An investigation into whether or not young people studying in higher education in the Netherlands have modified their download behaviour, in the light of a legal obligation to block The Pirate Bay (TPB) by Dutch Internet Service Providers (ISPs). In the lawsuit, it is argued that a blockade by the ISPs would be an effective measure to stop downloading from The Pirate Bay. In this study the target group was asked if they think that their download behaviour is modified by the blockade.
DOCUMENT
Copyright enforcement by private third parties – does it work uniformly across the EU? Since the inception of Napster, home copying of digital files has taken a flight. The first providers of software or infrastructure for the illegal exchange of files were held contributory or vicariously liable for copyright infringement. In response, they quickly diluted the chain of liability to such an extent that neither the software producers, nor the service providers could be held liable. Moving further down the communication chain, the rights holders are now requiring Internet Service Providers (ISPs) that provide access to end customers to help them with the enforcement of their rights. This article discusses case-law regarding the enforcement of copyright by Internet Access Providers throughout Europe. At first glance, copyright enforcement has been harmonised by means of a number of directives, and article 8(3) of the Copyright Directive (2001/29/EC) regulates that EU Member States must ensure the position of rights holders with regard to injunctions against ISPs. Problem solved? Case law from Denmark, Ireland, Belgium, Norway, England, The Netherlands, Austria and the Court of Justice of the EU was studied. In addition, the legal practice in Germany was examined. The period of time covered by case law is from 2003 to 2013, the case law gives insight into the differences that still exist after the implementation of the directive.
DOCUMENT
Research on how music artists generate sales from their content through different platforms is scant. In this study, configuration theory is used to show that different market access configurations are viable simultaneously and that young musicians differ significantly in how they generate revenues. Using data on the media and sales performance of 338 young musicians in the Netherlands, we show that there is an ‘Emerging Star’ group (7–13% of artists depending on regional scope) and that record labels play an important role in this configuration providing broad media access on all platforms, both old and new. Digital age ‘Independents’ (14% of young artists), mostly without a record label, seem to benefit from the use of social media while exploiting synergies around live music. All artists in the remaining groups ‘Question Marks’ and ‘Hobbyists’ experience low to very low performance on all platforms. This study shows that configuration theory can provide detailed insight into viable and unviable marketing strategies. In particular, it shows that the globally declining music CD platform can still be very important for specific artists that exploit synergies between live performances, on-site CD sales and social media fan relationship management. The implications for marketing theory and young music artists are discussed. Om het artikel te kunnen lezen dient het gekocht te worden: http://www.tandfonline.com/doi/abs/10.1080/0267257X.2015.1034158
DOCUMENT
A previous study found a variety of unusual sexual interests to cluster in a five-factor structure, namely submission/masochism, forbidden sexual activities, dominance / sadism, mysophilia, and fetishism (Schippers et al., 2021). The current study was an empirical replication to examine whether these findings generalized to a representative population sample. An online, anonymous sample (N = 256) representative of the Dutch adult male population rated 32 unusual sexual interests on a scale from 1 (very unappealing) to 7 (very appealing). An exploratory factor analysis assessed whether similar factors would emerge as in the original study. A subsequent confirmatory factor analysis served to confirm the factor structure. Four slightly different factors of sexual interest were found: extreme, illegal and mysophilic sexual activities; light BDSM without real pain or suffering; heavy BDSM that may include pain or suffering; and illegal but lower-sentenced and fetishistic sexual activities. The model fit was acceptable. The representative replication sample was more sexually conservative and showed less sexual engagement than the original convenience sample. On a fundamental level, sexual interest in light BDSM activities and extreme, forbidden, and mysophilic activities seem to be relatively separate constructs.
DOCUMENT
African citizens are increasingly being surveilled, profiled, and targeted online in ways that violate their rights. African governments frequently use pandemic or terrorism-related security risks to grant themselves additional surveillance rights and significantly increase their collection of monitoring apparatus and technologies while spending billions of dollars to conduct surveillance (Roberts et al. 2023). Surveillance is a prominent strategy African governments use to limit civic space (Roberts and Mohamed Ali 2021). Digital technologies are not the root of surveillance in Africa because surveillance practices predate the digital age (Munoriyarwa and Mare 2023). Surveillance practices were first used by colonial governments, continued by post-colonial governments, and are currently being digitalized and accelerated by African countries. Throughout history, surveillance has been passed down from colonizers to liberators, and some African leaders have now automated it (Roberts et al. 2023). Many studies have been conducted on illegal state surveillance in the United States, China, and Europe (Feldstein 2019; Feldstein 2021). Less is known about the supply of surveillance technologies to Africa. With a population of almost 1.5 billion people, Africa is a continent where many citizens face surveillance with malicious intent. As mentioned in previous chapters, documenting the dimensions and drivers of digital surveillance in Africa is
MULTIFILE
Proceedings of the IASPM Benelux conference. Popular Music: Theory and Practice in the Lowlands.
DOCUMENT
We present a novel anomaly-based detection approach capable of detecting botnet Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. A traffic flow is classified as anomalous if its destination identifier does not origin from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications. This allows for real-time detection of diverse types of Command and Control traffic. The detection approach and its accuracy are evaluated by experiments in a controlled environment.
DOCUMENT
In our highly digitalized society, cybercrime has become a common crime. However, because research into cybercriminals is in its infancy, our knowledge about cybercriminals is still limited. One of the main considerations is whether cybercriminals have higher intellectual capabilities than traditional criminals or even the general population. Although criminological studies clearly show that traditional criminals have lower intellectual capabilities, little is known about the relationship between cybercrime and intelligence. The current study adds to the literature by exploring the relationship between CITO-test scores and cybercrime in the Netherlands. The CITO final test is a standardized test for primary school students - usually taken at the age of 11 or 12 - and highly correlated with IQ-scores. Data from Statistics Netherlands were used to compare CITO-test scores of 143 apprehended cybercriminals with those of 143 apprehended traditional criminals and 143 non-criminals, matched on age, sex, and country of birth. Ordinary Least Squares regression analyses were used to compare CITO test scores between cybercriminals, traditional criminals, and non-criminals. Additionally, a discordant sibling design was used to control for unmeasured confounding by family factors. Findings reveal that cybercriminals have significantly higher CITO test scores compared to traditional criminals and significantly lower CITO test scores compared to non-criminals.
DOCUMENT
People tend to disclose personal identifiable information (PII) that could be used by cybercriminals against them. Often, persuasion techniques are used by cybercriminals to trick people to disclose PII. This research investigates whether people can be made less susceptible to persuasion by reciprocation (i.e., making people feel obligated to return a favour) and authority, particularly in regard to whether information security knowledge and positive affect moderate the relation between susceptibility to persuasion and disclosing PII. Data are used from a population-based survey experiment that measured the actual disclosure of PII in an experimental setting (N = 2426). The results demonstrate a persuasion–disclosure link, indicating that people disclose more PII when persuaded by reciprocation, but not by authority. Knowledge of information security was also found to relate to disclosure. People disclosed less PII when they possessed more knowledge of information security. Positive affect was not related to the disclosure of PII. And contrary to expectations, no moderating effects were found of information security knowledge nor positive affect on the persuasion–disclosure link. Possible explanations are discussed, as well as limitations and future research directions. Uitgegeven door Sage, APA beschrijving: van der Kleij, R., van ‘t Hoff—De Goede, S., van de Weijer, S., & Leukfeldt, R. (2023). Social engineering and the disclosure of personal identifiable information: Examining the relationship and moderating factors using a population-based survey experiment. Journal of Criminology, 56(2-3), 278-293. https://doi.org/10.1177/26338076231162660
DOCUMENT
Objectives: Aiming to reduce distributed denial-of-service (DDoS) attacks by alerting the consciences of Internet users, this paper evaluates the effectiveness of four warning banners displayed as online ads (deterrent—control, social, informative, and reorienting) and the contents of their two linked landing pages. Methods: We implement a 4 x 2 quasi-experimental design on a self-selected sample of Internet users to measure the engagement generated by the ads and the pages. Engagement is measured on the ads as the ratio of clicks to impressions, and on the pages as percentage of page scrolled, average session duration, video interaction rate, and URLs click rate. Results: Social ads generate significantly more engagement than the rest with low to medium effect sizes. Data reveal no differences in engagement between both landing page designs. Conclusions: Social messages may be a better alternative for engaging with potential cyber offenders than the traditional deterrent messages. Correspondence: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands. Email: AMoneva@nscr.n This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09504-2
MULTIFILE