology.com/episodes/general-theory-and-cybercrime-low-self-control-and-crime-online-KbRvScbH</link>
      <content:encoded><![CDATA[<p><strong>Find out more about the guest:</strong></p><p>Dr Catherine Marcum is an Assistant Chair of Government and Justice studies at Appalachian State University</p><p> </p><p>https://gjs.appstate.edu/directory/dr-cathy-marcum</p><p>~~~~</p><p><strong>Texts Mentioned in this show:</strong></p><p>Marcum, C.D., Higgins, G.E., & Nicholson, J. (2018). Crossing Boundaries Online in Romantic Relationships: An Exploratory Study of the Perceptions of Impact on Partners by Cyberstalking Offenders. Deviant Behavior, 39(6</p><p>Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.</p><p>Marcum, C. D., Higgins, G. E., & Ricketts, M. L. (2014). Sexting behaviors among adolescents in rural North Carolina: a theoretical examination of low self-control and deviant peer association. International Journal of Cyber Criminology, 8(2).</p><p> </p><p>Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35(7), 581-591.</p><p><strong>More:</strong></p><p>You can learn about the DARE Program here:</p><p>https://www.history.com/topics/1980s/just-say-no</p><p>https://en.wikipedia.org/wiki/Drug_Abuse_Resistance_Education</p><p> </p><p>The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource.  https://archive.org/details/prelinger</p>
]]></content:encoded>
      <enclosure length="36540753" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/282c8c7b-2fd6-43bd-9880-545a14248281/cybercrimeology-ep11-cathy-marcum_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>General Theory and Cybercrime: Low Self-Control and crime online</itunes:title>
      <itunes:author>Catherine Marcum</itunes:author>
      <itunes:duration>00:38:03</itunes:duration>
      <itunes:summary>The general theory of crime or low self-control theory provides an explanation as to why some people commit crime.  Does this theory help when we are discussing online crime? What can it tell us about cybercriminals.  Dr Cathy Marcum helps us learn about this theory and walks us through some applications of it to the online environment.  </itunes:summary>
      <itunes:subtitle>The general theory of crime or low self-control theory provides an explanation as to why some people commit crime.  Does this theory help when we are discussing online crime? What can it tell us about cybercriminals.  Dr Cathy Marcum helps us learn about this theory and walks us through some applications of it to the online environment.  </itunes:subtitle>
      <itunes:keywords>self-control, cybercrime, cyber-bullying, theory, criminology, science</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">882ce15b-ca91-42f1-acd7-f95fd5040b68</guid>
      <title>Getting started with Cybercrime Theory</title>
      <description><![CDATA[<p><strong>Find out more about the guest:</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. </p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p>~~~~</p><p><strong>Texts Mentioned in this show:</strong></p><p>Holt, T. J., & Bossler, A. M. (2015). <i>Cybercrime in progress: Theory and prevention of technology-enabled offenses</i>. Routledge.</p><p><a href="https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168">https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168</a></p><p>~~~~~~~</p><p>Deterrence Theory </p><p><a href="https://www.sciencedirect.com/topics/computer-science/deterrence-theory">https://www.sciencedirect.com/topics/computer-science/deterrence-theory</a></p><p>General Theory - Self control </p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?</a></p><p>Social Learning Theory </p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?</a></p><p>Sub-Cultures of Crime </p><p><a href="https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en">https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en</a></p><p>Techniques of Neutralization and Drift</p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml</a></p><p>Actor Network Theory</p><p><a href="https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory">https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory</a></p><p>Drake presents a story of moving from the bottom to here, not sure where here is though.   <a> https://youtu.be/RubBzkZzpUA</a></p><p> </p><p>Gauthier and Forsyth provide an analysis of "Bug-Chasing". </p><p>K. Gauthier, D., & J. Forsyth, C. (1999). Bareback sex, bug chasers, and the gift of death. <i>Deviant Behavior</i>, <i>20</i>(1), 85-100.</p><p><a href="https://www.tandfonline.com/doi/abs/10.1080/016396299266605">https://www.tandfonline.com/doi/abs/10.1080/016396299266605</a></p><p>If you are curious about the rules of the internet, bear in mind that these have always been very dynamic.  The link below shows a list.  Keep in mind that a lot of this is a joke, and there was never any real process for deciding on this rules, apart from they should be funny.  Rumour is that rule 34 was the first rule.  If you have no idea what this is all about then take care in researching as it is all 'fringe' internet culture, mostly NSFW and some things cannot be unseen.   The link below is picture free, apart from some ascii graphics. </p><p><a href="https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page">https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page</a></p><p> </p><p>The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource.  <a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a></p>
]]></description>
      <pubDate>Sun, 15 Mar 2020 04:00:04 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Tom Holt)</author>
      <link>https://cybercrimeology.com/episodes/getting-started-with-cybercrime-theory-Q_rcRq2T</link>
      <content:encoded><![CDATA[<p><strong>Find out more about the guest:</strong></p><p>Dr. Tom Holt is a Professor in the School of Criminal Justice at Michigan State University. </p><p><a href="https://cj.msu.edu/directory/holt-thomas.html">https://cj.msu.edu/directory/holt-thomas.html</a></p><p>~~~~</p><p><strong>Texts Mentioned in this show:</strong></p><p>Holt, T. J., & Bossler, A. M. (2015). <i>Cybercrime in progress: Theory and prevention of technology-enabled offenses</i>. Routledge.</p><p><a href="https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168">https://www.routledge.com/Cybercrime-in-Progress-Theory-and-prevention-of-technology-enabled-offenses/Holt-Bossler/p/book/9781138024168</a></p><p>~~~~~~~</p><p>Deterrence Theory </p><p><a href="https://www.sciencedirect.com/topics/computer-science/deterrence-theory">https://www.sciencedirect.com/topics/computer-science/deterrence-theory</a></p><p>General Theory - Self control </p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0004.xml?</a></p><p>Social Learning Theory </p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0002.xml?</a></p><p>Sub-Cultures of Crime </p><p><a href="https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en">https://soztheo.de/theories-of-crime/learning-subculture/subcultural-theory-cohen/?lang=en</a></p><p>Techniques of Neutralization and Drift</p><p><a href="https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml">https://www.oxfordbibliographies.com/view/document/obo-9780195396607/obo-9780195396607-0140.xml</a></p><p>Actor Network Theory</p><p><a href="https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory">https://en.wikipedia.org/wiki/Actor%E2%80%93network_theory</a></p><p>Drake presents a story of moving from the bottom to here, not sure where here is though.   <a> https://youtu.be/RubBzkZzpUA</a></p><p> </p><p>Gauthier and Forsyth provide an analysis of "Bug-Chasing". </p><p>K. Gauthier, D., & J. Forsyth, C. (1999). Bareback sex, bug chasers, and the gift of death. <i>Deviant Behavior</i>, <i>20</i>(1), 85-100.</p><p><a href="https://www.tandfonline.com/doi/abs/10.1080/016396299266605">https://www.tandfonline.com/doi/abs/10.1080/016396299266605</a></p><p>If you are curious about the rules of the internet, bear in mind that these have always been very dynamic.  The link below shows a list.  Keep in mind that a lot of this is a joke, and there was never any real process for deciding on this rules, apart from they should be funny.  Rumour is that rule 34 was the first rule.  If you have no idea what this is all about then take care in researching as it is all 'fringe' internet culture, mostly NSFW and some things cannot be unseen.   The link below is picture free, apart from some ascii graphics. </p><p><a href="https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page">https://web.archive.org/web/20160217040548/http://rulesoftheinternet.com/index.php?title=Main_Page</a></p><p> </p><p>The introduction from this show was extracted from an educational show about the value of science. Check out the Prelinger archives for public domain videos containing interesting history. A wonderful resource.  <a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a></p>
]]></content:encoded>
      <enclosure length="46987588" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/67fe021c-01f5-4805-988a-d439171931e3/cybercrimeology-ep10-tom-holt_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Getting started with Cybercrime Theory</itunes:title>
      <itunes:author>Tom Holt</itunes:author>
      <itunes:duration>00:48:55</itunes:duration>
      <itunes:summary>This episode is a lighting overview of some of the more prominent theories applied in cybercrime research. Dr. Tom Holt helps us skip across a variety of theories including Routine Activities, Deterrence, Social Learning, Drift, Actor-Network, Sub-Cultures and more.  If you need a leg up into knowing about cybercrime theory, this is the episode for you.  The next episodes will dive deeper into individual theories.    </itunes:summary>
      <itunes:subtitle>This episode is a lighting overview of some of the more prominent theories applied in cybercrime research. Dr. Tom Holt helps us skip across a variety of theories including Routine Activities, Deterrence, Social Learning, Drift, Actor-Network, Sub-Cultures and more.  If you need a leg up into knowing about cybercrime theory, this is the episode for you.  The next episodes will dive deeper into individual theories.    </itunes:subtitle>
      <itunes:keywords>criminals, cybercrime, theory, criminology, science, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b8f8ebcb-0af3-4570-b5ff-a0959a6e922b</guid>
      <title>Why Sell Drugs Online?</title>
      <description><![CDATA[<p>Find out more about the guest:</p><p>http://rasmusmunksgaard.net/</p><p>Darknet and Anonymous Research Center</p><p>https://www.thedarc.org/en/</p><p>~~~~~~~~~~~~~~~~~~~~~~</p><p>Papers Mentioned in this Show:</p><p>Cryptomarkets: A Research Companion (2019) James Martin, Jack Cunliffe and Rasmus Munksgaard, Emerald Group Publishing, ISBN 1838670300, 9781838670306</p><p>Martin, J., Munksgaard, R., Coomber, R., Demant, J., & Barratt, M. J. (2019). Selling Drugs on Darkweb Cryptomarkets: Differentiated Pathways, Risks and Rewards. The British Journal of Criminology.</p><p><a href="https://www.gwern.net/docs/sr/2019-martin.pdf">https://www.gwern.net/docs/sr/2019-martin.pdf</a></p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>Other notes:</p><p>Commando was apparently upset because his daughter was kidnapped by a friend. https://www.imdb.com/title/tt0088944/</p><p>Rambo was struggling with PTSD in First blood, in the rest of the movies he seems to be trying to end war by shooting it. https://en.wikipedia.org/wiki/Rambo_(franchise)</p><p>Demolition man appears to be making a case for police brutality, still a great film though. Stalone is upset because he can't operate three shells and Snipes is upset because he was paying tax. https://www.imdb.com/title/tt0106697/</p><p>John Wick was upset because he had retired and had recently formed a close bond with a car and a dog. https://www.imdb.com/title/tt2911666/</p><p>Nice Burn at 34:20 Rasmus!, action movies were popular culture once upon a time :p.</p><p>In Breaking Bad, Walter White started selling meth for the money, not sure that was the only reason by the end of the show. https://www.imdb.com/title/tt0903747/</p><p>The introduction for this episode was extracted from Gangbusters, a radio show from the 1950s. It was supposedly a series of dramatized real FBI cases. Produced and directed by Phillips H. Lord together with Bureau director J. Edgar Hoover. Crime Awareness way back when. You can find it and other public domain resources at archive.org, https://archive.org/details/Gangbusters-Otr.</p><p> </p>
]]></description>
      <pubDate>Sun, 1 Mar 2020 05:00:05 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rasmus Munksgaard)</author>
      <link>https://cybercrimeology.com/episodes/why-sell-drugs-online-0yMTvPMz</link>
      <content:encoded><![CDATA[<p>Find out more about the guest:</p><p>http://rasmusmunksgaard.net/</p><p>Darknet and Anonymous Research Center</p><p>https://www.thedarc.org/en/</p><p>~~~~~~~~~~~~~~~~~~~~~~</p><p>Papers Mentioned in this Show:</p><p>Cryptomarkets: A Research Companion (2019) James Martin, Jack Cunliffe and Rasmus Munksgaard, Emerald Group Publishing, ISBN 1838670300, 9781838670306</p><p>Martin, J., Munksgaard, R., Coomber, R., Demant, J., & Barratt, M. J. (2019). Selling Drugs on Darkweb Cryptomarkets: Differentiated Pathways, Risks and Rewards. The British Journal of Criminology.</p><p><a href="https://www.gwern.net/docs/sr/2019-martin.pdf">https://www.gwern.net/docs/sr/2019-martin.pdf</a></p><p>~~~~~~~~~~~~~~~~~~~~~~~~~~~</p><p>Other notes:</p><p>Commando was apparently upset because his daughter was kidnapped by a friend. https://www.imdb.com/title/tt0088944/</p><p>Rambo was struggling with PTSD in First blood, in the rest of the movies he seems to be trying to end war by shooting it. https://en.wikipedia.org/wiki/Rambo_(franchise)</p><p>Demolition man appears to be making a case for police brutality, still a great film though. Stalone is upset because he can't operate three shells and Snipes is upset because he was paying tax. https://www.imdb.com/title/tt0106697/</p><p>John Wick was upset because he had retired and had recently formed a close bond with a car and a dog. https://www.imdb.com/title/tt2911666/</p><p>Nice Burn at 34:20 Rasmus!, action movies were popular culture once upon a time :p.</p><p>In Breaking Bad, Walter White started selling meth for the money, not sure that was the only reason by the end of the show. https://www.imdb.com/title/tt0903747/</p><p>The introduction for this episode was extracted from Gangbusters, a radio show from the 1950s. It was supposedly a series of dramatized real FBI cases. Produced and directed by Phillips H. Lord together with Bureau director J. Edgar Hoover. Crime Awareness way back when. You can find it and other public domain resources at archive.org, https://archive.org/details/Gangbusters-Otr.</p><p> </p>
]]></content:encoded>
      <enclosure length="42682623" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/eaaf0723-b779-434b-bc02-0287baa90771/cybercrimeology-ep09-rasmus-munksgaard_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Why Sell Drugs Online?</itunes:title>
      <itunes:author>Rasmus Munksgaard</itunes:author>
      <itunes:duration>00:44:26</itunes:duration>
      <itunes:summary>This episode we talk with Rasmus Munksgaard from the University of Montreal about why people sell drugs on Cryptomarkets.  Rasmus has recently co-authored a book and paper on the subject and has some interesting insights into the rather unexpectedly civil world of darknet drug dealers.</itunes:summary>
      <itunes:subtitle>This episode we talk with Rasmus Munksgaard from the University of Montreal about why people sell drugs on Cryptomarkets.  Rasmus has recently co-authored a book and paper on the subject and has some interesting insights into the rather unexpectedly civil world of darknet drug dealers.</itunes:subtitle>
      <itunes:keywords>cryptomarkets, cybercrime, drugs, cybersecurity, darknets, silk road, tor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0a3c1406-566f-41ef-bc74-dda41c0217d8</guid>
      <title>Goldphish memories: Aging and susceptibility to fraud</title>
      <description><![CDATA[<p><i>Find out more about the researcher:</i></p><p><a href="https://people.clas.ufl.edu/natalieebner/">https://people.clas.ufl.edu/natalieebner/</a></p><p><i>Papers Mentioned in this show:</i></p><p>Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., & Oliveira, D. S. (2018). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B.</p><p><a href="http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf">http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf</a></p><p> </p><p><i>More to read:</i></p><p> </p><p>Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. <i>ACM Transactions on Computer-Human Interaction (TOCHI)</i>, <i>26</i>(5), 1-28.</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3336141">https://dl.acm.org/doi/abs/10.1145/3336141</a></p><p>Oliveira, D.S., Lin, T., Rocha, H. <i>et al.</i> Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: an age-comparative perspective. <i>Crime Sci</i> <strong>8, </strong>3 (2019) doi:10.1186/s40163-019-0098-8</p><p><a href="https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8">https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8</a></p><p> </p><p><i>The intro from this show is from an educational video from the Prelinger Archives.  </i><a href="https://archive.org/details/prelinger"><i>https://archive.org/details/prelinger</i></a></p><p> </p>
]]></description>
      <pubDate>Sat, 15 Feb 2020 05:00:04 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Natalie Ebner)</author>
      <link>https://cybercrimeology.com/episodes/goldphish-memories-aging-and-susceptibility-to-fraud-AVQOchWN</link>
      <content:encoded><![CDATA[<p><i>Find out more about the researcher:</i></p><p><a href="https://people.clas.ufl.edu/natalieebner/">https://people.clas.ufl.edu/natalieebner/</a></p><p><i>Papers Mentioned in this show:</i></p><p>Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., & Oliveira, D. S. (2018). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B.</p><p><a href="http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf">http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf</a></p><p> </p><p><i>More to read:</i></p><p> </p><p>Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. <i>ACM Transactions on Computer-Human Interaction (TOCHI)</i>, <i>26</i>(5), 1-28.</p><p><a href="https://dl.acm.org/doi/abs/10.1145/3336141">https://dl.acm.org/doi/abs/10.1145/3336141</a></p><p>Oliveira, D.S., Lin, T., Rocha, H. <i>et al.</i> Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: an age-comparative perspective. <i>Crime Sci</i> <strong>8, </strong>3 (2019) doi:10.1186/s40163-019-0098-8</p><p><a href="https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8">https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8</a></p><p> </p><p><i>The intro from this show is from an educational video from the Prelinger Archives.  </i><a href="https://archive.org/details/prelinger"><i>https://archive.org/details/prelinger</i></a></p><p> </p>
]]></content:encoded>
      <enclosure length="29926291" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/5475b781-0f44-4f08-b2e6-63dfd76424ac/cybercrimeology-ep08-natalie-ebner-01_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Goldphish memories: Aging and susceptibility to fraud</itunes:title>
      <itunes:author>Natalie Ebner</itunes:author>
      <itunes:duration>00:31:09</itunes:duration>
      <itunes:summary>Our guest this episode is Dr. Natalie Ebner, an Associate Professor of Psychology at the University of Florida. She has been researching the psychology of aging and in particular how that aging can have an impact on susceptibility to online fraud and spam.</itunes:summary>
      <itunes:subtitle>Our guest this episode is Dr. Natalie Ebner, an Associate Professor of Psychology at the University of Florida. She has been researching the psychology of aging and in particular how that aging can have an impact on susceptibility to online fraud and spam.</itunes:subtitle>
      <itunes:keywords>prevention, aging, cybercrime, phishing, cybersecurity, education, awareness, psychology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c48cb90-e50d-4b7d-8029-6d8596319112</guid>
      <title>Turn up your Radio: Cybersecurity learning for older adults</title>
      <description><![CDATA[<p><i>More About  the researcher:</i></p><p><a href="https://www.northumbria.ac.uk/about-us/our-staff/n/james-nicholson/">https://www.northumbria.ac.uk/about-us/our-staff/n/james-nicholson/</a></p><p> </p><p><i>Papers mentioned in this episode:</i></p><p>Nicholson, J., Coventry, L., & Briggs, P. (2019, April). If It's Important It Will Be A Headline: Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (p. 349). ACM.</p><p><a href="https://dl.acm.org/doi/10.1145/3290605.3300579">https://dl.acm.org/doi/10.1145/3290605.3300579</a></p><p> </p><p>~~~~~</p><p>The introduction was from a video on the importance of radio.  Check out the Prelinger archives for public domain videos containing interesting history. <a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a>   </p><p>"Turn up your Radio"  was a song by Australian Rock group the Master's Apprentices.  If you read this far, treat yourself ;)/ </p>
]]></description>
      <pubDate>Sat, 1 Feb 2020 05:00:14 +0000</pubDate>
      <author>cybercrimeology@gmail.com (James Nicholson)</author>
      <link>https://cybercrimeology.com/episodes/turn-up-your-radio-cybersecurity-learning-for-older-adults-cgsK0Qwv</link>
      <content:encoded><![CDATA[<p><i>More About  the researcher:</i></p><p><a href="https://www.northumbria.ac.uk/about-us/our-staff/n/james-nicholson/">https://www.northumbria.ac.uk/about-us/our-staff/n/james-nicholson/</a></p><p> </p><p><i>Papers mentioned in this episode:</i></p><p>Nicholson, J., Coventry, L., & Briggs, P. (2019, April). If It's Important It Will Be A Headline: Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (p. 349). ACM.</p><p><a href="https://dl.acm.org/doi/10.1145/3290605.3300579">https://dl.acm.org/doi/10.1145/3290605.3300579</a></p><p> </p><p>~~~~~</p><p>The introduction was from a video on the importance of radio.  Check out the Prelinger archives for public domain videos containing interesting history. <a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a>   </p><p>"Turn up your Radio"  was a song by Australian Rock group the Master's Apprentices.  If you read this far, treat yourself ;)/ </p>
]]></content:encoded>
      <enclosure length="26225060" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/1c037cc9-922d-4312-adc4-a98bb519e226/cybercrimeology-ep07-james-nicolson_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Turn up your Radio: Cybersecurity learning for older adults</itunes:title>
      <itunes:author>James Nicholson</itunes:author>
      <itunes:duration>00:27:17</itunes:duration>
      <itunes:summary>In this episode we talk with Dr. James Nicolson, a Lecturer in the School of Computer and Information Sciences at Northumbria University about digital seniors and how they learn about cybersecurity.  This is an important topic as seniors are a growing online population but they are often overlooked by cybersecurity educators.  Being older doesn&apos;t mean that you are not able to use computers or practice good cybersecurity, but it is something that most of us have to learn. 
 Where do they gather their information from and what do they think about different sources of information ? </itunes:summary>
      <itunes:subtitle>In this episode we talk with Dr. James Nicolson, a Lecturer in the School of Computer and Information Sciences at Northumbria University about digital seniors and how they learn about cybersecurity.  This is an important topic as seniors are a growing online population but they are often overlooked by cybersecurity educators.  Being older doesn&apos;t mean that you are not able to use computers or practice good cybersecurity, but it is something that most of us have to learn. 
 Where do they gather their information from and what do they think about different sources of information ? </itunes:subtitle>
      <itunes:keywords>prevention, seniors, research, cybercrime, cybersecurity, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6b4741cc-89d0-455e-ad08-b5138680a18c</guid>
      <title>Good Habits: Teaching Digital Hygiene and Cyber Self-defence</title>
      <description><![CDATA[<p><i>Learn more about Dr. Ruth Shillair:</i></p><p><a href="https://comartsci.msu.edu/our-people/ruth-shillair">https://comartsci.msu.edu/our-people/ruth-shillair</a></p><p> </p><p><i>Papers Mentioned in this Show:</i></p><p>Mind the Gap: Perceived Self- Efficacy, Domain Knowledge and Their Effects on Responses to a Cybersecurity Compliance Message</p><p><a href="https://search.proquest.com/openview/4f7a33e56a07c7f9a3ecfb816a22fbdc/1?pq-origsite=gscholar&cbl=18750&diss=y">https://search.proquest.com/openview/4f7a33e56a07c7f9a3ecfb816a22fbdc/1?pq-origsite=gscholar&cbl=18750&diss=y</a></p><p>~~~~~~~</p><p>Multiple Sources for Security: Seeking Online Safety Information and their Influence on Coping Self-efficacy and Protection Behavior Habits</p><p><a href="https://scholarspace.manoa.hawaii.edu/handle/10125/41766">https://scholarspace.manoa.hawaii.edu/handle/10125/41766</a></p><p>~~~~~</p><p>Robin L. Nabi, David Roskos-Ewoldsen & Francesca Dillman Carpentier (2008) Subjective Knowledge and Fear Appeal Effectiveness: Implications for Message Design, Health Communication, 23:2, 191-201, DOI: 10.1080/10410230701808327</p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10410230701808327?casa_token=UmsHgY2iyLgAAAAA%3AIyyjYaafyC6VtNphiIwzJWYo95cZdEU4m7QYF-TRtcRcsHtV0iwXoJg4wveyaMmmMRQypbXSf03e-w">https://www.tandfonline.com/doi/full/10.1080/10410230701808327?casa_token=UmsHgY2iyLgAAAAA%3AIyyjYaafyC6VtNphiIwzJWYo95cZdEU4m7QYF-TRtcRcsHtV0iwXoJg4wveyaMmmMRQypbXSf03e-w</a></p><p> </p><p><i>The introduction was from a PSA on the dangers of bad habits.  Check out the Public Domain content of the Prelinger archives for more interesting historical recordings. </i><a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a></p>
]]></description>
      <pubDate>Wed, 15 Jan 2020 05:00:14 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Ruth Shilliar)</author>
      <link>https://cybercrimeology.com/episodes/good-habits-teaching-digital-hygiene-and-cyber-self-defence-_0fWh8pR</link>
      <content:encoded><![CDATA[<p><i>Learn more about Dr. Ruth Shillair:</i></p><p><a href="https://comartsci.msu.edu/our-people/ruth-shillair">https://comartsci.msu.edu/our-people/ruth-shillair</a></p><p> </p><p><i>Papers Mentioned in this Show:</i></p><p>Mind the Gap: Perceived Self- Efficacy, Domain Knowledge and Their Effects on Responses to a Cybersecurity Compliance Message</p><p><a href="https://search.proquest.com/openview/4f7a33e56a07c7f9a3ecfb816a22fbdc/1?pq-origsite=gscholar&cbl=18750&diss=y">https://search.proquest.com/openview/4f7a33e56a07c7f9a3ecfb816a22fbdc/1?pq-origsite=gscholar&cbl=18750&diss=y</a></p><p>~~~~~~~</p><p>Multiple Sources for Security: Seeking Online Safety Information and their Influence on Coping Self-efficacy and Protection Behavior Habits</p><p><a href="https://scholarspace.manoa.hawaii.edu/handle/10125/41766">https://scholarspace.manoa.hawaii.edu/handle/10125/41766</a></p><p>~~~~~</p><p>Robin L. Nabi, David Roskos-Ewoldsen & Francesca Dillman Carpentier (2008) Subjective Knowledge and Fear Appeal Effectiveness: Implications for Message Design, Health Communication, 23:2, 191-201, DOI: 10.1080/10410230701808327</p><p><a href="https://www.tandfonline.com/doi/full/10.1080/10410230701808327?casa_token=UmsHgY2iyLgAAAAA%3AIyyjYaafyC6VtNphiIwzJWYo95cZdEU4m7QYF-TRtcRcsHtV0iwXoJg4wveyaMmmMRQypbXSf03e-w">https://www.tandfonline.com/doi/full/10.1080/10410230701808327?casa_token=UmsHgY2iyLgAAAAA%3AIyyjYaafyC6VtNphiIwzJWYo95cZdEU4m7QYF-TRtcRcsHtV0iwXoJg4wveyaMmmMRQypbXSf03e-w</a></p><p> </p><p><i>The introduction was from a PSA on the dangers of bad habits.  Check out the Public Domain content of the Prelinger archives for more interesting historical recordings. </i><a href="https://archive.org/details/prelinger">https://archive.org/details/prelinger</a></p>
]]></content:encoded>
      <enclosure length="30684350" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/c9019832-fe79-4fe1-a18d-3d2e7034fdbd/cybercrimeology-ep06-ruth-shillair_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Good Habits: Teaching Digital Hygiene and Cyber Self-defence</itunes:title>
      <itunes:author>Ruth Shilliar</itunes:author>
      <itunes:duration>00:31:56</itunes:duration>
      <itunes:summary>This episode features Dr Ruth Shillair, from Michigan State University, who has conducted research into the development of cybersecurity capacity in terms of how it is learned, what is missing and what motivates us to attain it. Topics discussed include cybercrime prevention in terms of individuals, interfaces, industry and regulation. </itunes:summary>
      <itunes:subtitle>This episode features Dr Ruth Shillair, from Michigan State University, who has conducted research into the development of cybersecurity capacity in terms of how it is learned, what is missing and what motivates us to attain it. Topics discussed include cybercrime prevention in terms of individuals, interfaces, industry and regulation. </itunes:subtitle>
      <itunes:keywords>prevention, crime, research, cybercrime, cybersecurity, education, awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28798f5a-5bd2-4979-9770-30576a18cbe0</guid>
      <title>Organized Cybercrime: Its all about the Money</title>
      <description><![CDATA[<p><strong>Find out more about Dr Leukfedlt:</strong></p><p><a href="https://www.nscr.nl/en/author/rutger/">https://www.nscr.nl/en/author/rutger/</a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt">https://www.cybercrimeworkingroup.com/rutger-leukfeldt</a></p><p> </p><p><strong>Publication mentioned in the Podcast:</strong></p><p>A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists</p><p>Leukfeldt, E.R., Kleemans, E.R. & Stol, W.P. Crime Law Soc Change (2017) 67: 21. <a href="https://doi.org/10.1007/s10611-016-9662-2">https://doi.org/10.1007/s10611-016-9662-2</a></p><p> </p><p><strong>News article:</strong></p><p>Cryptocurrency Entrepreneur and Investor Michael Terpin Sues “Too Big to Care” AT&T for Permitting $23.8 Million Theft in “SIM Swap” Scam by Authorized Agent</p><p><a href="https://www.globenewswire.com/news-release/2018/08/15/1552594/0/en/Cryptocurrency-Entrepreneur-and-Investor-Michael-Terpin-Sues-Too-Big-to-Care-AT-T-for-Permitting-23-8-Million-Theft-in-SIM-Swap-Scam-by-Authorized-Agent.html">https://www.globenewswire.com/news-release/2018/08/15/1552594/0/en/Cryptocurrency-Entrepreneur-and-Investor-Michael-Terpin-Sues-Too-Big-to-Care-AT-T-for-Permitting-23-8-Million-Theft-in-SIM-Swap-Scam-by-Authorized-Agent.html</a></p><p> </p><p><strong>More Background for this discussion:</strong></p><p>Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness</p><p>Leukfeldt, E.R., Kleemans, E.R., Kruisbergen, E.W. et al. Trends Organ Crim (2019) 22: 324. <a href="https://doi.org/10.1007/s12117-019-09366-7">https://doi.org/10.1007/s12117-019-09366-7</a></p><p> </p><p><strong>Book</strong></p><p>The Human Factor of Cybercrime</p><p>by Rutger Leukfeldt, Thomas J. Holt</p><p><a href="https://www.crcpress.com/The-Human-Factor-of-Cybercrime/Leukfeldt-Holt/p/book/9781138624696">https://www.crcpress.com/The-Human-Factor-of-Cybercrime/Leukfeldt-Holt/p/book/9781138624696</a></p><p> </p><p> </p>
]]></description>
      <pubDate>Wed, 1 Jan 2020 05:00:05 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Rutger Leukfeldt)</author>
      <link>https://cybercrimeology.com/episodes/organized-cybercrime-its-all-about-the-money-_8zt_QM3</link>
      <content:encoded><![CDATA[<p><strong>Find out more about Dr Leukfedlt:</strong></p><p><a href="https://www.nscr.nl/en/author/rutger/">https://www.nscr.nl/en/author/rutger/</a></p><p><a href="https://www.cybercrimeworkingroup.com/rutger-leukfeldt">https://www.cybercrimeworkingroup.com/rutger-leukfeldt</a></p><p> </p><p><strong>Publication mentioned in the Podcast:</strong></p><p>A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists</p><p>Leukfeldt, E.R., Kleemans, E.R. & Stol, W.P. Crime Law Soc Change (2017) 67: 21. <a href="https://doi.org/10.1007/s10611-016-9662-2">https://doi.org/10.1007/s10611-016-9662-2</a></p><p> </p><p><strong>News article:</strong></p><p>Cryptocurrency Entrepreneur and Investor Michael Terpin Sues “Too Big to Care” AT&T for Permitting $23.8 Million Theft in “SIM Swap” Scam by Authorized Agent</p><p><a href="https://www.globenewswire.com/news-release/2018/08/15/1552594/0/en/Cryptocurrency-Entrepreneur-and-Investor-Michael-Terpin-Sues-Too-Big-to-Care-AT-T-for-Permitting-23-8-Million-Theft-in-SIM-Swap-Scam-by-Authorized-Agent.html">https://www.globenewswire.com/news-release/2018/08/15/1552594/0/en/Cryptocurrency-Entrepreneur-and-Investor-Michael-Terpin-Sues-Too-Big-to-Care-AT-T-for-Permitting-23-8-Million-Theft-in-SIM-Swap-Scam-by-Authorized-Agent.html</a></p><p> </p><p><strong>More Background for this discussion:</strong></p><p>Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness</p><p>Leukfeldt, E.R., Kleemans, E.R., Kruisbergen, E.W. et al. Trends Organ Crim (2019) 22: 324. <a href="https://doi.org/10.1007/s12117-019-09366-7">https://doi.org/10.1007/s12117-019-09366-7</a></p><p> </p><p><strong>Book</strong></p><p>The Human Factor of Cybercrime</p><p>by Rutger Leukfeldt, Thomas J. Holt</p><p><a href="https://www.crcpress.com/The-Human-Factor-of-Cybercrime/Leukfeldt-Holt/p/book/9781138624696">https://www.crcpress.com/The-Human-Factor-of-Cybercrime/Leukfeldt-Holt/p/book/9781138624696</a></p><p> </p><p> </p>
]]></content:encoded>
      <enclosure length="39192747" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/ee33c392-c009-4d2c-a52d-91d1ce566667/cybercrimeology-ep05-rutger-leukfeldt-01_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Organized Cybercrime: Its all about the Money</itunes:title>
      <itunes:author>Rutger Leukfeldt</itunes:author>
      <itunes:duration>00:40:48</itunes:duration>
      <itunes:summary>In this show we talk with Dr. Rutger Leukfeldt, senior researcher and the cybercrime cluster coordinator at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and the director of the Cybersecurity &amp; SMEs Research Center of the Hague University of Applied Sciences.

Dr. Leukfeldt shares about organized crime groups online, their structures and how they operate and the importance of offline connections.  Social opportunities structures are raised as an important instrument in the creation of these connections. We also talk about crime facilitators within organisations that are used by criminal groups to commit crime, becoming the inside threat that allows successful  but low tech cybercrime. Other facilitators involved are the money mules that allow for the &apos;cashing out&apos; and laundering of the proceeds of crime.  </itunes:summary>
      <itunes:subtitle>In this show we talk with Dr. Rutger Leukfeldt, senior researcher and the cybercrime cluster coordinator at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and the director of the Cybersecurity &amp; SMEs Research Center of the Hague University of Applied Sciences.

Dr. Leukfeldt shares about organized crime groups online, their structures and how they operate and the importance of offline connections.  Social opportunities structures are raised as an important instrument in the creation of these connections. We also talk about crime facilitators within organisations that are used by criminal groups to commit crime, becoming the inside threat that allows successful  but low tech cybercrime. Other facilitators involved are the money mules that allow for the &apos;cashing out&apos; and laundering of the proceeds of crime.  </itunes:subtitle>
      <itunes:keywords>insider threat, research, cybercrime, organized crime, cybersecurity, fraud, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1328a4e-d820-4c3f-bf81-4eed8d5abe82</guid>
      <title>Understanding eWhoring</title>
      <description><![CDATA[<p>Find out more about Dr. Alice Hutchings:</p><p><a href="https://www.cl.cam.ac.uk/~ah793/">https://www.cl.cam.ac.uk/~ah793/</a></p><p>Find the paper mentioned in this show:</p><p>Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. <i>arXiv preprint arXiv:1905.04576</i>.</p><p><a href="https://arxiv.org/pdf/1905.04576.pdf">https://arxiv.org/pdf/1905.04576.pdf</a></p>
]]></description>
      <pubDate>Sun, 15 Dec 2019 05:00:13 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Alice Hutchings)</author>
      <link>https://cybercrimeology.com/episodes/understanding-ewhoring-PymZC4jR</link>
      <content:encoded><![CDATA[<p>Find out more about Dr. Alice Hutchings:</p><p><a href="https://www.cl.cam.ac.uk/~ah793/">https://www.cl.cam.ac.uk/~ah793/</a></p><p>Find the paper mentioned in this show:</p><p>Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. <i>arXiv preprint arXiv:1905.04576</i>.</p><p><a href="https://arxiv.org/pdf/1905.04576.pdf">https://arxiv.org/pdf/1905.04576.pdf</a></p>
]]></content:encoded>
      <enclosure length="17063767" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/28259f31-027d-4854-ae58-781184fb763b/cybercriminology-alice-hutchings-mixdown-01_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Understanding eWhoring</itunes:title>
      <itunes:author>Alice Hutchings</itunes:author>
      <itunes:duration>00:17:45</itunes:duration>
      <itunes:summary>In this show we talk to Dr. Alice Hutchings, the Deputy-Director of the Cambridge Cybercrime Centre at the University of Cambridge who has recently co-authored a paper on the criminal practice called eWhoring.
</itunes:summary>
      <itunes:subtitle>In this show we talk to Dr. Alice Hutchings, the Deputy-Director of the Cambridge Cybercrime Centre at the University of Cambridge who has recently co-authored a paper on the criminal practice called eWhoring.
</itunes:subtitle>
      <itunes:keywords>cybercrime, intimate images, fraud, hackforums, ewhoring</itunes:keywords>
      <itunes:explicit>true</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a981aaf6-a841-4787-9478-87150887459e</guid>
      <title>Providing Cybersecurity for Victims of Intimate Partner Violence</title>
      <description><![CDATA[<p>Find out more about Diana Freed:</p><p><a href="https://infosci.cornell.edu/content/freed">https://infosci.cornell.edu/content/freed</a></p><p>Find out more about Sam Havron:</p><p><a href="https://havron.dev/">https://havron.dev/</a></p><p>The find the papers mentioned in this show:</p><p>Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018, April). “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 667). ACM.</p><p><a href="https://dl.acm.org/citation.cfm?id=3174241">https://dl.acm.org/citation.cfm?id=3174241</a></p><p>Havron, S., Freed, D., Chatterjee, R., McCoy, D., Dell, N., & Ristenpart, T. (2019). Clinical computer security for victims of intimate partner violence. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 105-122).</p><p><a href="https://havron.dev/pubs/clinicalsec.pdf">https://havron.dev/pubs/clinicalsec.pdf</a></p>
]]></description>
      <pubDate>Sun, 1 Dec 2019 05:00:02 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Diana Freed, Sam Havron)</author>
      <link>https://cybercrimeology.com/episodes/providing-cybersecurity-for-victims-of-intimate-partner-violence-uzCvjELu</link>
      <content:encoded><![CDATA[<p>Find out more about Diana Freed:</p><p><a href="https://infosci.cornell.edu/content/freed">https://infosci.cornell.edu/content/freed</a></p><p>Find out more about Sam Havron:</p><p><a href="https://havron.dev/">https://havron.dev/</a></p><p>The find the papers mentioned in this show:</p><p>Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2018, April). “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 667). ACM.</p><p><a href="https://dl.acm.org/citation.cfm?id=3174241">https://dl.acm.org/citation.cfm?id=3174241</a></p><p>Havron, S., Freed, D., Chatterjee, R., McCoy, D., Dell, N., & Ristenpart, T. (2019). Clinical computer security for victims of intimate partner violence. In 28th {USENIX} Security Symposium ({USENIX} Security 19) (pp. 105-122).</p><p><a href="https://havron.dev/pubs/clinicalsec.pdf">https://havron.dev/pubs/clinicalsec.pdf</a></p>
]]></content:encoded>
      <enclosure length="30921842" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/b66200e6-534c-4d01-937d-9b5e06142902/cybercrimeology-ep03-freed-havron-01_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Providing Cybersecurity for Victims of Intimate Partner Violence</itunes:title>
      <itunes:author>Diana Freed, Sam Havron</itunes:author>
      <itunes:duration>00:32:11</itunes:duration>
      <itunes:summary>In the final part of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Diana Freed and Sam Havron from Cornell university who have been working with survivors and have produced a range of studies and tools for dealing with the reality of technology-facilitated intimate partner violence.</itunes:summary>
      <itunes:subtitle>In the final part of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Diana Freed and Sam Havron from Cornell university who have been working with survivors and have produced a range of studies and tools for dealing with the reality of technology-facilitated intimate partner violence.</itunes:subtitle>
      <itunes:keywords>intimate partner violence, cybercrime, spyware, domestic violence, cybersecurity, clinical care</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b3c285ea-0537-4c6d-907d-ddf5d8fdf1a9</guid>
      <title>The Consumer Spyware Industry</title>
      <description><![CDATA[<p>Find out more about Dr Diarmaid Harkin:</p><p>https://www.deakin.edu.au/about-deakin/people/diarmaid-Harkin</p><p>Find the report mentioned in this show:</p><p><strong>The Consumer Spyware Industry </strong>An Australian-based analysis of the threats of consumer spyware.</p><p><a href="http://accan.org.au/files/Grants/2017%20successful%20projects/Deakin%20-%20Consumer%20Spyware%20Industry%20%20-%2030Jul19%20WEB.pdf">http://accan.org.au/files/Grants/2017%20successful%20projects/Deakin%20-%20Consumer%20Spyware%20Industry%20%20-%2030Jul19%20WEB.pdf</a></p><p>Find the paper mentioned in this show:</p><p>Harkin, D., Molnar, A., & Vowles, E. (2019). The commodification of mobile phone surveillance: An analysis of the consumer spyware industry. <i>Crime, Media, Culture</i>, 1741659018820562.</p><p><a href="https://journals.sagepub.com/doi/abs/10.1177/1741659018820562">https://journals.sagepub.com/doi/abs/10.1177/1741659018820562</a></p>
]]></description>
      <pubDate>Fri, 15 Nov 2019 05:00:29 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Diarmaid Harkin)</author>
      <link>https://cybercrimeology.com/episodes/the-consumer-spyware-industry-AcwHk4zH</link>
      <content:encoded><![CDATA[<p>Find out more about Dr Diarmaid Harkin:</p><p>https://www.deakin.edu.au/about-deakin/people/diarmaid-Harkin</p><p>Find the report mentioned in this show:</p><p><strong>The Consumer Spyware Industry </strong>An Australian-based analysis of the threats of consumer spyware.</p><p><a href="http://accan.org.au/files/Grants/2017%20successful%20projects/Deakin%20-%20Consumer%20Spyware%20Industry%20%20-%2030Jul19%20WEB.pdf">http://accan.org.au/files/Grants/2017%20successful%20projects/Deakin%20-%20Consumer%20Spyware%20Industry%20%20-%2030Jul19%20WEB.pdf</a></p><p>Find the paper mentioned in this show:</p><p>Harkin, D., Molnar, A., & Vowles, E. (2019). The commodification of mobile phone surveillance: An analysis of the consumer spyware industry. <i>Crime, Media, Culture</i>, 1741659018820562.</p><p><a href="https://journals.sagepub.com/doi/abs/10.1177/1741659018820562">https://journals.sagepub.com/doi/abs/10.1177/1741659018820562</a></p>
]]></content:encoded>
      <enclosure length="29071861" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/a35cebc2-1496-4d60-ac70-0b5f5b5fc30e/cybercrimeology-ep02-diarmaidharkin-01_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>The Consumer Spyware Industry</itunes:title>
      <itunes:author>Diarmaid Harkin</itunes:author>
      <itunes:duration>00:30:15</itunes:duration>
      <itunes:summary>In the second of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Dr. Diarmaid Harkin, a Research Fellow at Deakin University, Australia who has recently co-authored a paper and a publicly available report examining the consumer spyware industry.
</itunes:summary>
      <itunes:subtitle>In the second of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Dr. Diarmaid Harkin, a Research Fellow at Deakin University, Australia who has recently co-authored a paper and a publicly available report examining the consumer spyware industry.
</itunes:subtitle>
      <itunes:keywords>intimate partner violence, research, cybercrime, spyware, domestic violence, australia, canada</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4fe26493-d05c-4cf7-a959-cb538b73f6bd</guid>
      <title>Experiences of Technology-Facilitated Domestic Violence</title>
      <description><![CDATA[<p>Find our more about Dr. Heather Douglas:</p><p><a href="https://law.uq.edu.au/profile/1347/heather-douglas">https://law.uq.edu.au/profile/1347/heather-douglas</a></p><p>For the paper referred to in this show please read:</p><p>Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence: Women’s experiences. The British Journal of Criminology, 59(3), 551-570.</p><p><a href="https://doi.org/10.1093/bjc/azy068">https://doi.org/10.1093/bjc/azy068</a></p>
]]></description>
      <pubDate>Fri, 1 Nov 2019 04:00:29 +0000</pubDate>
      <author>cybercrimeology@gmail.com (Heather Douglas)</author>
      <link>https://cybercrimeology.com/episodes/experiences-of-technology-facilitated-domestic-violence-Jz32bnCt</link>
      <content:encoded><![CDATA[<p>Find our more about Dr. Heather Douglas:</p><p><a href="https://law.uq.edu.au/profile/1347/heather-douglas">https://law.uq.edu.au/profile/1347/heather-douglas</a></p><p>For the paper referred to in this show please read:</p><p>Douglas, H., Harris, B. A., & Dragiewicz, M. (2019). Technology-facilitated domestic and family violence: Women’s experiences. The British Journal of Criminology, 59(3), 551-570.</p><p><a href="https://doi.org/10.1093/bjc/azy068">https://doi.org/10.1093/bjc/azy068</a></p>
]]></content:encoded>
      <enclosure length="23424293" type="audio/mpeg" url="https://cdn.simplecast.com/audio/f91bce/f91bcee5-b99b-424f-8223-8b3062f7085b/0111d00e-7520-4362-8c5c-9c2d669bc1c6/cybercrimeology-ep01-heatherdouglas_tc.mp3?aid=rss_feed&amp;feed=u7LQgEZL"/>
      <itunes:title>Experiences of Technology-Facilitated Domestic Violence</itunes:title>
      <itunes:author>Heather Douglas</itunes:author>
      <itunes:duration>00:24:24</itunes:duration>
      <itunes:summary>In the first of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Professor Heather Douglas, from the University of Queensland who with colleagues who have recently studied this issue, drawing from interviews with those women who had experienced Domestic and Family Violence engaged with the legal system in Australia.</itunes:summary>
      <itunes:subtitle>In the first of a three part series talking about research into technology-facilitated family or intimate partner violence we talk to Professor Heather Douglas, from the University of Queensland who with colleagues who have recently studied this issue, drawing from interviews with those women who had experienced Domestic and Family Violence engaged with the legal system in Australia.</itunes:subtitle>
      <itunes:keywords>intimate partner violence, cybercrime, spyware, domestic violence</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>