The website is funded by the Hebrew University of Jerusalem

HUJI Cyber Security Research Center (H-CSRC) – Cyber Law Program and the Institute of Criminology

Created & Designed by Omri Ben-Zvi Goldblum for ESC Work Group

Publications - 2015

  • Cerezo, A.I. (2015): La piratería doméstica y el autocontrol: Un estudio exploratorio entre universitarios, In “Estudios de Política Criminal y Derecho penal. Actuales tendencias. Tomo I”, Gaspar Chirinos, A. y Martínez Huamán, R.H. (directores), Lima (Perú): Gaceta Jurídica, pp. 255-281

  • Décary-Hétu, David & Dominique Laferrière. (2015). “Discrediting Vendors In Online Criminal Markets”. IN Malm, Aili & Gisela Bichler. (eds.). Disrupting Criminal Networks: Network Analysis in Crime Prevention. Boulder, USA: Lynne Rienner.

  • Décary-Hétu, David & Judith Aldridge. (2015). “Sifting Through The Net: Monitoring Of Online Offenders By Researchers.” The European Review Of Organised Crime. 2(2): 122-141. 

  • Décary-Hétu, David & Mélanie Eudes. (2015). “Partenariats criminels au sein d’un forum de carding: alliés, rivaux ou escrocs? Étude de l’utilisation d’identités virtuelles multiples.” Revue internationale de criminologie et de police technique scientifique. 68(3): 299-314.

  • Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M., ... & Vigna, G. (2015, October). Drops for stuff: An analysis of reshipping mule scams. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1081-1092). ACM.

  • Henry, N. & Powell, A. (2015). ‘Embodied Harms: Gender, Shame and Technology-facilitated Sexual Violence in Cyberspace’, Violence Against Women, 21(6): 758-779.

  • Henry, N. & Powell, A. (2015). ‘Beyond the Sext: Technology-facilitated Sexual Violence and Harassment Against Adult Women’, Australian and New Zealand Journal of Criminology, 48(1): 1104-1118.

  • Holt, T. J., & Bossler, A. M. (2016).  Cybercrime in progress: Theory and prevention of technology-enabled offenses.  Crime Sciences Series.  London: Routledge Press.

  • Holt, T.J., Burruss, G.W., and Bossler, A.M. (2015). Policing Cybercrime and Cyberterror.  Durham, North Carolina: Carolina Academic Press.

  • Holt, T. J., Smirnova, O., & Chua, Y. T. (2016).  Exploring and estimating the revenues and profits of participants in stolen data markets." Deviant Behavior, 37: 353-367.

  • Huang, J., Stringhini, G., & Yong, P. (2015, July). Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 216-236). Springer, Cham.

  • Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.

  • Hutchings, A., Smith, R. G. & James, L. (2015). Criminals in the cloud: An overview of criminal and security threats and prevention measures. In R. G. Smith, R. Cheung & L. Lau (eds), Cybercrime Risks and Responses: Eastern and Western Perspectives (pp. 146-162). Basingstoke: Palgrave Macmillan.

  • Hutchings, A. & Jorna, P. (2015). Misuse of information and communications technology within the public sector. Trends & Issues in Crime & Criminal Justice Series No. 470. Canberra: Australian Institute of Criminology.

  • Jansen, J., & Leukfeldt, R. (2015, July). How people help fraudsters steal their money: An analysis of 600 online banking fraud cases. In Socio-Technical Aspects in Security and Trust (STAST), 2015 Workshop on (pp. 24-31). IEEE.

  • Kerstens, J. (2015). Youth being at risk and being a risk on the internet. Heerlen: Open Universiteit (dissertation).

  • Leontiadis, N. & Hutchings, A. (2015). Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity, 1(1), 81-92.

  • Leukfeldt, E. R. (2015). Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention. arXiv preprint arXiv:1506.00769.

  •  Leukfeldt, E.R. (2015) Organised cybercrime and social opportunity structures. A proposal for future research directions. European Review of Organised Crime 2(2) 91-103.

  • Leukfeldt, R., & Jansen, J. (2015). Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands. International Journal of Cyber Criminology, 9(2), 173.

  • Maimon, David., Theodore Wilson, Wuling Ren and Tamar Berenblom. 2015. On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents.” British Journal of Criminology 

  • Martellozzo, E. (2015). Policing online child sexual abuse-the British experience. European Journal of policing Studies, 3(1), 32-52.‏ ISO 690

  • Miró-Llinares, F. (2015). That cyber-routines, that cybervictimization: profiling victims of cybercrime. In G. Smith, R. Chak-Chung Cheung and L. Yiu-Chung Lau (Eds.), Cybercrime risks and responses: eastern and western perspectives (pp. 47-63). London, UK: Palgrave Macmillan.

  • Powell, A. (2015). ‘Seeking Rape Justice: Formal and informal responses to sexual violence through technosocial counterpublics’, Theoretical Criminology, OnlineFirst: 1-18.

  • Powell, A. (2015). Chapter 13 ‘Seeking Informal Justice Online: Vigilantism, Activism and Resisting a Rape Culture in Cyberspace’ in Powell, A., Henry, N., and Flynn, A. (eds.). Rape Justice: Beyond the Criminal Law. Basingstoke: Palgrave Macmillan.

  • Rechavi, A., Berenblum, T., Maimon, D., & Sevilla, I. S. (2015, August). Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on (pp. 795-804). IEEE.‏

  • Romagna, M. (2015). Cybermarket for forged identity documents: The illegal trade of identity documents in the surface Web and in Onionland. Keesing Journal of Documents & Identity, Issue 47, June 2015, 12-15.

  • Wilson, Theodore^., David Maimon, Bertrand Sobesto^ and Michel Cukier. 2015 “The Effect of Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyber Space.” Journal of Research in Crime and Delinquency