Afleveringen
-
About our Guest:
Dr Teresa Scassa
https://techlaw.uottawa.ca/people/scassa-teresa
https://www.teresascassa.ca
Papers or resources mentioned in this episode:
Robinson, P., & Scassa, T. (2022). The Future of Open Data.
https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf
Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.
Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. Technology and Regulation, 2022, 23-35
Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. Can. J. Comp. & Contemp. L., 8, 271.
Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. The Canadian Bar Review, 101(1)
Other:
This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI. The intro was then rewritten and some of the work of the other AI tool had to be redone manually. We are at the 'click a button and it is done' stage yet.
-
About our guests:
Dr. Richard Frank
https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html
Noelle Warkentin
https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html
Papers or resources mentioned in this episode:
Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canadaâs critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: 10.1080/1478601X.2022.2081568
Frank, R., & Mikhaylov, A. (2020). Beyond the âSilk Roadâ: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.
https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4
A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.
https://ieeexplore.ieee.org/abstract/document/7745452
Other:
-
Zijn er afleveringen die ontbreken?
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
Episode Notes
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
About our guests:
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In 2021 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-11). IEEE.
Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In 2020 IEEE Integrated STEM Education Conference (ISEC) (pp. 1-6). IEEE.
Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20â21 June; Wales (pp. 25-37). Singapore: Springer Nature Singapore.
Other:
The CARE Lab
https://sites.temple.edu/care/social-engineering/course-projects/
The Critical Infrastructure Ransomware Attacks (CIRA) Dataset
https://sites.temple.edu/care/cira/
The Summer Social Engineering School
https://sites.temple.edu/socialengineering/
This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Julia R. DeCook & Megan Kelly (2022) Interrogating the âincel menaceâ: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: 10.1080/17539153.2021.2005099
Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In Male supremacism in the United States (pp. 164-180). Routledge.
DeCook, Julia (19 March, 2021) The Issue Isnât Incels. Itâs Racist Misogyny, Global Network on Extremism & Technology**,** https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/
Other:
Research by Tim Squirrell et al
https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation
News articles regarding the Toronto Van attack:
https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465
https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people
The interview with Allysa was created as part of the secrev.org conference.
This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.
-
About our guests:
Dr Kevin Steinmetz
https://www.k-state.edu/sasw/faculty/steinmetz.html
https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artistsâ Perceptions of Criminal Justice. Race and Justice, 2(3), 155â178. https://doi.org/10.1177/2153368712443969
Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: 10.1080/19361610.2021.2002119
Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. Social Science Computer Review, 41(2), 592â607. https://doi.org/10.1177/08944393221117501
Goffman, E. (2002). The presentation of self in everyday life. 1959. Garden City, NY, 259.
Agnew, R. (2006). Pressured into crime: An overview of general strain theory.
Other:
This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.
-
About our guests:
Dr Jennifer L. Schally
https://cjrc.la.psu.edu/people/jennifer-l-schally/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.
https://etda.libraries.psu.edu/catalog/25084ksd5317
Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victimsâ accounts. Australian & New Zealand Journal of Criminology, 53(4), 497-514.
Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 10048
Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. European Journal of Criminology, 16(4), 391-412.
https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843
Other:
The American Kennel Club on âHow to Spot a Puppy Scam Onlineâ
https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/
Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.
https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008
-
About our guests:
Jordan Howell
https://cina.gmu.edu/people/c-jordan-howell/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1518â1536, https://doi.org/10.1093/bjc/azab116
Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice, 10439862231158005.
https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005
Other:
An assessment of ransomware distribution on darknet markets
https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets
The episode with Dr. Eden Kamar talking about using chatbots for research
https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians
-
About our guests:
Dr Kyung-shick Choi
https://www.bu.edu/met/profile/kyung-shick-choi/
https://centercicboston.org
Prof Nicolas Vermeys
https://www.vermeys.com
Other:
Regarding the Canadian cybercrime laws mentioned:
https://www.rcmp-grc.gc.ca/en/cybercrime-defined
-
About our Guest:
Dr Eden Kamar
https://www.linkedin.com/in/eden-kamar/
Prof Nicolas Vermeys
https://www.vermeys.com
Mentioned in this Episode:
Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. Computers in Human Behavior, 137, 107386.
https://doi.org/10.1016/j.chb.2022.107386
Other:
Thanks to Dr David Maimon for arranging this interview. Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode. Congratulations the London Metropolitan University gaining an exciting new associate professor.
-
About our Guest:
Thomas Dearden
https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Mentioned in this Episode:
France moving away from deterrence.
âusing a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackersâ- pp 131, page 39.
Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française
http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf
Australia moving towards deterrence.
Reuters 2022, 11 November Australia unveils joint cyber police taskforce to 'hunt down' hackers
https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/
The name of the mobile game developed in Vietnam was Flappy Bird.
https://en.wikipedia.org/wiki/Flappy_Bird
Other:
Apologies for the audio in this one, we were in a room that suddenly became a lot more crowded after we pressed record. If you hear yourself in the background, next time come over and say 'hi'.
-
About our Guests:
Dr Marti DeLiema
https://www.cehd.umn.edu/ssw/people/mdeliema/
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers Mentioned in this Episode:
DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. International Journal of Consumer Studies.https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886
DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. Innovation in Aging, 5(4), igab043. https://doi.org/10.1093/geroni/igab043
Carpenter, P., & Roer, K. (2022). The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer . John Wiley & Sons.
https://www.securityculturebook.com
-
About our Guest:
Thomas Hyslip
https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx
Greg
https://www.usa.gov
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers Mentioned in this Episode:
Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.
Heath, C., & Heath, D. (2007). Made to stick: Why some ideas survive and others die. Random House.
https://heathbrothers.com/books/made-to-stick/
Other:
(Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks
https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178
âIânternational Counter Ransomware Task Force
https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx
-
About our Guest:
Dr Volkan Topalli
https://aysps.gsu.edu/profile/volkan-topalli/
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers Mentioned in this Episode:
National Crime Victimization Survey (NCVS) Data Dashboard (N-DASH)
https://ncvs.bjs.ojp.gov/Home
National Incident-Based Reporting System (NIBRS)
https://www.fbi.gov/how-we-can-help-you/more-fbi-services-and-information/ucr/nibrs
Wang, F., & Topalli, V. (2022). Understanding Romance Scammers Through the Lens of Their Victims: Qualitative Modeling of Risk and Protective Factors in the Online Context. American Journal of Criminal Justice , 1-37.
https://link.springer.com/article/10.1007/s12103-022-09706-4
Other:
Old wine in new bottles is an old expression, that probably predates the modern English language. As Brinton Webb Woodward put in back in the 1890s book Old Wine in New Bottles for Old and New Friends, â ⊠we thresh over the same old straw. In literature we find, and decant, and bottle up the old wine,. We pour over the old liquor into new packages and put on labels of our own. Haply we filter away the lees and dregs which time had precipitated to the bottom.â This is quite a nice spin on the phrase as it suggests time as an important element in the process of refining ideas and the process of transference as one that removes the garbage and possibly leaving a little space for the new. That is more positive than the modern interpretation of old institutions with a new name. Interestingly, as it pertains to this particular conversation it could be seen as a turn on the biblical expression of new wine in old wineskins, â. And no man putteth new wine into old bottles; else the new wine will burst the bottles, and be spilled, and the bottles shall perish.â Luke 3:37. This older expression can be taken to suggest that new ideas must be received into a new institutions or there could be a problematic conflict between older structure, or that prior knowledge can negatively affect the understanding of new concepts.
All this to say that the phrase âold wine in new bottlesâ could be very appropriate to the process that is required for cybersecurity research, if we take Woodwardâs interpretation. But it could really be a case of us struggling with ânew wine in old bottlesâ.
In either case, the value of new researchers doing new forms of research with new theory is apparent.
-
About our guests:
Dr Yi Ting Chua
https://cj.ua.edu/people/dr-yi-ting-chua/
Dr Doris Krakrafaa-Bestman
https://www.aamu.edu/academics/colleges/business-public-affairs/departments/social-sciences/faculty-staff.html
Fangzhou Wang
https://aysps.gsu.edu/phd-student/wang-fangzhou/
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers or resources mentioned in this episode:
Wang, F., & Zhou, X. (2022). Persuasive Schemes for Financial Exploitation in Online Romance Scam: An Anatomy on Sha Zhu Pan (æçȘç) in China. Victims & Offenders , 1-28.
https://doi.org/10.1080/15564886.2022.2051109
Other:
Newman, L.H. (Jan 2, 2023) Hacker Lexicon: What Is a Pig Butchering Scam?
https://www.wired.com/story/what-is-pig-butchering-scam/
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter, Kai Roer
https://www.securityculturebook.com
I called this episode âFraudicultureâ, because I thought it interesting how the metaphors used to communicate the techniques seemed to target those with an understanding of agriculture, such as raising cows and pigs as endeavours performed with great care and even empathy, but an ultimate aim of exploitation.
I am not vegan, I just like to provide metaphorical options for those that prefer less violent phrasing.
âThese are the cries of the carrots, the cries of the carrots! You see, Reverend Maynard Tomorrow is harvest day and to them it is the holocaustâ
Tool (1993) Disgustipated[song]. On Undertow. Zoo entertainment.
-
About Our Guests:
Dr Thomas Dearden
https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html
Jordan Howell
https://cina.gmu.edu/people/c-jordan-howell/
Dr Marti DeLiema,
https://www.cehd.umn.edu/ssw/people/mdeliema/
Dr Volkan Topali,
https://aysps.gsu.edu/profile/volkan-topalli/
Eden Komar
https://ebcs.gsu.edu/profile/eden-kamar/
Dr Thomas Hyslip
https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx
And Gary
https://www.usa.gov
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Conferences Mentioned in this Episode:
https://hicss.hawaii.edu The Hawaii International Conference on System Sciences Hawaii, USAhttps://chi2023.acm.orgACM CHI Conference on Human Factors in Computing Systems is the premier international conference of Human-Computer Interaction (HCI).Hamburg, Germanyhttps://spritehub.org/sprite-conference-belfast-28-29-june/SPRITE+ Conference (Security Privacy Identity and Trust Engagement Network)Belfast, Irelandhttps://eurosp2023.ieee-security.org8th IEEE European Symposium on Security and PrivacyDelft, The Netherlandshttps://weis2023.econinfosec.orgWorkshop on the Economics of Information Security (WEIS). The main topic of the conference is Digital Sovereignty Geneva, Switzerlandhttps://www.usenix.org/conference/soups2023Symposium on Usable Privacy and SecurityAnaheim, USAhttps://defcon.orgDEFCON31Las Vegas, USAhttps://www.blackhat.comBlack Hat USA Las Vegas, USAhttps://eurocrim2023.comEuropean Society of CriminologyFlorence, Italy https://asc41.com/events/American Society of CriminologyPhiladelphia, USAAlso Look out for:
https://www.hfc-conference.com
https://www.cambridgecybercrime.uk
https://nsec.io
https://secrev.org/
Other:
Bloom's Taxonomy
https://en.wikipedia.org/wiki/Bloom's_taxonomy
This episode was a bit different because it was for the start of the year. Back to the normal style next episode.
-
About our Guests:
Dr. Lauren Shapiro
https://www.jjay.cuny.edu/faculty/lauren-r-shapiro-phd
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers or resources mentioned in this episode:
Shapiro, L. R. (2022). Cyberpredators and Their Prey. CRC Press.
https://www.routledge.com/Cyberpredators-and-Their-Prey/Shapiro/p/book/9780367551698
Shapiro, L. R., & Maras, M. H. (2015). Multidisciplinary investigation of child maltreatment. Jones & Bartlett Publishers.
https://www.worldcat.org/title/875351759
Other:
To all my fellow Internuts, try to take a few moments away from the screen to share the holiday period with the people around you, then you can get straight back on there :).
-
About our Guests:
Dr. Rainer Böhme
https://informationsecurity.uibk.ac.at/people/rainer-boehme/
https://scholar.google.com/citations?hl=en&user=ez_Q6GMAAAAJ&view_op=list_works&sortby=pubdate
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers or resources mentioned in this episode:
Böhme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. Variance, 12(2), 161-185.
https://informationsecurity.uibk.ac.at/pdfs/BLR2019_FundamentalApproachCyberRiskInsurance_Variance.pdf
Woods, DW & Böhme, R 2021, 'How Cyber Insurance Shapes Incident Response: A Mixed Methods Study', Paper presented at The 20th Annual Workshop on the Economics of Information Security, 28/06/21 - 29/06/21. https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-woods.pdf
Böhme, R., & Kataria, G. (2006, September). On the limits of cyber-insurance. In International Conference on Trust, Privacy and Security in Digital Business (pp. 31-40). Springer, Berlin, Heidelberg.
https://link.springer.com/content/pdf/10.1007/11824633_4.pdf
Other:
Virtual Assets Insurance (by Rainer Böhme), Actuarial Research Conference 2020
https://youtu.be/Sh9QM1tBqKc
- Laat meer zien