Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybercrime (2)
- Beacon-enabled 802.15.4 (1)
- CPTED (1)
- Crime (1)
- Crime prevention (1)
-
- Criminal Networks (1)
- Cyber Worm (1)
- Deception (1)
- Digital (1)
- Digital ecosystems (1)
- Doc2Vec (1)
- Experimental Testbed (1)
- Hacking (1)
- Human experience (1)
- Human values (1)
- Insider attacks (1)
- Law enforcement (1)
- MAC misbehavior (1)
- Machine Learning (1)
- Media access control (1)
- Offenders (1)
- Offenders’ perspective (1)
- Online Fraud (1)
- Ontological reversal (1)
- Ontology (1)
- Prevention (1)
- Public Wi-Fi (1)
- Qualitative (1)
- Randomized experiment (1)
- Routine Activity Theory (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Social and Behavioral Sciences
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison
EBCS Articles
Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum
EBCS Articles
Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
EBCS Articles
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …
Situational Awareness And Public Wi-Fi Users' Self-Protective Behaviors, David Maimon, C. Jordan Howell, Scott Jacques, Robert Perkins
Situational Awareness And Public Wi-Fi Users' Self-Protective Behaviors, David Maimon, C. Jordan Howell, Scott Jacques, Robert Perkins
EBCS Articles
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as persons looking over their shoulder, literally and proverbially. Using two independent research designs, we examined under what circumstances were people more likely to access an unsecured Wi-Fi network and engage in risky behavior on these networks. Findings from the first study, based on survey data, reveal that people who are more situationally aware are less likely to access personal accounts on …
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon
EBCS Articles
The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah
EBCS Articles
The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
EBCS Presentations
A worm is a malicious agent that propagates across networks of devices creating negative impacts on the devices it is able to reach and infect. Currently, there is very limited information in cybersecurity research regarding worm behavior across real networks of devices, particularly in large scale networks (e.g. campus networks, office networks, IoT etc.). This paper positions an experimental testbed that can be used for studying worm behaviors in large scale networks. In particular, this research aims to setup an infrastructure to empirically study worm generation, propagation, attacks, policies and antidote (intervention) mechanisms through a unified experimental testbed. As a …
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
Website Defacement And Routine Activities: Considering The Importance Of Hackers’ Valuations Of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, Shradha Sahani
EBCS Articles
Although a relatively simple form of hacking, website defacement can have severe consequences both for the websites that are attacked and the reputation of their owners. However, criminological research has yet to fully explore the causes and correlates of website defacement. We consider whether variables derived from routine activity theory can be applied to understanding website defacement. Specifically, using a sample of websites that were targeted by hackers in 2017 across the world, we examine the relationship between a country’s structural characteristics and the frequency of website defacement reported for the country. We find that website defacements are less likely …
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
Digital First: The Ontological Reversal And New Challenges For Is Research, Richard L. Baskerville, Michael D. Myers, Youngjin Yoo
EBCS Articles
The classical view of an information system is that it represents and reflects physical reality. We suggest this classical view is increasingly obsolete: digital technologies are now creating and shaping physical reality. We call this phenomenon the ontological reversal. The ontological reversal is where the digital version is created first, and the physical version second (if needed). This ontological reversal challenges us to think about the role of humans and technology in society. It also challenges us to think about our role as IS scholars in this digital world and what it means for our research agendas.
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
Online Deception And Situations Conducive To The Progression Of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, Youngsam Park
EBCS Articles
Adopting the criminal event perspective, we explore how online fraudsters make use of urgency cues in their interactions with potential victims throughout the progression of an online nonpayment fraud attempt. Integrating claims from the ‘Interpersonal-Deception Theory’ with situational explanations of crime, we investigate whether fraudsters’ presentations of verbal cues of urgency during the early stages of a criminal event are followed by a consistent presentation of verbal and non-verbal urgency cues. To answer this question, we posted a large number of ‘for-sale’ advertisements over a classified-ad website and interacted with online fraudsters and legitimate users who responded to our ads …
Labeling Terrorism, Valentina Garzon
Labeling Terrorism, Valentina Garzon
Georgia State Undergraduate Research Conference
No abstract provided.
Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo
Learning From The Offenders' Perspective On Crime Prevention, Scott Jacques, Elizabeth Bonomo
EBCS Articles
Criminals have a firsthand perspective on why and how to commit crime. In this chapter, we outline and illustrate five ways that offender-based research can be used to inform understanding of crime prevention, more specifically situational crime prevention: namely, (1) by directly determining what works to reduce crime; (2) generating findings that are suggestive of what prevention measures to invent and employ; (3) refining understanding of why a given prevention method reduces crime; (4) figuring out how offenders get around particular prevention measures; and, (5) gathering information on not only the positive but also the unintended, negative outcomes of prevention …
The Offenders’ Perspective On Prevention: Guarding Against Victimization And Law Enforcement, Scott Jacques, Danielle Reynald
The Offenders’ Perspective On Prevention: Guarding Against Victimization And Law Enforcement, Scott Jacques, Danielle Reynald
EBCS Articles
Law-abiding citizens are concerned with deterring and preventing crime. One strategy to accomplish this goal is to increase the costs and reduce the benefits that particular situations present to offenders. This form of crime control is known as situational crime prevention. Like law-abiding persons, offenders must concern themselves with being victimized. Differently, however, offenders must also worry about being detected and punished by formal agents. Thus, situational prevention from the offenders’ perspective is relatively complex, encompassing efforts to block not only opportunities for victimization but also for law enforcement. Building on the work of Clarke, the present study uses qualitative …