Publications - 2015

  • Cerezo, A.I. (2015): La piratería doméstica y el autocontrol: Un estudio exploratorio entre universitarios, In “Estudios de Política Criminal y Derecho penal. Actuales tendencias. Tomo I”, Gaspar Chirinos, A. y Martínez Huamán, R.H. (directores), Lima (Perú): Gaceta Jurídica, pp. 255-281

  • Décary-Hétu, David & Dominique Laferrière. (2015). “Discrediting Vendors In Online Criminal Markets”. IN Malm, Aili & Gisela Bichler. (eds.). Disrupting Criminal Networks: Network Analysis in Crime Prevention. Boulder, USA: Lynne Rienner.

  • Décary-Hétu, David & Judith Aldridge. (2015). “Sifting Through The Net: Monitoring Of Online Offenders By Researchers.” The European Review Of Organised Crime. 2(2): 122-141. 

  • Décary-Hétu, David & Mélanie Eudes. (2015). “Partenariats criminels au sein d’un forum de carding: alliés, rivaux ou escrocs? Étude de l’utilisation d’identités virtuelles multiples.” Revue internationale de criminologie et de police technique scientifique. 68(3): 299-314.

  • Hao, S., Borgolte, K., Nikiforakis, N., Stringhini, G., Egele, M., Eubanks, M., ... & Vigna, G. (2015, October). Drops for stuff: An analysis of reshipping mule scams. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1081-1092). ACM.

  • Henry, N. & Powell, A. (2015). ‘Embodied Harms: Gender, Shame and Technology-facilitated Sexual Violence in Cyberspace’, Violence Against Women, 21(6): 758-779.

  • Henry, N. & Powell, A. (2015). ‘Beyond the Sext: Technology-facilitated Sexual Violence and Harassment Against Adult Women’, Australian and New Zealand Journal of Criminology, 48(1): 1104-1118.

  • Holt, T. J., & Bossler, A. M. (2016).  Cybercrime in progress: Theory and prevention of technology-enabled offenses.  Crime Sciences Series.  London: Routledge Press.

  • Holt, T.J., Burruss, G.W., and Bossler, A.M. (2015). Policing Cybercrime and Cyberterror.  Durham, North Carolina: Carolina Academic Press.

  • Holt, T. J., Smirnova, O., & Chua, Y. T. (2016).  Exploring and estimating the revenues and profits of participants in stolen data markets." Deviant Behavior, 37: 353-367.

  • Huang, J., Stringhini, G., & Yong, P. (2015, July). Quit playing games with my heart: Understanding online dating scams. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 216-236). Springer, Cham.

  • Hutchings, A. & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596-614.

  • Hutchings, A., Smith, R. G. & James, L. (2015). Criminals in the cloud: An overview of criminal and security threats and prevention measures. In R. G. Smith, R. Cheung & L. Lau (eds), Cybercrime Risks and Responses: Eastern and Western Perspectives (pp. 146-162). Basingstoke: Palgrave Macmillan.

  • Hutchings, A. & Jorna, P. (2015). Misuse of information and communications technology within the public sector. Trends & Issues in Crime & Criminal Justice Series No. 470. Canberra: Australian Institute of Criminology.

  • Jansen, J., & Leukfeldt, R. (2015, July). How people help fraudsters steal their money: An analysis of 600 online banking fraud cases. In Socio-Technical Aspects in Security and Trust (STAST), 2015 Workshop on (pp. 24-31). IEEE.

  • Kerstens, J. (2015). Youth being at risk and being a risk on the internet. Heerlen: Open Universiteit (dissertation).

  • Leontiadis, N. & Hutchings, A. (2015). Scripting the crime commission process in the illicit online prescription drug trade. Journal of Cybersecurity, 1(1), 81-92.

  • Leukfeldt, E. R. (2015). Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention. arXiv preprint arXiv:1506.00769.

  •  Leukfeldt, E.R. (2015) Organised cybercrime and social opportunity structures. A proposal for future research directions. European Review of Organised Crime 2(2) 91-103.

  • Leukfeldt, R., & Jansen, J. (2015). Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands. International Journal of Cyber Criminology, 9(2), 173.

  • Maimon, David., Theodore Wilson, Wuling Ren and Tamar Berenblom. 2015. On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents.” British Journal of Criminology 

  • Martellozzo, E. (2015). Policing online child sexual abuse-the British experience. European Journal of policing Studies, 3(1), 32-52.‏ ISO 690

  • Miró-Llinares, F. (2015). That cyber-routines, that cybervictimization: profiling victims of cybercrime. In G. Smith, R. Chak-Chung Cheung and L. Yiu-Chung Lau (Eds.), Cybercrime risks and responses: eastern and western perspectives (pp. 47-63). London, UK: Palgrave Macmillan.

  • Powell, A. (2015). ‘Seeking Rape Justice: Formal and informal responses to sexual violence through technosocial counterpublics’, Theoretical Criminology, OnlineFirst: 1-18.

  • Powell, A. (2015). Chapter 13 ‘Seeking Informal Justice Online: Vigilantism, Activism and Resisting a Rape Culture in Cyberspace’ in Powell, A., Henry, N., and Flynn, A. (eds.). Rape Justice: Beyond the Criminal Law. Basingstoke: Palgrave Macmillan.

  • Rechavi, A., Berenblum, T., Maimon, D., & Sevilla, I. S. (2015, August). Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on (pp. 795-804). IEEE.‏

  • Romagna, M. (2015). Cybermarket for forged identity documents: The illegal trade of identity documents in the surface Web and in Onionland. Keesing Journal of Documents & Identity, Issue 47, June 2015, 12-15.

  • Wilson, Theodore^., David Maimon, Bertrand Sobesto^ and Michel Cukier. 2015 “The Effect of Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyber Space.” Journal of Research in Crime and Delinquency

The website is funded by the Hebrew University of Jerusalem

HUJI Cyber Security Research Center (H-CSRC) – Cyber Law Program and the Institute of Criminology

Created & Designed by Omri Ben-Zvi Goldblum for ESC Work Group