This is the introduction to a special issue on media and transgression, one of early cultural studies’ key terms. It inquires into the uses of transgression as a critical concept to query contemporary media culture which is discussed in six case studies: on political satire, Mukbang, cult drama, the policing of film piracy, media scandals, and online trolls. Transgression points to the energy that fuels the media ecology – from content and content production to audience practices and the policing of content ownership. It is the (conscious) overstepping of moral and legal boundaries, that challenges written and unwritten rules. The frisson of rule breaking and the reward of rule re-establishment (whether by powerful parties or everyday gossip) are transgression’s bookends. Together they support the cyclical rhythm of media culture that maintains not just our interest as viewers but our interests and connectedness as citizens, whether in celebration, outrage or condemnation.
LINK
Uit internationaal onderzoek is bekend dat mensen die zich niet volgens de regels gedragen hun ongewenste gedrag goedpraten. Mensen weten vaak wel dat ze zich op een bepaalde manier behoren te gedragen, maar gebruiken excuses, ofwel neutralisatietechnieken, om het gewenste gedrag niet te hoeven vertonen. Met andere woorden: ze redeneren het onprettige gevoel dat het overtreden van regels met zich meebrengt weg. Ze denken bijvoorbeeld: ‘het is niet mijn verantwoordelijkheid’, ‘het kan geen kwaad’, ‘ik heb geen andere keuze’ of ‘vergeleken met wat anderen doen, valt dit wel mee’. In dit artikel bespreken we een recent TNO-onderzoek waarbij we de vraag stellen: is het mogelijk om regelopvolging op het gebied van informatiebeveiliging te vergroten door het uitschakelen van neutralisatietechnieken door een gedragsinterventie? Recente andere onderzoeken laten namelijk zien dat training of communicatie kan leiden tot een vermindering van het gebruik van neutralisatietechnieken door medewerkers en tot een sterkere intentie om veilig gedrag te vertonen
DOCUMENT
In our highly digitalized society, cybercrime has become a common crime. However, because research into cybercriminals is in its infancy, our knowledge about cybercriminals is still limited. One of the main considerations is whether cybercriminals have higher intellectual capabilities than traditional criminals or even the general population. Although criminological studies clearly show that traditional criminals have lower intellectual capabilities, little is known about the relationship between cybercrime and intelligence. The current study adds to the literature by exploring the relationship between CITO-test scores and cybercrime in the Netherlands. The CITO final test is a standardized test for primary school students - usually taken at the age of 11 or 12 - and highly correlated with IQ-scores. Data from Statistics Netherlands were used to compare CITO-test scores of 143 apprehended cybercriminals with those of 143 apprehended traditional criminals and 143 non-criminals, matched on age, sex, and country of birth. Ordinary Least Squares regression analyses were used to compare CITO test scores between cybercriminals, traditional criminals, and non-criminals. Additionally, a discordant sibling design was used to control for unmeasured confounding by family factors. Findings reveal that cybercriminals have significantly higher CITO test scores compared to traditional criminals and significantly lower CITO test scores compared to non-criminals.
DOCUMENT
Objectives: Aiming to reduce distributed denial-of-service (DDoS) attacks by alerting the consciences of Internet users, this paper evaluates the effectiveness of four warning banners displayed as online ads (deterrent—control, social, informative, and reorienting) and the contents of their two linked landing pages. Methods: We implement a 4 x 2 quasi-experimental design on a self-selected sample of Internet users to measure the engagement generated by the ads and the pages. Engagement is measured on the ads as the ratio of clicks to impressions, and on the pages as percentage of page scrolled, average session duration, video interaction rate, and URLs click rate. Results: Social ads generate significantly more engagement than the rest with low to medium effect sizes. Data reveal no differences in engagement between both landing page designs. Conclusions: Social messages may be a better alternative for engaging with potential cyber offenders than the traditional deterrent messages. Correspondence: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands. Email: AMoneva@nscr.n This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09504-2
MULTIFILE
Criminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on opportunities and situational provocations. Such foundational research has yet to be developed regarding cybercrimes, or offenses enabled by computer technology and the Internet. This study address this issue using a sample of 37 offender networks. The results show variations in the offending behaviors of those involved in cybercrime. Almost half of the offender networks in this sample appeared to be cybercrime specialists, in that they only performed certain forms of cybercrime. The other half performed various types of crimes on and offline. The relative equity in specialization relative to versatility, particularly in both on and offline activities, suggests that there may be limited value in treating cybercriminals as a distinct offender group. Furthermore, this study calls to question what factors influence an offender's pathway into cybercrime, whether as a specialized or versatile offender. The actors involved in cybercrime networks, whether as specialists or generalists, were enmeshed into broader online offender networks who may have helped recognize and act on opportunities to engage in phishing, malware, and other economic offenses.
DOCUMENT
Doelstellingen De mate van betrokkenheid van jonge gebruikers bij wervingsadvertenties voor geldezels op Instagram onderzoeken. Methoden Drie advertenties die de belangrijkste mechanismen voor betrokkenheid bij cybercriminaliteit weerspiegelen en gericht waren op Nederlandse gebruikersclusters werden op twee Instagram-plaatsingen geplaatst. Door middel van dit quasi-experimentele 3 × 2 factorial design konden we het bereik en de weergaven van de advertenties, de doorklikratio's, het geslacht van de deelnemers en de temporele verdelingen van de gebruikersbetrokkenheid analyseren. Resultaten De analyse toont aan dat tot 3% van de jonge gebruikers zich bezighield met de advertenties, vooral met advertenties die een luxe levensstijl promoten en neutralisatietechnieken gebruiken. Mannen waren vaker betrokken en 's nachts werd er meer geklikt. Conclusies Sommige jonge Instagram-gebruikers lijken geneigd om geld te verdienen via hun bankpas en lopen het risico om online betrokken te raken bij cybercriminaliteit. We moedigen toekomstig onderzoek aan om het gebruik van sociale media in criminologische studies verder te onderzoeken. ENGLISH Objectives Examine the level of engagement of young users with money mule recruitment ads on Instagram. Methods Three ads reflecting key cybercrime involvement mechanisms and targeting Dutch user clusters were run on two Instagram placements. By means of this quasi-experimental 3 × 2 factorial design, we were able to analyze the reach and views of the ads, click-through rates, gender of the participants, and temporal distributions of user engagement. Results Mimicking actual recruitment environments, analysis shows that up to 3% of young users engaged with the ads, especially those promoting a luxury lifestyle and using neutralization techniques. Men were more likely to engage, and click-through rates were higher at night. Conclusions Some young Instagram users seem prone to making money through their bank cards and risk becoming involved in cybercrime online. We encourage future research to explore further the use of social media in criminological studies. This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09537-7
DOCUMENT
We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional achievements of two crisis entrepreneurs in the domain of education in the Netherlands: a rector of a secondary school and the founders of BON, a social movement aimed at improving the quality of education. In this way, we will illustrate the discursive practices that play an active role when certain players signal a crisis.
DOCUMENT
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.
DOCUMENT
While criminality is digitizing, a theory-based understanding of the impact of cybercrime on victims is lacking. Therefore, this study addresses the psychological and financial impact of cybercrime on victims, applying the shattered assumptions theory (SAT) to predict that impact. A secondary analysis was performed on a representative data set of Dutch citizens (N = 33,702), exploring the psychological and financial impact for different groups of cybercrime victims. The results showed a higher negative impact on emotional well-being for victims of person-centered cybercrime, victims for whom the offender was an acquaintance, and victims whose financial loss was not compensated and a lower negative impact on emotional well-being for victims with a higher income. The study led to novel scientific insights and showed the applicability of the SAT for developing hypotheses about cybercrime victimization impact. In this study, most hypotheses had to be rejected, leading to the conclusion that more work has to be done to test the applicability of the SAT in the field of cybercrime. Furthermore, policy implications were identified considering the prioritization of and approach to specific cybercrimes, treatment of victims, and financial loss compensation.
MULTIFILE
The project aim is to improve collusion resistance of real-world content delivery systems. The research will address the following topics: • Dynamic tracing. Improve the Laarhoven et al. dynamic tracing constructions [1,2] [A11,A19]. Modify the tally based decoder [A1,A3] to make use of dynamic side information. • Defense against multi-channel attacks. Colluders can easily spread the usage of their content access keys over multiple channels, thus making tracing more difficult. These attack scenarios have hardly been studied. Our aim is to reach the same level of understanding as in the single-channel case, i.e. to know the location of the saddlepoint and to derive good accusation scores. Preferably we want to tackle multi-channel dynamic tracing. • Watermarking layer. The watermarking layer (how to embed secret information into content) and the coding layer (what symbols to embed) are mostly treated independently. By using soft decoding techniques and exploiting the “nuts and bolts” of the embedding technique as an extra engineering degree of freedom, one should be able to improve collusion resistance. • Machine Learning. Finding a score function against unknown attacks is difficult. For non-binary decisions there exists no optimal procedure like Neyman-Pearson scoring. We want to investigate if machine learning can yield a reliable way to classify users as attacker or innocent. • Attacker cost/benefit analysis. For the various use cases (static versus dynamic, single-channel versus multi-channel) we will devise economic models and use these to determine the range of operational parameters where the attackers have a financial benefit. For the first three topics we have a fairly accurate idea how they can be achieved, based on work done in the CREST project, which was headed by the main applicant. Neural Networks (NNs) have enjoyed great success in recognizing patterns, particularly Convolutional NNs in image recognition. Recurrent NNs ("LSTM networks") are successfully applied in translation tasks. We plan to combine these two approaches, inspired by traditional score functions, to study whether they can lead to improved tracing. An often-overlooked reality is that large-scale piracy runs as a for-profit business. Thus countermeasures need not be perfect, as long as they increase the attack cost enough to make piracy unattractive. In the field of collusion resistance, this cost analysis has never been performed yet; even a simple model will be valuable to understand which countermeasures are effective.