Search
Search Results
-
What the Hack: Reconsidering Responses to Hacking
Like most criminological research, much of the research on hacking has predominantly focused upon the Northern Metropolis. As a result, there is a...
-
Hacking the Human
Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of... -
Computer Hacking and the Hacker Subculture
This chapter provides an overview of the phenomenon of computer hacking, and the ways that individuals with an interest in hacking view themselves... -
Global Voices in Hacking (Multinational Views)
This chapter will give an overview of research on hacking in the Netherlands and other non-English-language countries. Findings from these countries... -
The Effect of COVID-19 Restrictions on Routine Activities and Online Crime
ObjectivesRoutine activity theory suggests that levels of crime are affected by peoples’ activity patterns. Here, we examine if, through their impact...
-
Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks
Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars...
-
The Trends of Cybersecurity and Its Emerging Challenges in Africa
The cost of cybersecurity is steadily increasing, both in terms of the overall loss to the organisation and in terms of the number of cyberattacks.... -
Cybercrime Victimisation and Polyvictimisation in Finland—Prevalence and Risk Factors
This study examines the prevalence of different types of cybercrime victimisation and their shared risk factors among the population of Finland. We...
-
Computer Hacking and the Hacker Subculture
This chapter provides an overview of the phenomenon of computer hacking, and the ways that individuals with an interest in hacking view themselves... -
Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers
Chapter 6 opens with an overview of outsider threats. These range from ‘script kiddies’, to organized criminal gangs, ‘hacktivist’ groups, and... -
Global Voices in Hacking (Multinational Views)
This chapter will give an overview of research on hacking in the Netherlands and other non-English-language countries. Findings from these countries... -
Victims of Cybercrime: Understanding the Impact Through Accounts
The technological changes of the last 30 years have facilitated a substantial increase in cybercrimes. The impact of these crimes on victims has not... -
p-value Problems? An Examination of Evidential Value in Criminology
ObjectivesThis study aims to assess the evidential value of the knowledgebase in criminology after accounting for the presence of potential Type I...
-
Rethinking Cybercrime Critical Debates
The book provides a contemporary ‘snapshot’ of critical debate centred around cybercrime and related issues, to advance theoretical development and... -
The Criminalisation of Tools Under the Computer Misuse Act 1990. The Need to Rethink Cybercrime Offences to Effectively Protect Legitimate Activities and Deter Cybercriminals
Fourteen years after its creation in 2006, s3A Computer Misuse Act 1990 remains as problematic, if not more problematic than ever. Established to... -
Text Mining for Cybercrime in Registrations of the Dutch Police
Aim: Surveys mention substantial rates of cybercrime victimization. However, little is known about the number of police registrations that refer to... -
Exploring Masculinities and Perceptions of Gender in Online Cybercrime Subcultures
While there is now a substantial literature on the role played by online forums in cybercrime economies, there has been little research which... -
Criminal justice officials’ attitudes towards addressing computer crimes in Thailand: Difficulties and recommendations
For the past 10 years, Thailand has been one of the top 10 countries targeted by cyber criminals. In order to address this pressing issue of computer...
-
Differentiating Insider and Outsider Cyberattacks on Businesses
The use of information and communication technologies in business has opened several new ways for employees to commit cybercrimes against their...
-
Exploring the social implications of buying and selling cyber security
Governments, businesses, private citizens and even organised crime are increasingly investing in cyber security, with the cyber security industry...