Publications - 2017

  • B. Dupont (2017), “Bots, cops and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime”, Crime, Law and Social Change, 67 (1): 97-116.

  • B. Dupont, A.-M. Côté, J.-I. Boutin & J. Fernandez (2017), “Recruitment patterns and transactional features of the ‘most dangerous cybercrime forum in the world’”, American Behavioral Scientist, 61 (11): 1219-1243.

  • Boes, S., & Leukfeldt, E. R. (2017). Fighting cybercrime: A joint effort. In Cyber-Physical Security (pp. 185-203). Springer, Cham.

  • Burruss, G.W., Holt, T.J., & Wall, A. (2017). “The Hazards of Investigating Internet Crimes Against Children: Digital Evidence Handlers' Experiences with Vicarious Trauma and Coping Behaviors.” American Journal of Criminal Justice.

  • Cunliffe, J., Martin, J., Décary-Hétu, D., & Aldridge, J. (2017). An island apart? Risks and prices in the Australian cryptomarket drug trade. International Journal of Drug Policy, 50, 64-73.‏

  • Décary-Hétu, David & Luca Giommoni. (2017). "Do Police Crackdowns Disrupt Drug Cryptomarkets? A Longitudinal Analysis Of The Effects Of Operation Onymous." Crime, Law and Social Change. 67(1): 55-75.

  • Haslebacher, A., Onaolapo, J., & Stringhini, G. (2017, April). All your cards are belong to us: Understanding online carding forums. In Electronic Crime Research (eCrime), 2017 APWG Symposium on (pp. 41-51). IEEE.

  • Henry, N. & Powell, A. (2017). Technology-facilitated Sexual Violence and Harassment. In C. M. Renzetti, J. L. Edleson & R. Bergen (eds.). Sourcebook on Violence Against Women (3rd edition). Thousand Oaks, Calif.: Sage Publications

  • Holt, T. J.  (2017).  On the value of honeypots to produce policy recommendations. Criminology & Public Policy 16: 739-747.

  • Holt, T. J., Freilich, J. D., & Chermak, S. M.  (2017). Exploring the subculture of ideologically motivated cyber-attackers. Journal of Contemporary Criminal Justice, 33(3): 212-233. 

  • Holt, T. J., Smirnova, O., & Hutchings, A.  (2016).  Examining signals of trust in criminal markets." Journal of Cybersecurity, 2: 137-145.

  • Howell, Christian^, David Maimon, John Cochran, Hattie Jones^ and Rachel Powers. 2017. “The Restrictive Deterrent Effect of Warning Banners in Compromised Computer System.” International Journal of Cyber Criminology.

  • Hutchings, A. & Clayton, R. (2017). Configuring Zeus: A case study of online crime target selection and knowledge transmission. Arizona: eCrime.

  • Hutchings, A. & Chua, Y. T. (2017). Gendering cybercrime. In T. J. Holt (ed), Cybercrime through an Interdisciplinary Lens (pp. 167-188). Oxon: Routledge.

  • Hutchings, A. & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11-30.

  • Jansen, J., & E.R. Leukfeldt (accepted) Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice & Criminology.

  • Jansen, J., M. Junger, J. Kort, E.R. Leukfeldt, S. Veenstra, J. van Wilsem & S. van der Zee (2017) Victims. In: Leukfeldt, E.R. (ed) (2017) Research Agenda: The Human Factor in Cybercrime and Cybersecurity. The Hague: Eleven International Publishers.

  • Jones, Hattie, David Maimon and Wuling Ren. 2017 “Sanction Threat and Friendly Persuasion Effects on System Trespassers’ Behaviors During a System Trespassing Event.” In Holt, Thomas, (Ed)., Cyber Crime Through an Interdisciplinary Lens. Routledge: New York.

  • Kerstens, J. (2017). Teenage Crime Fighters on the Internet. NHL Hogeschool & Politieacademie: Leeuwarden.

  • Kethineni, S., Cao, Y., & Dodge, C. (2017). Use of Bitcoin in Darknet Markets: Examining Facilitative Factors on Bitcoin-Related Crimes. American Journal of Criminal Justice, 1-17.‏

  • Kolodenker, E., Koch, W., Stringhini, G., & Egele, M. (2017, April). PayBreak: defense against cryptographic ransomware. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (pp. 599-611). ACM.

  • Leukfeldt, E.R. (2017) The human factor examined: Direction for future research. In: Leukfeldt, E.R. (ed) (2017) Research Agenda: The Human Factor in Cybercrime and Cybersecurity. The Hague: Eleven International Publishers

  • Leukfeldt, E.R., C. de Poot, M. Verhoeven, E.R. Kleemans & A. Lavorgna (2017). Cybercriminal networks. In: Leukfeldt, E.R. (ed) (2017) Research Agenda: The Human Factor in Cybercrime and Cybersecurity. The Hague: Eleven International Publishers.

  • Leukfeldt, E.R., E.R. Kleemans & W.P. Stol (2017). A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists. Crime, Law and Social Change 67(1), 21-37.

  • Leukfeldt, E.R., E.R. Kleemans & W.P. Stol (2017). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology 57(3), 704-722.

  • Leukfeldt, E.R., E.R. Kleemans & W.P. Stol (2017). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change 67(1), 39-53.

  • Leukfeldt, E.R., E.R. Kleemans & W.P. Stol (2017). The use of online crime markets by cybercriminal networks: a view from within. American Behavioral Scientist 61(11), 1387-1402.

  • Leukfeldt, E.R., Lavorgna, A., & Kleemans, E.R. (2017). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research 23(3), 287-300.

  • Leukfeldt, E.R., & Weulen Kranenbarg, M. (2017). De menselijke factor in cybercrime (Kroniek). Tijdschrift voor Criminologie, 59(3), 282-290.

  • Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2017). Cyberfraud and the implications for effective risk-based responses: themes from UK research. Crime, Law and Social Change, 67(1), 77-96.

  • Malin, C., Kilger, M., Holt, T. J., & Gudaitis, T. (2017). Deception In the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications. Waltham, MA: Elsevier Press.

  • Martellozzo, E., Jane, E. (Eds) (2017) “Cybercrime and its Victims” (Routledge)

  • Miró-Llinares, F. & Johnson, S. D. (2017). Cybercrime and Place: applying environmental Criminology to crimes in cyberspace. In G. J. N. Bruinsma and S. D. Johnson (Eds.), The Oxford Handbook of Environmental Criminology. Oxford University Press.

  • Morselli, Carlo & David Décary-Hétu & Masarah Paquet-Clouston & Judith Aldridge. (2017). "Conflict Management In IllegalDrug Cryptomarkets." International Criminal Justice Review.

  • Paquet-Clouston, Masarah & David Décary-Hétu & Olivier Bilodeau. (2017). "Cybercrime is who’s responsibility? A case study of an online behaviour system in crime." Global Crime.

  • Powell, A & Henry, N (2017) Sexual Violence in a Digital Age. Basingstoke: Palgrave Macmillan.

  • Powell, A. & Henry, N. (2017). ‘New Technology Facilitated Forms of Sexual Violence’, in Sarre, R. and Deckert, A. (eds). The Australian and New Zealand Handbook of Criminology, Crime and Justice, Basingstoke: Palgrave Macmillan.

  • Powell, A., Overington, C., & Hamilton, G. (2017). ‘Following #JillMeagher: Collective meaning-making in response to crime events via social media’, Crime, Media, Culture.

  • Romagna, M., & van den Hout, N. J. (2017). Hacktivism and Website Defacement: Motivations,
    Capabilities and potential Threats. Proceedings of the 27th Virus Bulletin International
    Conference, Madrid 3-6 October 2017, 41-50.

  • Stratton, G., Powell, A., & Cameron, R. (2017). ‘Crime and Justice in Digital Society: Towards a Digital Criminology?’, International Journal of Crime, Justice and Social Democracy.

  • Testa, Alexander^, David Maimon, Bertrand Sobesto and Michel Cukier . 2017 . “Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers Online Behavior.” Criminology and Public Policy​

  • Thomas, D. R., Pastrana, S., Hutchings, A., Clayton, R., & Beresford, A. R. (2017). Ethical issues in research using datasets of illicit origin. London: ACM Internet Measurement Conference.

  • van de Weijer, S. G., & Leukfeldt, E. R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking, 20(7), 407-412.

  • Van der Kleij, R. Kleinhuis, G., & Young, H. (2017). Computer Security Incident Response Team Effectiveness: A Needs Assessment. Frontiers in Psychology. doi: 10.3389/fpsyg.2017.02179.      

  • van de Weijer, S. G., & Leukfeldt, E. R. (2017). Big five personality traits of cybercrime victims. Cyberpsychology, Behavior, and Social Networking, 20(7), 407-412.

  • Weulen Kranenbarg, M., Holt, T.J., & Van Gelder, J.L. (2017). Offending and victimization in the digital age: comparing correlates of cybercrime and traditional offending-only, victimization-only and the victimization-offending overlap.Deviant Behavior.

  • Weulen Kranenbarg, M., Van Der Laan, A., De Poot, C., Verhoeven, M., Van Der Wagen, W., Weijters, G. (2017). Individual Cybercrime Offenders. In E.R. Leukfeldt (Ed.), Research Agenda: The Human Factor in Cybercrime and Cybersecurity. Den Haag: Eleven International Publishing.

The website is funded by the Hebrew University of Jerusalem

HUJI Cyber Security Research Center (H-CSRC) – Cyber Law Program and the Institute of Criminology

Created & Designed by Omri Ben-Zvi Goldblum for ESC Work Group