In the debate about smart cities, an alternative to a dominant top-down, tech-driven solutionist approach has arisen in examples of ‘civic hacking’. Hacking here refers to the playful, exploratory, collaborative and sometimes transgressive modes of operation found in various hacker cultures, this time constructively applied in the context of civics. It suggests a novel logic to organise urban society through social and digital media platforms, moving away from centralised urban planning towards a more inclusive process of city-making, creating new types of public spaces. This book takes this urban imaginary of a hackable city seriously, using hacking as a lens to explore examples of collaborative city-making enabled by digital media technologies. Five different perspectives are discussed. Hacking can be understood as (1) an ethos, a particular articulation of citizenship in the network era; (2) as a set of iterative and collaborative city-making practices, bringing out new roles and relations between citizens, (design) professionals and institutional actors; (3) a set of affordances of institutional structures that allow or discourage their appropriation; (4) a critical lens to bring in notions of democratic governance, power struggles and conflict of interests into the debate on collaborative city-making; and (5) a point of departure for action research. After a discussion of these themes, the various chapters in the book are briefly introduced. Taken together they contribute to a wider debate about practices of technology-enabled collaborative city-making, and the question how city hacking may mature from the tactical level of smart and often playful interventions to a strategic level of enduring impact.
DOCUMENT
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.
DOCUMENT
Criminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on opportunities and situational provocations. Such foundational research has yet to be developed regarding cybercrimes, or offenses enabled by computer technology and the Internet. This study address this issue using a sample of 37 offender networks. The results show variations in the offending behaviors of those involved in cybercrime. Almost half of the offender networks in this sample appeared to be cybercrime specialists, in that they only performed certain forms of cybercrime. The other half performed various types of crimes on and offline. The relative equity in specialization relative to versatility, particularly in both on and offline activities, suggests that there may be limited value in treating cybercriminals as a distinct offender group. Furthermore, this study calls to question what factors influence an offender's pathway into cybercrime, whether as a specialized or versatile offender. The actors involved in cybercrime networks, whether as specialists or generalists, were enmeshed into broader online offender networks who may have helped recognize and act on opportunities to engage in phishing, malware, and other economic offenses.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
Doelstellingen De mate van betrokkenheid van jonge gebruikers bij wervingsadvertenties voor geldezels op Instagram onderzoeken. Methoden Drie advertenties die de belangrijkste mechanismen voor betrokkenheid bij cybercriminaliteit weerspiegelen en gericht waren op Nederlandse gebruikersclusters werden op twee Instagram-plaatsingen geplaatst. Door middel van dit quasi-experimentele 3 × 2 factorial design konden we het bereik en de weergaven van de advertenties, de doorklikratio's, het geslacht van de deelnemers en de temporele verdelingen van de gebruikersbetrokkenheid analyseren. Resultaten De analyse toont aan dat tot 3% van de jonge gebruikers zich bezighield met de advertenties, vooral met advertenties die een luxe levensstijl promoten en neutralisatietechnieken gebruiken. Mannen waren vaker betrokken en 's nachts werd er meer geklikt. Conclusies Sommige jonge Instagram-gebruikers lijken geneigd om geld te verdienen via hun bankpas en lopen het risico om online betrokken te raken bij cybercriminaliteit. We moedigen toekomstig onderzoek aan om het gebruik van sociale media in criminologische studies verder te onderzoeken. ENGLISH Objectives Examine the level of engagement of young users with money mule recruitment ads on Instagram. Methods Three ads reflecting key cybercrime involvement mechanisms and targeting Dutch user clusters were run on two Instagram placements. By means of this quasi-experimental 3 × 2 factorial design, we were able to analyze the reach and views of the ads, click-through rates, gender of the participants, and temporal distributions of user engagement. Results Mimicking actual recruitment environments, analysis shows that up to 3% of young users engaged with the ads, especially those promoting a luxury lifestyle and using neutralization techniques. Men were more likely to engage, and click-through rates were higher at night. Conclusions Some young Instagram users seem prone to making money through their bank cards and risk becoming involved in cybercrime online. We encourage future research to explore further the use of social media in criminological studies. This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09537-7
DOCUMENT
Smart speakers are heralded to make everyday life more convenient in households around the world. These voice-activated devices have become part of intimate domestic contexts in which users interact with platforms.This chapter presents a dualstudy investigating the privacy perceptions of smart speaker users and non-users. Data collected in in-depth interviews and focus groups with Dutch users and non-users show that they make sense of privacy risks through imagined sociotechnical affordances. Imagined affordances emerge with the interplay between user expectations, technologies, and designer intentions. Affordances like controllability, assistance, conversation, linkability, recordability, and locatability are associated with privacy considerations. Viewing this observation in the light of privacy calculus theory, we provide insights into how users’ positive experiences of the control over and assistance in the home offered by smart speakers outweighs privacy concerns. On the contrary, non-users reject the devices because of fears that recordability and locatability would breach the privacy of their homes by tapping data to platform companies. Our findings emphasize the dynamic nature of privacy calculus considerations and how these interact with imagined affordances; establishing a contrast between rational and emotional responses relating to smart speaker use.Emotions play a pivotal role in adoption considerations whereby respondents balance fears of unknown malicious actors against trust in platform companies.This study paves the way for further research that examines how surveillance in the home is becoming increasingly normalized by smart technologies.
DOCUMENT