In this article, the author will question the seemingly obvious boundary between civil disobedience, as conceptualised by Rawls and Arendt, and several examples of criminal, or simply annoying, activities which don't meet their criteria, such as the case of the ‘Top 50'. The ‘Top 50' are multi-problem Dutch-Caribbean men, who refuse to adapt to predominant norms in Dutch society. IThe author argues that political aspects of their behaviour should be acknowledged, even if they engage in criminal behaviour and don't present explicit political goals. Firstly, she questions the way in which Rawls based his definition on a centralistic conception of governmental power and contrast it with Foucault's conception of normalising power, in which power is diffuse and cannot be restricted to the enactment of formal laws. Secondly, she discusses what the minimum requirements are to be able to classifyacts as civil disobedience. Rawls and Arendt draw a clear line between criminal behaviour and civil disobedience, but their requirements may be too strict. We might miss signals of injustice if actions that do not meet these criteria are excluded from the political discourse. The conclusion is that comparing Arendt's and Rawls' conception of civil disobedience with the behaviour of a marginal migrant group may be useful in questioning the boundaries of this concept and in making it more inclusive. A wider conception of civil disobedience may help to explain the meaning of deviant behaviour in terms of social critique and to challenge the traditional understanding of civil disobedience.
DOCUMENT
This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
DOCUMENT
Project objectives Radicalisation research leads to ethical and legal questions and issues. These issues need to be addressed in way that helps the project progress in ethically and legally acceptable manner. Description of Work The legal analysis in SAFIRE addressed questions such as which behavior associated with radicalisation is criminal behaviour. The ethical issues were addressed throughout the project in close cooperation between the ethicists and the researchers using a method called ethical parallel research. Results A legal analysis was made about criminal law and radicalisation. During the project lively discussions were held in the research team about ethical issues. An ethical justification for interventions in radicalisation processes has been written. With regard to research ethics: An indirect informed consent procedure for interviews with (former) radicals has been designed. Practical guidelines to prevent obtaining information that could lead to indirect identification of respondents were developed.
DOCUMENT
The past two decades, a disproportionate growth of females entering the criminal justice system and forensic mental health services has been observed worldwide. However, there is a lack of knowledge on the background of women who are convicted for violent offenses. What is their criminal history, what are their motives for offending and in which way do they differ from men convicted for violent offenses? In this study, criminal histories and the offenses for which they were admitted to forensic care were analyzed of 218 women and 218 men who have been treated between 1984 and 2014 with a mandatory treatment order in one of four Dutch forensic psychiatric settings admitting both men and women. It is concluded that there are important differences in violent offending between male and female patients. Most importantly, female violence was more often directed towards their close environment, like their children, and driven by relational frustration. Furthermore, female patients received lower punishments compared to male patients and were more often considered to be diminished accountable for their offenses due to a mental illness.
MULTIFILE
ENGLISH: A vast and growing body of research has shown that crime tends to run in families. However, previous studies focused only on traditional crimes and research on familial risk factors for cyber offending is very scarce. To address this gap in the literature, the present study examines the criminal behavior of the family members of a sample of cyber offenders prosecuted in the Netherlands. The sample consists of 979 cyber offenders prosecuted for computer trespassing between 2001 and 2018, and two matched groups of 979 traditional offenders and 979 non-offenders. Judicial information and kinship data from Dutch Statistics were used to measure criminal behavior among family members. Both traditional offenders and cyber offenders were found to be more likely to have criminal fathers, mothers, and siblings than non-offenders. Additional analyses, however, showed different patterns between cyber offenders who were only prosecuted for cyber offenses and those who also committed traditional crimes. While the former group of cyber offenders were similar to non-offenders in terms of family offending, the latter group of cyber offenders were more similar to traditional offenders. Overall, these results suggest that the traditional mechanisms of intergenerational transmission of crime can only partially explain cybercrime involvement. NEDERLANDS: Uit een groot en groeiend aantal onderzoeken blijkt dat criminaliteit vaak in families voorkomt. Eerdere studies richtten zich echter alleen op traditionele misdrijven en onderzoek naar familiaire risicofactoren voor cybercriminaliteit is zeer schaars. Om deze leemte in de literatuur op te vullen, onderzoekt deze studie het criminele gedrag van familieleden van een steekproef van cyberdelinquenten die in Nederland worden vervolgd. De steekproef bestaat uit 979 cyberdelinquenten die tussen 2001 en 2018 zijn vervolgd voor computervredebreuk, en twee gematchte groepen van 979 traditionele delinquenten en 979 niet-delinquenten. Justitiële informatie en verwantschapsgegevens van het Centraal Bureau voor de Statistiek werden gebruikt om crimineel gedrag onder familieleden te meten. Zowel traditionele daders als cybercriminelen bleken vaker criminele vaders, moeders en broers en zussen te hebben dan niet-daders. Aanvullende analyses lieten echter verschillende patronen zien tussen cyberdelinquenten die alleen werden vervolgd voor cyberdelicten en degenen die ook traditionele delicten pleegden. Terwijl de eerste groep cyberdelinquenten vergelijkbaar was met niet-delinquenten wat betreft gezinsdelinquentie, leek de tweede groep cyberdelinquenten meer op traditionele delinquenten. In het algemeen suggereren deze resultaten dat de traditionele mechanismen van intergenerationele overdracht van criminaliteit de betrokkenheid bij cybercriminaliteit slechts gedeeltelijk kunnen verklaren.
DOCUMENT
Introduction: Few studies have examined the sales of stolen account credentials on darkweb markets. In this study, we tested how advertisement characteristics affect the popularity of illicit online advertisements offering account credentials. Unlike previous criminological research, we take a novel approach by assessing the applicability of knowledge on regular consumer behaviours instead of theories explaining offender behaviour.Methods: We scraped 1,565 unique advertisements offering credentials on a darkweb market. We used this panel data set to predict the simultaneous effects of the asking price, endorsement cues and title elements on advertisement popularity by estimating several hybrid panel data models.Results: Most of our findings disconfirm our hypotheses. Asking price did not affect advertisement popularity. Endorsement cues, including vendor reputation and cumulative sales and views, had mixed and negative relationships, respectively, with advertisement popularity.Discussion: Our results might suggest that account credentials are not simply regular products, but high-risk commodities that, paradoxically, become less attractive as they gain popularity. This study highlights the necessity of a deeper understanding of illicit online market dynamics to improve theories on illicit consumer behaviours and assist cybersecurity experts in disrupting criminal business models more effectively. We propose several avenues for future experimental research to gain further insights into these illicit processes.
DOCUMENT
Full text via link. Project objectives Radicalisation research leads to ethical and legal questions and issues. These issues need to be addressed in way that helps the project progress in ethically and legally acceptable manner. Description of Work The legal analysis in SAFIRE addressed questions such as which behaviour associated with radicalisation is criminal behaviour. The ethical issues were addressed throughout the project in close cooperation between the ethicists and the researchers using a method called ethical parallel research. Results A legal analysis was made about criminal law and radicalisation. During the project lively discussionswere held in the research team about ethical issues. An ethical justification for interventions in radicalisation processes has been written. With regard to research ethics: An indirect informed consent procedure for interviews with (former) radicals has been designed. Practical guidelines to prevent obtaining information that could lead to indirect identification of respondents were developed.
DOCUMENT
Background: An adaptation of multisystemic therapy (MST) was piloted to find out whether it would yield better outcomes than standard MST in families where the adolescent not only shows antisocial or delinquent behaviour, but also has an intellectual disability. Method: To establish the comparative effectiveness of MST‐ID (n = 55) versus standard MST (n = 73), treatment outcomes were compared at the end of treatment and at 6‐month follow‐up. Pre‐treatment differences were controlled for using the propensity score method. Results: Multisystemic therapy‐ID resulted in reduced police contact and reduced rule breaking behaviour that lasted up to 6 months post‐treatment. Compared to standard MST, MST‐ID more frequently resulted in improvements in parenting skills, family relations, social support, involvement with pro‐social peers and sustained positive behavioural changes. At follow‐up, more adolescents who had received MST‐ID were still living at home. Conclusions: These results support further development of and research into the MST‐ID adaptation.
DOCUMENT
Based on the results of two research projects from the Netherlands, this paper explores how street oriented persons adapt and use digital technologies by focusing on the changing commission of instrumental, economically motivated, street crime. Our findings show how social media are used by street offenders to facilitate or improve parts of the crime script of already existing criminal activities but also how street offenders are engaging in criminal activities not typically associated with the street, like phishing and fraud. Taken together, this paper documents how technology has permeated street life and contributed to the ‘hybridization’ of street offending in the Netherlands—i.e. offending that takes place in person and online, often at the same time.
DOCUMENT
Safety at work The objective of the project Safety at Work is to increase safety at the workplace by applying and combining state of the art artefacts from personal protective equipment and ambient intelligence technology. In this state of the art document we focus on the developments with respect to how (persuasive) technology can help to influence behaviour in a natural, automatic way in order to make industrial environments safer. We focus on personal safety, safe environments and safe behaviour. Direct ways to influence safety The most obvious way to influence behaviour is to use direct, physical measures. In particular, this is known from product design. The safe use of a product is related to the characteristics of the product (e.g., sharp edges), the condition of people operating the product (e.g., stressed or tired), the man-machine interface (e.g., intuitive or complex) and the environmental conditions while operating the product (e.g., noisy or crowded). Design guidelines exist to help designers to make safe products. A risk matrix can be made with two axis: product hazards versus personal characteristics. For each combination one might imagine what can go wrong, and what potential solutions are. Except for ‘design for safety’ in the sense of no sharp edges or a redundant architecture, there is a development called ‘safety by design’ as well. Safety by design is a concept that encourages construction or product designers to ‘design out’ health and safety risks during design development. On this topic, we may learn from the area of public safety. Crime Prevention Through Environmental Design (or Designing Out Crime) is a multi-disciplinary approach to deterring criminal behaviour through environmental design. Designing Out Crime uses measures like taking steps to increase (the perception) that people can be seen, limiting the opportunity for crime by taking steps to clearly differentiate between public space and private space, and promoting social control through improved proprietary concern. Senses Neuroscience has shown that we have very little insight into our motivations and, consequently, are poor at predicting our own behaviour. It seems emotions are an important predictor of our behaviour. Input from our senses are important for our emotional state, and therefore influence our behaviour in an ‘ambient’ (invisible) way. The first sense we focus on is sight. Sight encompasses the perception of light intensity (illuminance) and colours (spectral distribution). Several researchers have studied the effects of light and colour in working environments. Results show, e.g., that elderly people can be helped with higher light levels, that cool colours like blue and green have a relaxing effect, while long-wavelength colours such as orange and red are stimulating and give more arousal, and that concentration and motivation of pupils at school can be influenced with light and colour settings. Identically, sound (hearing) has physiological effects (unexpected sounds cause extra cortisol -the fight or flight hormone- and the opposite for soothing sounds), psychological effects (sounds effect our emotions), cognitive effects (sounds effect our concentration) and behavioural effects (the natural behaviour of people is to avoid unpleasant sounds, and embrace pleasurable sounds). Smell affects 75% of daily emotions and plays an important role in memory, itis also important as a warning for danger (gas, burning smell). Research has shown that smell can influence work performance. Haptic feedback is a relative new area of research, and most studies focus on haptic feedback on handheld and automotive devices. Finally, employers have a duty to take every reasonable precaution to protect workers from heat stress disorders. Influence mechanisms: Cialdini To influence behaviour, we may learn from marketing psychology. Robert Cialdini states that if we have to think about every decision
MULTIFILE