Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Northwestern Pritzker School of Law (6380)
- Bridgewater State University (58)
- University of Rhode Island (19)
- San Jose State University (7)
- James Madison University (6)
-
- Embry-Riddle Aeronautical University (3)
- Penn State Dickinson Law (3)
- St. Mary's University (3)
- Cleveland State University (2)
- University of South Florida (2)
- Walden University (2)
- Brigham Young University Law School (1)
- College of Saint Benedict and Saint John's University (1)
- Eastern Kentucky University (1)
- Fort Hays State University (1)
- Illinois Wesleyan University (1)
- Kansas State University Libraries (1)
- Liberty University (1)
- Maurer School of Law: Indiana University (1)
- Nova Southeastern University (1)
- Salve Regina University (1)
- University of Nebraska - Lincoln (1)
- University of South Carolina (1)
- Wilfrid Laurier University (1)
- Keyword
-
- Cybercrime (15)
- Prostitution (13)
- Cybersecurity (11)
- Cyberbullying (8)
- Sex trafficking (8)
-
- Violence (7)
- Criminology (6)
- Law enforcement (6)
- Crime (4)
- Cyberterrorism (4)
- Decriminalization (4)
- Legislation (4)
- Sexual exploitation (4)
- Democracy (3)
- Human trafficking (3)
- Prison (3)
- Prosecution (3)
- Race (3)
- Rape (3)
- Sanctuary cities (3)
- Self-control (3)
- Sex trade (3)
- Sex work (3)
- Sexual assault (3)
- United States (3)
- Abuse (2)
- Academic journal (2)
- Awareness (2)
- Bitcoin (2)
- Criminal code (2)
- Publication Year
- Publication
-
- Journal of Criminal Law and Criminology (6379)
- International Journal of Cybersecurity Intelligence & Cybercrime (58)
- Dignity: A Journal of Analysis of Exploitation and Violence (19)
- Themis: Research Journal of Justice Studies and Forensic Science (7)
- International Journal on Responsibility (5)
-
- Dickinson Law Review (2017-Present) (3)
- The Scholar: St. Mary's Law Review on Race and Social Justice (3)
- Genocide Studies and Prevention: An International Journal (2)
- Journal of Digital Forensics, Security and Law (2)
- The Downtown Review (2)
- Academic Leadership Journal in Student Research (1)
- BYU Law Review (1)
- Bridges: An Undergraduate Journal of Contemporary Connections (1)
- Health Behavior Research (1)
- IUSTITIA (1)
- International Bulletin of Political Psychology (1)
- Journal of Ideology (1)
- Journal of Interdisciplinary Feminist Thought (1)
- Journal of Social, Behavioral, and Health Sciences (1)
- Journal of Sustainable Social Change (1)
- Kentucky Journal of Undergraduate Scholarship (1)
- Liberty University Journal of Statesmanship & Public Policy (1)
- Northwestern Journal of Law & Social Policy (1)
- SANE journal: Sequential Art Narrative in Education (1)
- The Journal of Social Encounters (1)
- The Qualitative Report (1)
- Undergraduate Economic Review (1)
- VA Engage Journal (1)
Articles 1 - 30 of 6498
Full-Text Articles in Criminology
Review Of The Violence Project: How To Stop A Mass Shooting Epidemic, Chris Hausmann
Review Of The Violence Project: How To Stop A Mass Shooting Epidemic, Chris Hausmann
The Journal of Social Encounters
No abstract provided.
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
International Journal of Cybersecurity Intelligence & Cybercrime
According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler
International Journal of Cybersecurity Intelligence & Cybercrime
One tell-tale sign of the impact of the COVID-19 pandemic is the heavy reliance on electronic devices. Young adults in particular have indicated a greater presence on social media and high levels of loneliness during the pandemic. This trend has raised concerns about increased feelings of social isolation and reliance on technology, which could lead to more internet or computer crimes—including cyberbullying. Despite a growing body of literature, little is known about the association between cyberbullying victimization and social isolation among young adults— with even less known about this phenomenon in the context of the ongoing pandemic. Drawing on survey …
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
International Journal of Cybersecurity Intelligence & Cybercrime
Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.
“He’S In Jail Now And I Don’T Feel Bad”: Analyzing Sureties’ Decisions To Report Bail Violations, Rachel Schumann, Carolyn Yule
“He’S In Jail Now And I Don’T Feel Bad”: Analyzing Sureties’ Decisions To Report Bail Violations, Rachel Schumann, Carolyn Yule
International Journal on Responsibility
The control, supervision, and rehabilitation of criminalized people often falls on the shoulders of non-state agents and organizations. Surety bail releases are a clear embodiment of this trend, as the courts call upon relatives, friends, and employers to supervise the pre-conviction activity of people accused of a crime. According to the law, sureties must report all bail violations to the police; the resulting diffusion of responsibility is said to increase the penal state’s power and control over criminal justice-involved individuals while minimizing reputational risks. Yet how sureties carry out this role in the community remains unexplored. Using data from 36 …
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
Volume 6, Issue 1 (2023) Criminal Justice Agents And Responsibility, Colleen Berryessa, Elizabeth Griffiths, Kaitlen Hubbard, Deena A. Isom, Kateryna Kaplun, Hiuxuan Li, Siyu Liu, Esther Nir, Heather L. Scheuerman, Rachel Schumann, Sandy Xie, Carolyn Yule
International Journal on Responsibility
This special issue of the International Journal on Responsibility (IJR) advances scholarship on the various ways responsibility infuses the roles of criminal justice agents. As the inaugural issue of my tenure as Editor-in-Chief, Volume 6 deepens our understanding of responsibility in the context of the criminal justice system, thereby fulfilling IJR’s aim and scope. Specifically, the articles highlight issues of responsibility within each component of the criminal justice system: police, courts, and corrections.
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
Do Judges Understand Technology? How Attorneys And Advocates View Judicial Responsibility In Cyberstalking And Cyberharassment Cases, Kateryna Kaplun
International Journal on Responsibility
As new technologies emerge and are increasingly used to commit interpersonal cybercrimes like cyberstalking and cyberharassment, the legal system lags in assisting victims in obtaining justice in these types of experiences. This qualitative research study explores how attorney and advocate interviewees from Illinois, New Jersey, and New York view judges’ responsibility to the law in cyberstalking and cyberharassment cases. This study finds three themes: judges’ lack of understanding of technology and its harms, discretion, and law on the books versus law in action as important factors and frameworks that contribute to why judges do not consider the importance of technology …
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
The Influence Of Prior Legal Background On Judicial Sentencing Considerations, Esther Nir, Siyu Liu
International Journal on Responsibility
State court judges are influenced by a myriad of factors during criminal case processing. To study the influence of prior legal background on judicial decision-making at sentencing, we performed in-depth qualitative interviews of 39 trial court judges presiding over criminal cases in a Northeastern U.S. state. We find that judges are influenced by their former legal experiences and most judges are cognizant of this influence. While certain sentencing considerations are prioritized for almost all judges (e.g., criminal history, seriousness of the offense), prioritization and processing of many other sentencing criteria are correlated with prior legal background. Former defense attorneys tend …
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
Examining Remorse In Attributions Of Focal Concerns During Sentencing: A Study Of Probation Officers, Colleen M. Berryessa
International Journal on Responsibility
This research, using interviews with probation officers in the United States (n = 151) and a constant comparative method for analysis, draws from the focal concerns framework to qualitatively model a process by which probation officers use a defendant’s remorse to attribute focal concerns in order to guide their sentencing recommendations in pre-sentencing reports. The model suggests that officers use expressions of remorse to make attributions about mitigated criminal intention (blameworthiness and notions of responsibility), reduced dangerousness and a high potential for reform (community protection), and organization-level effects for increasing caseload efficiency and using correctional resources (practical effects of …
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Aotearoa New Zealand, The Forcible Transfer Of Tamariki And Rangatahi Māori, And The Royal Commission On Abuse In Care, David B. Macdonald
Genocide Studies and Prevention: An International Journal
This article investigates to what extent the forcible transfer of tamariki and rangatahi Māori (Indigenous children and youth) in Aotearoa New Zealand can be considered genocide. First, I begin by exploring contemporary genocide theory as it relates to dolus eventualis in settler colonial contexts, before engaging with precedents for recognizing Indigenous genocides established by truth commissions in Canada (2015; 2019) and Australia (1997). I then explore the history around Indigenous child removal in Aotearoa from the onset of colonization to the present day, attentive to ways in which the UN Convention can apply to the forced removal of Māori children. …
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Female Perpetrators Of Ritually Motivated Pedicide And Mutilation Of Children, Chima Agazue
Dignity: A Journal of Analysis of Exploitation and Violence
Ritually motivated pedicide is among contemporary Africa’s most severe crimes against children. Most of these crimes involve brutal acts of violence or mutilation of the victim. While men are most often the perpetrators of violent crimes, ritually motivated pedicide and mutilation equally attract women. The role of women in these crimes is not restricted to the less violent aspects of the crimes; instead, they also extend to the most brutal elements, often involving mutilation, decapitation or outright murder of the victim. This article explored the involvement of women in these crimes that target children for mutilation and pedicide. The article …
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
International Journal of Cybersecurity Intelligence & Cybercrime
This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
International Journal of Cybersecurity Intelligence & Cybercrime
The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
International Journal of Cybersecurity Intelligence & Cybercrime
This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence & Cybercrime
Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
International Journal of Cybersecurity Intelligence & Cybercrime
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
“Elder Scam” Risk Profiles: Individual And Situational Factors Of Younger And Older Age Groups’ Fraud Victimization, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
In an attempt to understand how differently fraud works depending on a victim’s age, we have examined the effects of situational (lifestyle-routine activities), self-control, and sociodemographic variables on scam victimization across age groups. The analysis was carried out on a national sample of 2,558 Americans, representative by age, sex, and race, and includes additional factors such as their education, living arrangement, employment, and propensity for reporting a crime or asking for help. The results substantiate research findings of the contribution of self-control and LRAT in predicting victimization in general but could not identify major situational and individual differences between older …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Faith-Based Addiction Treatment Programs And The Drug Courts, Christopher J. Boosey
Faith-Based Addiction Treatment Programs And The Drug Courts, Christopher J. Boosey
Liberty University Journal of Statesmanship & Public Policy
Addiction treatment programs are a major part of the Drug Courts system as under this system, addiction treatment and rehabilitation are used in an attempt to address the root causes of crime with the intent to reducing recidivism rates. Trends in research are beginning to show that faith-based addiction treatment programs are more effective than comparable secular programs. However, there are constitutional issues that prevent these programs being awarded by the drug courts without a comparable, secular alternative. This essay reviews relevant research on the comparable efficacy of faith-based and secular addiction programs and the constitutional issues related to the …
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
The Relationship Between Parenting Practices And Cyberbullying Perpetration: The Mediating Role Of Moral Beliefs, Jaeyong Choi, Seungmug (Zech) Lee, Layne Dittmann
International Journal of Cybersecurity Intelligence & Cybercrime
Criminologists and psychologists have long recognized that parenting practices can affect childhood outcomes and the development of moral beliefs in children. Another body of literature provides evidence that morality is a key cause of antisocial behavior. Yet, a noticeable gap in this line of work has been testing the mediation effects of parenting practices on cyberbullying via moral beliefs. Using a sample of South Korean adolescents, we tested whether moral beliefs mediate the relationships between parenting practices and cyberbullying perpetration. Results show that parental supervision and excessive parenting can influence cyberbullying perpetration and that the impact of parenting practices is …