Cyber-crime Science References


In principle the PDFs of all papers listed below are available from the website of the publisher for 4TU staff and students. However, there are some exceptions for which a password protected PDF is provided here:
[APA08]
[Bha06]
[Car12]
[Cla09]
[Con10]
[Coz05]
[Cor08]
[Far80]
[Lay04]
[Lor12]

1a Introduction References

[And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Article 10, Berlin, Germany, Jun 2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf.

[Har12] P. H. Hartel and M. Junger. Teaching information security students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012. http://eprints.eemcs.utwente.nl/22066/.

[Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM. http://dx.doi.org/10.1145/1572532.1572536.

[New09] G. R. Newman. Cybercrime. In M. D. Krohn, A. J. Lizotte, and G. Penly Hall, editors, Handbook on Crime and Deviance, pages 551-584. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-0245-0_25.


1c Research Ethics References

[Bai12] M. Bailey, D. Dittrich, E. Kenneally, and D. Maughan. The Menlo report. IEEE Security and Privacy, 10(2):71-75, Mar 2012. http://dx.doi.org/10.1109/MSP.2012.52.


1c Social Science Basics References

[Bha2012] A. Bhattacherjee. Social Science Research: Principles, Methods, and Practices. University of South Florida, Tampa, Florida, 2012. http://scholarcommons.usf.edu/oa_textbooks/3/.

[Cre2009] A. Herrero Crespo, I. Rodríguez del Bosque, and M. M. García de los Salmones Sánchez. The influence of perceived risk on Internet shopping behavior: a multidimensional perspective. J. of Risk Research, 12(2):259-277, 2009. http://dx.doi.org/10.1080/13669870802497744.

[Dav1989] F. D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3):319-340, Sep 1989. http://dx.doi.org/10.2307/249008.


2a Research Methods References

[Bha2012] A. Bhattacherjee. Social Science Research: Principles, Methods, and Practices. University of South Florida, Tampa, Florida, 2012. http://scholarcommons.usf.edu/oa_textbooks/3/.


2b Sample Projects References

See slides.

3a Data Collection References

[Bha2012] A. Bhattacherjee. Social Science Research: Principles, Methods, and Practices. University of South Florida, Tampa, Florida, 2012. http://scholarcommons.usf.edu/oa_textbooks/3/.

[Xu2012] Dianxiang Xu, Manghui Tu, Michael Sanford, and Lijo Thomas. Automated security test generation with formal threat models. IEEE Transactions on dependable and secure computing, 9(4):526-540, Jul 2012. Topic-Testing. http://dx.doi.org/10.1109/TDSC.2012.24.


3b Crime Science References

[Bat06] M. Bateson, D. Nettle, and G. Roberts. Cues of being watched enhance cooperation in a real-world setting. Biology Letters, 2(3):412-414, Sep 2006. http://dx.doi.org/10.1098/rsbl.2006.0509.

[Bow04a] K. J. Bowers, S. D. Johnson, and A. F. G. Hirschfield. Closing off opportunities for crime: An evaluation of Alley-Gating. European J. on Criminal Policy and Research, 10(4):285-308, Sep 2004. http://dx.doi.org/10.1007/s10610-005-5502-0.

[Car12] C. C. Carbon and V. M. Hesslinger. Bateson et al.'s (2006) cues-of-being-watched paradigm revisited. Swiss J. of Psychology, 70(4):Article 58, Dec 2011. http://dx.doi.org/10.1024/1421-0185/a000058.

[Cla99b] R. V. Clarke. Hot products: understanding, anticipating and reducing demand for stolen goods. Police Research Series Paper 112, Home Office, Policing and Reducing Crime Unit, London, 1999. http://www.crimereduction.homeoffice.gov.uk/stolengoods/stolengoods1.htm.

[Cla08] R. V. Clarke. Situational crime prevention. In R. Wortley and L. Mazerolle, editors, Environmental Criminology and Crime Analysis, pages 178-194. Willan Publishing, London, Jun 2008. http://www.routledge.com/9781843922803.

[Cla09] R. V. Clarke. Crime science. In E. McLaughlin and T. Newburn, editors, Handbook of Criminal Theory, pages 271-283. Sage, London, 2009. http://www.sagepub.com/books/Book228876.

[Cla88b] R. V. Clarke and P. Mayhew. The British gas suicide story and its criminological implications. Crime and Justice, 10:79-116, 1988. http://www.jstor.org/stable/1147403.

[Coh79] L. E. Cohen and M. Felson. Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4):588-608, Aug 1979. http://www.jstor.org/pss/2094589.

[Cor08] D. B. Cornish and R. V. Clarke. The rational choice perspective. In R. Wortley and L. Mazerolle, editors, Environmental Criminology and Crime Analysis, pages 21-47. Willan Publishing, Uffculme, UK, 2008. http://www.routledge.com/9781843922803.

[Eng2001] B. J. M. Engelhard, F. W. M. Huls, R. F. Meijer, and P. V. Panhuis. Criminaliteit en opsporing. In Criminaliteit en rechtshandhaving 2000, Onderzoek en beleid 189, pages 43-82. WODC, Den Haag, 2001. https://www.cbs.nl/NR/rdonlyres/5761C4C7-EFDE-40ED-B75B-8526E617110E/0/criminaliteit.pdf.

[Fel98] M. Felson and R. V. Clarke. Opportunity makes the thief: Practical theory for crime prevention. Police Research Series Paper 98, Home Office, Policing and Reducing Crime Unit, London, 1998. http://www.homeoffice.gov.uk/rds/prgpdfs/fprs98.pdf.

[Gue09] R. T. Guerette and K. J. Bowers. Assessing the extent of crime displacement and diffusion of benefits: a review of situational crime prevention evaluations. Criminology, 47(4):1331-1368, Nov 2009. http://dx.doi.org/10.1111/j.1745-9125.2009.00177.x.

[Hec06] J. J. Heckman. Skill formation and the economics of investing in disadvantaged children. Science, 312(5782):1900-1902, 2006. http://dx.doi.org/10.1126/science.1128898.

[Kei08] K. Keizer, S. Lindenberg, and L. Steg. The spreading of disorder. Science, 322(5908):1681-1685, Dec 2008. http://dx.doi.org/10.1126/science.1161405.

[Lay04] G. Laycock. The UK car theft index: An example of government leverage. In M. G. Maxfield and R. V. Clarke, editors, Understanding and Preventing Car Theft, volume Crime Prevention Studies 17, pages 25-44. Criminal Justice Press, Monsey, New York, 2004. https://www.rienner.com/title/Understanding_and_Preventing_Car_Theft.

[Pea04] H. Pearson. Public health: The demon drink. Nature, 428:598-600, Apr 2004. http://dx.doi.org/10.1038/428598a.

[Tre00] R. E. Tremblay. The development of aggressive behavior during childhood: what have we learned in the past century? Int. J. of Behavioral Development, 24(2):129-141, Jun 2000. http://dx.doi.org/10.1080/016502500383232.

[Ake07] C. van Aken, M. Junger, M. Verhoeven, M. A. G. van Aken, and M. Dekovic. Externalizing behaviors and minor unintentional injuries in toddlers: Common risk factors? J. of Pediatric Psychology, 32(2):230-244, Mar 2007. http://dx.doi.org/10.1093/jpepsy/jsj118.

[Whi08b] S. Whitehead and G. Farrell. Anticipating mobile phone smart wallet crime: Policing and corporate social responsibility. Policing: An Int. J. of Police Strategies and Management, 2(2):210-217, 2008. http://dx.doi.org/10.1093/police/pan024.


5a Data Analysis References

[Bha2012] A. Bhattacherjee. Social Science Research: Principles, Methods, and Practices. University of South Florida, Tampa, Florida, 2012. http://scholarcommons.usf.edu/oa_textbooks/3/.

[Fie2009] A. Field. Discovering statistics using SPSS. Sage, London, 3rd edition, Jan 2009. http://www.uk.sagepub.com/field3e/samplech.htm.


7 Cryptomarkets References

[Aldridge2017] Judith Aldridge and Rebecca Askew. Delivery dilemmas: How drug cryptomarket users identify and seek to reduce their risk of detection by law enforcement. Int. J. of Drug Policy, 41:101-109, Mar 2017. Topic-Drugs. http://dx.doi.org/10.1016/j.drugpo.2016.10.010.

[Barratt2016] Monica J. Barratt, Jason A. Ferris, and Adam R. Winstock. Safer scoring? cryptomarkets, social supply and drug market violence. Int. J. of Drug Policy, 35:24-31, Sep 2016. Topic-Drugs. http://dx.doi.org/10.1016/j.drugpo.2016.04.019.

[Buskirk2017] Joe Van Buskirk, Raimondo Bruno, Timothy Dobbins, Courtney Breen, Lucinda Burns, Sundresan Naicker, and Amanda Roxburgh. The recovery of online drug markets following law enforcement and other disruptions. Drug and Alcohol Dependence, 173:159-162, Apr 2017. Topic-Drugs. http://dx.doi.org/10.1016/j.drugalcdep.2017.01.004.

[EMCDDA2015] EMCDDA. European Drug Report 2015 - Trends and Developments. European Monitoring Centre for Drugs and Drug Addiction, 2015. Topic-Drugs. http://dx.doi.org/10.2810/084165.

[VanHout2014] Marie Claire Van Hout and Tim Bingham. Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. Int. J. of Drug Policy, 25(2):183-189, Mar 2014. Topic-Drugs. http://dx.doi.org/10.1016/j.drugpo.2013.10.009.

[Martin2016] James Martin and Nicolas Christin. Ethics in cryptomarket research. Int. J. of Drug Policy, 35:84-91, Sep 2016. Topic-Ethics. http://dx.doi.org/10.1016/j.drugpo.2016.05.006.

[Rhumorbarbe2016] Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, and Pierre Esseiva. Buying drugs on a darknet market: A better deal? studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic Science Int., 267:173-182, Oct 2016. Topic-Drugs. http://dx.doi.org/10.1016/j.forsciint.2016.08.032.

[Soska2015] Kyle Soska and Nicolas Christin. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symp., pages 33-48, Washington, D.C., Aug 2015. USENIX Association. Topic-Drugs. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/soska.


9 APA References

[APA09] APA Publications and Communications Board. APPENDIX - journal article reporting standards (JARS), Meta-Analysis reporting standards (MARS), and flow of participants through each stage of an experiment or Quasi-Experiment. In Publication Manual of the American Psychological Association, pages 245-253. American Psychological Association, Jul 2009. http://www.apastyle.org/manual/related/JARS-MARS.pdf.


10 Reviewing References

[Har09] P. H. Hartel. Review of: "overcoming the insider: reducing employee computer crime through situational crime prevention" by willison R., siponen M". Computing Reviews, page CR137444, Nov 2009. http://www.computingreviews.com/review/review_review.cfm?review_id=137444.

[Ros07] T. Roscoe. Writing reviews for systems conferences. Technical report, ETH Zürich, Mar 2007. http://www.inf.ethz.ch/personal/troscoe/pubs/review-writing.pdf.

[Wil09] R. Willison and M. Siponen. Overcoming the insider: reducing employee computer crime through situational crime prevention. Commun. ACM, 52(9):133-137, Sep 2009. http://dx.doi.org/10.1145/1562164.1562198.