Repeat victimization has been widely studied from the perspective of environmental criminology for several decades. During this period, criminologists have identified a set of repeat victimization premises that are observed for many crimes; however, it is unknown whether these premises are also valid for cybercrime. In this study we rely on more than 9 million Zone-H data records from 2010 to 2017 to test whether these premises apply for the cybercrime of website defacement. We show that the phenomenon of repeat victimization is also observed in defaced cyber places (i.e. websites). In particular, we found that repeats contributed little to crime rates, that repeats occurred even several years after the original incident, that they were committed disproportionately by prolific offenders, and that few offenders returned to victimize previous targets. The results suggest that some traditional premises of repeat victimization may also be valid for understanding cybercrime events such as website defacement, implying that environmental criminology theories also constitute a useful framework for cybercrime analysis. The implications of these results in terms of criminological theory, cybercrime prevention, and the limitations derived from the use of Zone-H data are discussed.
DOCUMENT
Repeat victimization has been widely studied from the perspective of environmental criminology for several decades. During this period, criminologists have identified a set of repeat victimization premises that are observed for many crimes; however, it is unknown whether these premises are also valid for cybercrime. In this study we rely on more than 9 million Zone-H data records from 2010 to 2017 to test whether these premises apply for the cybercrime of website defacement. We show that the phenomenon of repeat victimization is also observed in defaced cyber places (i.e. websites). In particular, we found that repeats contributed little to crime rates, that repeats occurred even several years after the original incident, that they were committed disproportionately by prolific offenders, and that few offenders returned to victimize previous targets. The results suggest that some traditional premises of repeat victimization may also be valid for understanding cybercrime events such as website defacement, implying that environmental criminology theories also constitute a useful framework for cybercrime analysis. The implications of these results in terms of criminological theory, cybercrime prevention, and the limitations derived from the use of Zone-H data are discussed
DOCUMENT
In order to find out whether victims adequately recover from cybercrime incidents, it is important to gain insight into its effects and impact on users. However, as it stands now, there is not much literature on the impact of cybercrime. We address this gap by qualitatively examining the impact of two types of cybercrime, namely phishing and malware attacks targeting online banking customers. We used the coping approach as a framework to study how victims deal with the negative events they have experienced. In order to study the impact of cybercrime and how victims cope with it, 30 cybercrime victims were interviewed. We observed that, next to financial damage, victims described different forms of psychological and emotional effects. Victims also reported various kinds of secondary impacts, such as time loss and not being treated properly when handling the incident. In addition, the interview data provided insight into cognitive and behavioral change, which potentially offers opportunities for cybercrime prevention. Our study demonstrates that the level of impact varies among cybercrime victims, ranging from little or no impact to severe impact. In addition, while some victims were only affected for a few days, some were still feeling the effects. The effects and impact of these fraudulent schemes on victims should therefore not be underestimated. We conclude that the coping approach provides a useful framework to study the effects and impact of cybercrime victimization and how victims recover from it. The results of our study provide a steppingstone for future studies on this topic. https://www.linkedin.com/in/rutgerleukfeldt/
DOCUMENT
Objectives: Aiming to reduce distributed denial-of-service (DDoS) attacks by alerting the consciences of Internet users, this paper evaluates the effectiveness of four warning banners displayed as online ads (deterrent—control, social, informative, and reorienting) and the contents of their two linked landing pages. Methods: We implement a 4 x 2 quasi-experimental design on a self-selected sample of Internet users to measure the engagement generated by the ads and the pages. Engagement is measured on the ads as the ratio of clicks to impressions, and on the pages as percentage of page scrolled, average session duration, video interaction rate, and URLs click rate. Results: Social ads generate significantly more engagement than the rest with low to medium effect sizes. Data reveal no differences in engagement between both landing page designs. Conclusions: Social messages may be a better alternative for engaging with potential cyber offenders than the traditional deterrent messages. Correspondence: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands. Email: AMoneva@nscr.n This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09504-2
MULTIFILE
Doelstellingen De mate van betrokkenheid van jonge gebruikers bij wervingsadvertenties voor geldezels op Instagram onderzoeken. Methoden Drie advertenties die de belangrijkste mechanismen voor betrokkenheid bij cybercriminaliteit weerspiegelen en gericht waren op Nederlandse gebruikersclusters werden op twee Instagram-plaatsingen geplaatst. Door middel van dit quasi-experimentele 3 × 2 factorial design konden we het bereik en de weergaven van de advertenties, de doorklikratio's, het geslacht van de deelnemers en de temporele verdelingen van de gebruikersbetrokkenheid analyseren. Resultaten De analyse toont aan dat tot 3% van de jonge gebruikers zich bezighield met de advertenties, vooral met advertenties die een luxe levensstijl promoten en neutralisatietechnieken gebruiken. Mannen waren vaker betrokken en 's nachts werd er meer geklikt. Conclusies Sommige jonge Instagram-gebruikers lijken geneigd om geld te verdienen via hun bankpas en lopen het risico om online betrokken te raken bij cybercriminaliteit. We moedigen toekomstig onderzoek aan om het gebruik van sociale media in criminologische studies verder te onderzoeken. ENGLISH Objectives Examine the level of engagement of young users with money mule recruitment ads on Instagram. Methods Three ads reflecting key cybercrime involvement mechanisms and targeting Dutch user clusters were run on two Instagram placements. By means of this quasi-experimental 3 × 2 factorial design, we were able to analyze the reach and views of the ads, click-through rates, gender of the participants, and temporal distributions of user engagement. Results Mimicking actual recruitment environments, analysis shows that up to 3% of young users engaged with the ads, especially those promoting a luxury lifestyle and using neutralization techniques. Men were more likely to engage, and click-through rates were higher at night. Conclusions Some young Instagram users seem prone to making money through their bank cards and risk becoming involved in cybercrime online. We encourage future research to explore further the use of social media in criminological studies. This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09537-7
DOCUMENT
Climate change is now considered more than just an environmental issue, with far-reaching effects for society at large. While the exact implications of climate change for policing practice are still unknown, over the past two decades criminologists have anticipated that climate change will have a number of effects that will result in compromised safety and security. This article is informed by the outcome of a co-creation workshop with 16 practitioners and scholars of diverse backgrounds based in The Netherlands, who sought to conceptualize and systematize the existing knowledge on how climate change will most likely impact the professional practice of the Dutch (or any other) police. These challenges, with varying degrees of intensity, are observable at three main levels: the societal, organizational, and individual level. These levels cannot be separated neatly in practice but we use them as a structuring device, and to illustrate how dynamics on one level impact the others. This article aims to establish the precepts necessary to consider when exploring the intersection between climate change and policing. We conclude that much still needs to be done to ensure that the implications of climate change and the subject of policing are better aligned, and that climate change is recognized as an immediate challenge experienced on the ground and not treated as a distant, intangible phenomenon with possible future impacts. This starts with creating awareness about the possible ways in which it is already impacting the functioning of policing organizations, as well as their longer-term repercussions.
MULTIFILE
Jaarlijks keren circa 30.000 justitiabelen terug naar de samenleving. De reclassering houdt op een deel van hen toezicht, met als doel recidivekansen verminderen en maatschappelijke re-integratie bevorderen. Reclasseringswerkers boeken in de praktijk met hun cliënten veelal vooruitgang op domeinen zoals wonen, werk en relaties. Deze wordt echter vaak tenietgedaan door complexe schuldsituaties waarin cliënten verkeren; hetzij direct doordat cliënten bijvoorbeeld stelen om te kunnen leven, hetzij indirect doordat financiële problematiek cliënten zo in beslag neemt dat er geen ‘ruimte’ is voor werken aan gedragsverandering. Kortom, financiële problematiek is een belangrijk probleem. Reclasseringswerkers missen echter handvaten om cliënten te begeleiden bij financiële problematiek, en bij gebrek aan eenduidige methodische aanpakken zoeken zij hun eigen weg.1 Ook vanuit de literatuur is financiële problematiek bekend als criminogene factor, maar is weinig bekend over de interactie tussen schulden en criminaliteit en de factoren die daarbij een rol spelen. Zowel de praktijk als de theorie vraagt dus om onderzoek dat meer inzicht biedt in de complexiteit van financiële problematiek onder reclasseringscliënten en dat werkers bovendien concrete handvaten kan bieden om cliënten beter te begeleiden bij financiële problematiek.
DOCUMENT
This essay explores the notion of resilience by providing a theoretical context and subsequently linking it to the management of safety and security. The distinct worlds of international security, industrial safety and public security have distinct risks as well as distinct ‘core purposes and integrities’ as understood by resilience scholars. In dealing with risks one could argue there are three broad approaches: cost-benefit analysis, precaution and resilience. In order to distinguish the more recent approach of resilience, the idea of adaptation will be contrasted to mitigation. First, a general outline is provided of what resilience implies as a way to survive and thrive in the face of adversity. After that, a translation of resilience for the management of safety and security is described. LinkedIn: https://www.linkedin.com/in/juul-gooren-phd-cpp-a1180622/
DOCUMENT
The Annual Conference on the Human Factor in Cybercrime is a small and specialised scientific event that aims to bring together scholars from around the world to present their research advances to a select audience. Its dynamic and linear format favours group discussions since all contributions are heard by all the attendants. This, together with its tailored social scheme, promotes interaction between members, which—in turn—leads to new collaborations. However, it has not yet been analysed whether the design of the conference actually encourages varied participation and fosters collaborative networks among its participants. The purpose of this chapter is to assess participation in the 2018 and 2019 editions to determine whether this is the case. Using descriptive analyses, here we show how participation in the conference has varied and examine the composition of the collaboration networks among the participants. The results show an increased and more diverse participation in the 2019 meeting along with a greater presence of stakeholders. Furthermore, the findings reveal that members of previously established organisations play an important role in cohering the network. Yet few connections exist between academia and practice. A further analysis of the strengths and weaknesses identified in the two editions of the conference serves to elaborate a series of recommendations for future editions.
DOCUMENT
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive alternative to the existing cybersecurity paradigm. We define cyber-resilience as the capacity to withstand, recover from and adapt to the external shocks caused by cyber-risks. This article seeks to provide a broader organizational understanding of cyber-resilience and the tensions associated with its implementation. We apply Weick's (1995) sensemaking framework to examine four foundational tensions of cyber-resilience: a definitional tension, an environmental tension, an internal tension, and a regulatory tension. We then document how these tensions are embedded in cyber-resilience practices at the preparatory, response and adaptive stages. We rely on qualitative data from a sample of 58 cybersecurity professionals to uncover these tensions and how they reverberate across cyber-resilience practices.
DOCUMENT