Open Access. Powered by Scholars. Published by Universities.®

Criminology and Criminal Justice Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 104

Full-Text Articles in Criminology and Criminal Justice

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos Mar 2022

Social Construction Of Internet Fraud As Innovation Among Youths In Nigeria, Austin Ayodele Mr., Jonathan Kehinde Oyedeji, Huthman Olamide Badmos

International Journal of Cybersecurity Intelligence & Cybercrime

The proliferation of internet technologies has shaped interactions in contemporary society. Despite the pivotal importance of the internet to the global economy, it has several negative consequences such as internet fraud. This study examined the perception that young adults in Nigeria hold about internet fraud as an innovative means to economic survival rather than as a criminal enterprise. Robert Merton’s Anomie/Strain Theory (AST) was adopted as the theoretical thrust of the study. Adopting a qualitative data collection method, 15 participants were selected using the non-probabilistic purposive and snowballing techniques while opinions were sampled through in-depth interviews in different locations within …


Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz Mar 2022

Cybersecurity Risk In U.S. Critical Infrastructure: An Analysis Of Publicly Available U.S. Government Alerts And Advisories, Zachary Lanz

International Journal of Cybersecurity Intelligence & Cybercrime

As threat actor operations become increasingly sophisticated and emphasize the targeting of critical infrastructure and services, the need for cybersecurity information sharing will continue to grow. Escalating demand for cyber threat intelligence and information sharing across the cybersecurity community has resulted in the need to better understand the information produced by reputable sources such as U.S. CISA Alerts and ICS-CERT advisories. The text analysis program, Profiler Plus, is used to extract information from 1,574 U.S. government alerts and advisories to develop visualizations and generate enhanced insights into different cyber threat actor types, the tactics which can be used for cyber …


More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall Jan 2022

More Amazon Than Mafia: Analysing A Ddos Stresser Service As Organised Cybercrime, Roberto Musotto, David S. Wall

Research outputs 2014 to 2021

© 2020, The Author(s). The internet mafia trope has shaped our knowledge about organised crime groups online, yet the evidence is largely speculative and the logic often flawed. This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study. In this article we analyse a DDoS (Distributed Denial of Service) stresser (also known as booter) which sells its services online to enable offenders to launch attacks. Using Social Network Analysis to explore the service operations and payment systems, our findings show a central business model that is similar to …


North Korean Cyber Attacks And Policy Responses: An Interdisciplinary Theoretical Framework, Jeeseon Hwang, Kyung-Shick Choi Aug 2021

North Korean Cyber Attacks And Policy Responses: An Interdisciplinary Theoretical Framework, Jeeseon Hwang, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Level Of Engagement With Social Networking Services And Fear Of Online Victimization: The Role Of Online Victimization Experiences, Yeonjae Park, Lynne M. Vieraitis Aug 2021

Level Of Engagement With Social Networking Services And Fear Of Online Victimization: The Role Of Online Victimization Experiences, Yeonjae Park, Lynne M. Vieraitis

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Editorial Introduction To The Special Issue: Supporting Future Scholarship On Cybercrime, Jaeyong Choi, Brandon Dulisse, Richard L. Wentling, Nathan Kruis Aug 2021

Editorial Introduction To The Special Issue: Supporting Future Scholarship On Cybercrime, Jaeyong Choi, Brandon Dulisse, Richard L. Wentling, Nathan Kruis

International Journal of Cybersecurity Intelligence & Cybercrime

This editorial introduction will present an overview of the three papers published in this special issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The winners of the student paper competition during the 2021 Whitehat Conference have prepared their papers for this special issue. Their research directs our attention to key issues regarding cybercrime that have often been overlooked in the literature ranging from North Korean cyberterrorism to the relationship between COVID-19 and cybercrime and to fear of online victimization.


Malware Infections In The U.S. During The Covid-19 Pandemic: An Empirical Study, Sydney Gero, Sinchul Back, Jennifer Laprade, Joonggon Kim Aug 2021

Malware Infections In The U.S. During The Covid-19 Pandemic: An Empirical Study, Sydney Gero, Sinchul Back, Jennifer Laprade, Joonggon Kim

International Journal of Cybersecurity Intelligence & Cybercrime

The COVID-19 pandemic has changed the world in many ways, especially in the landscape of cyber threats. The pandemic has pro-vided cybercriminals with more opportunities to commit crimes due to more people engaging in online activities, along with the increased use of computers for school, work, and social events. The current study seeks to explore cybercrime trends, in particular malware infections, during the COVID-19 pandemic. Thus, this study examines the relationship between the number of malware in-fections, COVID-19 positive cases, closed non-essential businesses, and closed K-12 public schools in the United States. Data utilized in this study derives from (1) …


Cyber-Victimization Trends In Trinidad & Tobago: The Results Of An Empirical Research, Troy Smith, Nikolaos Stamatakis Apr 2021

Cyber-Victimization Trends In Trinidad & Tobago: The Results Of An Empirical Research, Troy Smith, Nikolaos Stamatakis

International Journal of Cybersecurity Intelligence & Cybercrime

Cybertechnology has brought benefits to the Caribbean in the form of new regional economic and social growth. In the last years, Caribbean countries have also become attractive targets for cybercrime due to increased economic success and online presence with a low level of cyber resilience. This study examines the online-related activities that affect cybercrime victimization by using the Routine Activity Theory (RAT). The present study seeks to identify activities that contribute to different forms of cybercrime victimization and develop risk models for these crimes, particularly the understudied cyber-dependent crimes of Hacking and Malware. It also aims to explore if there …


Assessing The Credibility Of Cyber Adversaries, Jenny A. Wells, Dana S. Lafon, Margaret Gratian Apr 2021

Assessing The Credibility Of Cyber Adversaries, Jenny A. Wells, Dana S. Lafon, Margaret Gratian

International Journal of Cybersecurity Intelligence & Cybercrime

Online communications are ever increasing, and we are constantly faced with the challenge of whether online information is credible or not. Being able to assess the credibility of others was once the work solely of intelligence agencies. In the current times of disinformation and misinformation, understanding what we are reading and to who we are paying attention to is essential for us to make considered, informed, and accurate decisions, and it has become everyone’s business. This paper employs a literature review to examine the empirical evidence across online credibility, trust, deception, and fraud detection in an effort to consolidate this …


Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee Apr 2021

Cyberbullying: Its Social And Psychological Harms Among Schoolers, Hyeyoung Lim, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Criminal justice around the world has prioritized the prevention and protection of bullying and its victims due to the rapid increases in peer violence. Nevertheless, relatively few studies have examined what treatments or assistance are effective for peer victims to reduce and recover from their social and psychological suffering, especially in cyberbullying cases. Using data derived from the National Crime Victimization Survey-School Crime Supplement data in 2011 and 2013 (N=823), the current study examined the impact of two emotional support groups (i.e., adult and peer groups) on cyberbullying victims' social and psychological harm. The findings indicated that both adult and …


The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum Apr 2021

The Challenges Of Identifying Dangers Online And Predictors Of Victimization, Catherine D. Marcum

International Journal of Cybersecurity Intelligence & Cybercrime

This short paper will provide an overview of the impressive pieces included in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. This issue includes articles on the following pertinent topic, utilizing a range of approaches and methodologies: 1) online credibility; 2) cyberbullying; and 3) unauthorized access of information. An emphasis on the importance of policy development and better protection of potential victims is a common thread throughout the issue.


Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause Mar 2021

Mass Incarceration In Nebraska: Data And Historical Analysis Of Inmates From 1980-2020, Anna Krause

Honors Theses

This study examines Nebraska Department of Corrections inmate data from 1980-2020, looking specifically at inmate demographics and offense trends. State-of-the-art data analysis is conducted to collect, modify, and visualize the data sources. Inmates are organized by each decade they were incarcerated within. The current active prison population is also examined in their own research group. The demographic and offense trends are compared with previous local and national research. Historical context is given for evolving trends in offenses. Solutions for Nebraska prison overcrowding are presented from various interest groups. This study aims to enlighten all interested Nebraskans on who inhabits their …


Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison Feb 2021

Illicit Activity Detection In Large-Scale Dark And Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, Robert W. Harrison

EBCS Articles

Many online chat applications live in a grey area between the legitimate web and the dark net. The Telegram network in particular can aid criminal activities. Telegram hosts “chats” which consist of varied conversations and advertisements. These chats take place among automated “bots” and human users. Classifying legitimate activity from illegitimate activity can aid law enforcement in finding criminals. Social network analysis of Telegram chats presents a difficult problem. Users can change their username or create new accounts. Users involved in criminal activity often do this to obscure their identity. This makes establishing the unique identity behind a given username …


Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum Jan 2021

Examining The Crime Prevention Claims Of Crime Prevention Through Environmental Design On System-Trespassing Behaviors: A Randomized Experiment, Daren Fisher, David Maimon, Tamar Berenblum

EBCS Articles

Crime prevention through environmental design (CPTED) is a non-punitive method for reducing crime through the design of the built environment. The relevance of CPTED strategies however is less clear in the context of computing environments. Building upon prior research indicating that computing environments may change computer users’ behaviors, this study tests the effectiveness of CPTED based approaches in mitigating system trespassing events. Findings from this randomized controlled field trial demonstrate that specific CPTED strategies can mitigate hacking events by: reducing the number of concurrent activities on the target computer, attenuating the number of commands typed in the attacked computer, and …


An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones Jan 2021

An Assessment Of The Impacts Of Social Media Inputs And Court Case Information On Mitigating Insider Threats, Robert Jones

CCE Theses and Dissertations

The insider threat is a global problem that impacts organizations and produces a gamut of undesired outcomes. Businesses often experience lost revenue and stolen trade secrets, which can leave a tarnished reputation. Insider threats can also cause harm to individuals and national security. Past efforts have not mitigated the problem in its entirety. Documented instances of insider threats are as recent as March 2020. Many researchers have focused on monitoring technologies and relying on human monitoring in a reactive posture. An ideal solution would scrutinize an individual’s character and ascertain whether unique traits associated with actors of insider threats are …


The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques Nov 2020

The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques

EBCS Articles

Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …


The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland Nov 2020

The Effects Of Self-Control On The Cyber Victim-Offender Overlap, Brooke Nodeland

International Journal of Cybersecurity Intelligence & Cybercrime

Increasingly, the overlap between victims and offenders has received empirical attention with regard to traditional forms of deviance. More recently, the growth of cyber offending has led to a need to examine whether traditional criminological theories can be used to explain these crimes in the same manner as traditional offenses. However, limited attention has been given to victim-offender overlap in cyber-offending. The current study uses a sample of American college students to examine the influence of self-control on cyber offending, cyber victimization, and the cyber victim-offender overlap. The results indicate that low self-control significantly predicts participation in cyber offending as …


Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade Nov 2020

Cyber-Situational Crime Prevention And The Breadth Of Cybercrimes Among Higher Education Institutions, Sinchul Back, Jennifer Laprade

International Journal of Cybersecurity Intelligence & Cybercrime

Academic institutions house enormous amounts of critical information from social security numbers of students to proprietary research data. Thus, maintaining up to date cybersecurity practices to protect academic institutions’ information and facilities against cyber-perpetrators has become a top priority. The purpose of this study is to assess common cybersecurity measures through a situational crime prevention (SCP) theoretical framework. Using a national data set of academic institutions in the United States, this study investigates the link between common cybersecurity measures, crime prevention activities, and cybercrimes. By focusing on the conceptualization of cybersecurity measures as SCP techniques, this study also offers the …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Saumya Ramarao, Jung Ah Yun, Bok Gyo Jeong

International Journal of Cybersecurity Intelligence & Cybercrime

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum Nov 2020

Book Review: Computer Capers: Tales Of Electronic Thievery, Embezzlement, And Fraud. By Thomas Whiteside, Brian Nussbaum

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee Nov 2020

Toward Mitigating, Minimizing, And Preventing Cybercrimes And Cybersecurity Risks, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercrime and cybersecurity are emerging fields of research, shaped by technological developments. Scholars in these interconnected fields have studied different types of cybercrimes as well as victimization and offending. Increasingly, some of these scholars have focused on the ways in which cybercrimes can be mitigated, minimized, and even prevented. However, such strategies are often difficult to achieve in reality due to the human and technical factors surrounding cybercrimes. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three papers adequately address such challenges using college student samples and nationally representative samples, as well as a framework through …


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, Mckenzie Johnson Apr 2020

Volume 12, Haleigh James, Hannah Meyls, Hope Irvin, Megan E. Hlavaty, Samara L. Gall, Austin J. Funk, Karyn Keane, Sarah Ghali, Antonio Harvey, Andrew Jones, Rachel Hazelwood, Madison Schmitz, Marija Venta, Haley Tebo, Jeremiah Gilmer, Bridget Dunn, Benjamin Sullivan, Mckenzie Johnson

Incite: The Journal of Undergraduate Scholarship

Introduction, Dr. Roger A. Byrne, Dean

From the Editor, Dr. Larissa "Kat" Tracy

From the Designers, Rachel English, Rachel Hanson

Immortality in the Mortal World: Otherworldly Intervention in "Lanval" and "The Wife of Bath's Tale" by Haleigh James

Analysis of Phenolic Compounds in Moroccan Olive Oils by HPLC by Hannah Meyls

Art by Hope Irvin

The Effects of Cell Phone Use on Gameplay Enjoyment and Frustration by Megan E. Hlavaty, Samara L. Gall, and Austin J. Funk

Care, No Matter What: Planned Parenthood's Use of Organizational Rhetoric to Expand its Reputation by Karyn Keane

Analysis of Petroleum Products for …


Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon Mar 2020

Deterrence In Cyberspace: An Interdisciplinary Review Of The Empirical Literature, David Maimon

EBCS Articles

The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing …


Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah Mar 2020

Attacking And Securing Beacon-Enabled 802.15.4 Networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, Raheem Beyah

EBCS Articles

The IEEE 802.15.4 standard has attracted timecritical applications in wireless sensor networks because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS management scheme’s security mechanisms still leave the 802.15.4 medium access control vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 networks either focus on nonbeacon-enabled 802.15.4 networks or cannot defend against insider attacks for beacon-enabled 802.15.4 networks. In this paper, we illustrate this by demonstrating attacks on the availability and integrity of the beaconenabled 802.15.4 network. To confirm the validity of the attacks, we implement the attacks using Tmote Sky motes for …


Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park Feb 2020

Illegal Gambling And Its Operation Via The Darknet And Bitcoin: An Application Of Routine Activity Theory, Sinyong Choi, Kyung-Shick Choi, Yesim Sungu-Eryilmaz, Hee-Kyung Park

International Journal of Cybersecurity Intelligence & Cybercrime

The Darknet and Bitcoins have been widely utilized by those who wish to anonymously perform illegal activities in cyberspace. Restricted in many countries, gambling websites utilize Bitcoin payments that allow users to freely engage in illegal gambling activities with the absence of a formal capable guardian. Despite the urgency and limited knowledge available to law enforcement regarding this issue, few empirical studies have focused on illegal gambling websites. The current study attempts to examine the characteristics and operations of online gambling websites on both the Darknet and Surface Web, which allow Bitcoin payments. The findings suggest that both websites on …


An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher Feb 2020

An Empirical Study To Determine The Role Of File-System In Modification Of Hash Value, Kumarshankar Raychaudhuri, M. George Christopher

International Journal of Cybersecurity Intelligence & Cybercrime

In digital forensics, maintaining the integrity of digital exhibits is an essential aspect of the entire investigation and examination process, which is established using the technique of hashing. Lack of knowledge, while handling digital exhibits, might lead to unintentional alteration of computed hash, rendering the exhibit unacceptable in the court of Law. The hash value of a physical drive does not solely depend upon the data files present in it but also its file-system. Therefore, any change to the file-system might result in the change of the disk hash, even when the data files within it remain untouched. In this …


A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson Feb 2020

A Reverse Digital Divide: Comparing Information Security Behaviors Of Generation Y And Generation Z Adults, Scott M. Debb, Daniel R. Schaffer, Darlene G. Colson

International Journal of Cybersecurity Intelligence & Cybercrime

How individuals conceptualize their accountability related to digital technology. There may also be age-based vulnerabilities resulting from personal perceptions about the importance of engaging in best-practices. However, age may not be as critical as experience when it comes to implementation of these behaviors. Using the Cybersecurity Behaviors subscale of the Online Security Behaviors and Beliefs Questionnaire (OSBBQ), this study compared the self-reported cybersecurity attitudes and behaviors across college-aged individuals from Generation Y and Generation Z. Data were derived from a convenience sample of predominantly African-American and Caucasian respondents (N=593) recruited from two public universities in Virginia, USA. Four of the …


Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa Feb 2020

Book Review: The Cyber Risk Handbook By Domenic Antonucci, Stanley Mierzwa

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Review Of Fundamental To Know About The Future, Hannarae Lee Feb 2020

Review Of Fundamental To Know About The Future, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

What we consider fundamental elements can be easily overlooked or perceived as facts without the process of empirical testing. Especially in the field of cybercrime and cybersecurity, there are more speculations regarding the prevalence and the scope of harm carried out by wrongdoers than empirically tested studies. To fill the void, three articles included in the current issue addresses empirical findings of fundamental concerns and knowledge in the field of cybercrime and cybersecurity.