Publications - 2016

  • Aldridge, Judith & David Décary-Hétu. (2016). "Cryptomarkets And The Future Of Illicit Drug Markets." IN EMCDDA. (eds.) The Internet And Drug Markets. Luxembourg: Publications Office of the European Union. ​

  • Aldridge, Judith & David Décary-Hétu. (2016). "Hidden Wholesale: The Drug Diffusing Capacity of Online Drug Cryptomarkets." International Journal of Drug Policy. 35: 7-15. 

  • B. Dupont, A.-M. Côté, C. Savine & D. Décary-Hétu (2016), “The ecology of trust among hackers”, Global Crime, 17 (2): 129-151.

  • Becker, I., Hutchings, A., Abu-Salma, R., Anderson, R., Bohm, N., Murdoch, S. J., Sasse, M. A., & Stringhini, G. (2016). International comparison of bank fraud reimbursement: Customer perceptions and contractual terms. Berkeley: Workshop on the Economics of Information Security.

  • Broséus, Julian & Damien Rhumorbarbe & Caroline Mireault & Vincent Ouellette & Frank Crispino & David Décary-Hétu. (2016). "Studying Illicit Drug Trafficking on Darknet Markets: Structure and Organisation From a Canadian Perspective." Forensic Science International. 264: 7-14.

  • Décary-Hétu, David & Masarah Paquet-Clouston & Judith Aldridge. (2016). "Going International? Risk Taking by Cryptomarket Drug Vendors." International Journal of Drug Policy. 35: 69-76.

  • Dupont, Benoit & Anne-Marie Côté & Claire Savine & David Décary-Hétu. (2016). "The Ecology of Trust Among Hackers." Global Crime. 17(2): 129-151.

  • Henry, N. & Powell, A. (2016). ‘Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research’, Trauma, Violence & Abuse.

  • Henry, N. & Powell, A. (2016). ‘Sexual Violence in the Digital Age: The Scope and Limits of Criminal Law’, Social & Legal Studies, Online First.

  • Holt, T. J., Smirnova, O., & Hutchings, A. (2016). Examining signals of trust in criminal markets online. Journal of Cybersecurity, 2(2), 137-145.

  • Horgan, S. and Collier, B. (2016) Barriers to a Cyberaware Scotland. Scottish Justice Matters, 4(3), 19-20

  • Hutchings, A. & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163-1178.

  • Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (ed), Crime Online: Correlates, Causes, and Context (pp. 117-140). Durham: Carolina Academic Press.

  • Hutchings, A., Clayton, R., & Anderson, R. (2016). Taking down websites to prevent crime. Toronto: eCrime.

  • Jansen, J., & Leukfeldt, R. (2016). Phishing and malware attacks on online banking customers in the Netherlands: a qualitative analysis of factors leading to victimization. International Journal of Cyber Criminology, 10(1), 79.

  • Leukfeldt, E. R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280. 

  • Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. L. (2016). The implications of economic cybercrime for policing.

  • Maimon, David and Alexander Testa. 2016. “On the Relevance of Cyber Criminological Research in the Design of Policies and Sophisticated Security Solutions against CyberTerrorism Events.” The Handbook of the Criminology of Terrorism, edited by Gary LaFree and Joshua Freilich, John Wiley & Sons, Inc

  • Mireault, Caroline & Vincent Ouellet & David Décary-Hétu & Frank Crispino & Julian Broséus. (2016). "Potentiel criminalistique de l'étude du trafic de drogues au Canada à  partir des données collectées sur les cryptomarchés." Forensic Science Journal of the Canadian Society of Forensic Science. 49(4): 161-175.

  • Miró-Llinares & Rodríguez-Sala, J. J. (2016). Cyber Hate Speech on Twitter: Analyzing disruptive events from Social Media to build a violent communication and Hate Speech Taxonomy. International journal of design & nature and ecodynamics, 11(3), 406-415.

  • Miró-Llinares, F. (2016). Taxonomía de la comunicación violenta y el discurso del odio en Internet. InDret. Revista de Internet, Derecho y Política, 22, 82-107.

  • Murdoch, S. J., Becker, I., Abu-Salma, R., Anderson, R., Bohm, N., Hutchings, A., Sasse, M. A., & Stringhini, G. (2016). Are payment card contracts unfair? Barbados: Financial Cryptography.

  • Onaolapo, J., Mariconti, E., & Stringhini, G. (2016, November). What happens after you are pwnd: Understanding the use of leaked webmail credentials in the wild. In Proceedings of the 2016 Internet Measurement Conference (pp. 65-79). ACM.

  • Powell, A. & Henry, N. (2016). ‘The Prevalence and Nature of Technology-Facilitated Sexual Violence and Harassment: Results from an Online Survey of Australian Adults’, Journal of Interpersonal Violence.

  • Powell, A. & Henry, N. (2016). ‘Policing Technology-Facilitated Sexual Violence Against Adult Victims: Police and Service Sector Perspectives’, in Policing & Society, Online First.

  • Sela-Shayovitz, R. Pyrooz, D.& Decker, S.H. (2016). Gangs in the virtual world: The socio-cultural context of gang members' online activity In C. Maxson &  F.A. Esbensen & (Eds.). Gang Transitions and Transformations in an International Context. (pp. 115-139). New York: Springer.

  • Veenstra, S., Zuurveen, R., Kerstens, J. & Stol, W. (2016). Manual Detection in a Digital Environment [Handreiking Opsporing in een Digitale Omgeving]. NHL Hogeschool & Politieacademie: Leeuwarden.

  • Villavieja-Beck, M. & Cerezo, A.I. (2016): La piratería doméstica y el autocontrol: Un estudio exploratorio entre universitarios, Boletín Criminológico, núm. 166, septiembre-octubre 6/2016, pp. 1-9

The website is funded by the Hebrew University of Jerusalem

HUJI Cyber Security Research Center (H-CSRC) – Cyber Law Program and the Institute of Criminology

Created & Designed by Omri Ben-Zvi Goldblum for ESC Work Group