Afleveringen

  • Notes:

    - Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University.

    - The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects.

    - Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program.

    - Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.

    - Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.

    About our Guest:

    https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1

    https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/

    https://www.linkedin.com/in/rutgerleukfeldt

    Papers or resources mentioned in this episode:

    J. A. M. Schiks, Susanne van ’t Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: 10.1080/0735648X.2023.2252394

    Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. Computer Law & Security Review, 52, 105858.

    https://doi.org/10.1016/j.clsr.2023.105858

    Other:

    Dutch police send young hackers to intern at IT companies

    https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies

    20 Companies Pledge Support for the Hack_Right Program

    https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/

  • Notes:

    - Dr. Benoît Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines.

    - The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances.

    - Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security.

    - It's important to address the needs of victims of cybercrime, which is often forgotten.

    - The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.

    About our Guest:

    Dr. Benoît Dupont

    https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/Benoît Dupont/

    https://www.linkedin.com/in/benoit-dupont-9369702/

    Papers or resources mentioned in this episode:

    Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. https://doi.org/10.1177/146680250334001

    Berg, J., Nakueira, S. & Shearing, C. 2014. Global Non- State Auspices of Security Governance. In: Bersot, H. & Ariigo, B. Eds. The Routledge Handbook of International Crime and Justice Studies. Routledge, 77-97

    Other:

    “Much time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.” pp.3.

    Woodbury, A. M. (1952). Ecological taxonomy. Science, 115(2992), 3-3.

  • Zijn er afleveringen die ontbreken?

    Klik hier om de feed te vernieuwen.

  • Notes:

    Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.

    About our guest:

    Dr Steven Kemp

    https://www.udg.edu/ca/directori/pagina-personal?ID=2003705

    https://www.linkedin.com/in/steven-kemp-ed/

    Papers or resources mentioned in this episode:

    Kemp, S., Buil-Gil, D., Miró-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. https://doi.org/10.1177/17488958211062359

    Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.

    https://doi.org/10.1016/j.cose.2022.103089

    Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. https://doi.org/10.1177/1477370820941405

    Other:

    I am pretty sure I mis-pronounced ‘Girona’, my apologies to the good people from that part of the world.

  • About our guests:

    Dr. Katalin Parti

    https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html

    https://www.linkedin.com/in/partikat

    Papers or resources mentioned in this episode:

    PROS: Performances to Reduce Online Scams

    https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html

    Parti, Katalin, and Faika Tahir. 2023. "“If We Don’t Listen to Them, We Make Them Lose More than Money:” Exploring Reasons for Underreporting and the Needs of Older Scam Victims" Social Sciences 12, no. 5: 264. https://doi.org/10.3390/socsci12050264

    Parti, K. (2022). “Elder Scam” Risk Profiles: Individual and Situational Factors of Younger and Older Age Groups’ Fraud Victimization.

    https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y

    Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.

    Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.

    https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf

    Other:

    https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed

    https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed

    My laptop died a few hours before completing this episode. At this point I am guessing it was some kind of issue with the latest update. It is currently a brick. Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.

  • About our guests:

    Kenrick Bagnall

    https://www.linkedin.com/in/kenrickbagnall/

    Papers or resources mentioned in this episode:

    KonCyber the Podcast

    https://koncyberthepodcast.podbean.com

    Other:

    If I took anything from Kenrick's story, besides of course all of the policing and technical stuff, it was that you are not too old to seek or take advice nor are you too old to start again.

  • About our Guest:

    Dr Teresa Scassa

    https://techlaw.uottawa.ca/people/scassa-teresa

    https://www.teresascassa.ca

    Papers or resources mentioned in this episode:

    Robinson, P., & Scassa, T. (2022). The Future of Open Data.

    https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf

    Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.

    Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. Technology and Regulation, 2022, 23-35

    Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. Can. J. Comp. & Contemp. L., 8, 271.

    Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. The Canadian Bar Review, 101(1)

    Other:

    This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI. The intro was then rewritten and some of the work of the other AI tool had to be redone manually. We are at the 'click a button and it is done' stage yet.

  • About our guests:

    Dr. Richard Frank

    https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html

    Noelle Warkentin

    https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html

    Papers or resources mentioned in this episode:

    Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: 10.1080/1478601X.2022.2081568

    Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.

    https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4

    A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.

    https://ieeexplore.ieee.org/abstract/document/7745452

    Other:

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • Episode Notes

    About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Diana Benitez

    Kwasi Boakye-Boateng

    https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/

    https://www.unb.ca/cic/membership/researchers.html

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Shabnam Saderi

    https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK

    https://www.unb.ca/cic/membership/researchers.html

    Vicky Desjardins

    https://www.linkedin.com/in/💫vicky-desjardins-208134221/

  • About our guests:

    Rachel Bleiman

    https://liberalarts.temple.edu/content/rachel-bleiman

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In 2021 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-11). IEEE.

    Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In 2020 IEEE Integrated STEM Education Conference (ISEC) (pp. 1-6). IEEE.

    Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20–21 June; Wales (pp. 25-37). Singapore: Springer Nature Singapore.

    Other:

    The CARE Lab

    https://sites.temple.edu/care/social-engineering/course-projects/

    The Critical Infrastructure Ransomware Attacks (CIRA) Dataset

    https://sites.temple.edu/care/cira/

    The Summer Social Engineering School

    https://sites.temple.edu/socialengineering/

    This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.

  • About our guests:

    Allysa Czerwinsky

    https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Julia R. DeCook & Megan Kelly (2022) Interrogating the “incel menace”: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: 10.1080/17539153.2021.2005099

    Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In Male supremacism in the United States (pp. 164-180). Routledge.

    DeCook, Julia (19 March, 2021) The Issue Isn’t Incels. It’s Racist Misogyny, Global Network on Extremism & Technology**,** https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/

    Other:

    Research by Tim Squirrell et al

    https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation

    News articles regarding the Toronto Van attack:

    https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465

    https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people

    The interview with Allysa was created as part of the secrev.org conference.

    This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.

  • About our guests:

    Dr Kevin Steinmetz

    https://www.k-state.edu/sasw/faculty/steinmetz.html

    https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artists’ Perceptions of Criminal Justice. Race and Justice, 2(3), 155–178. https://doi.org/10.1177/2153368712443969

    Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: 10.1080/19361610.2021.2002119

    Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. Social Science Computer Review, 41(2), 592–607. https://doi.org/10.1177/08944393221117501

    Goffman, E. (2002). The presentation of self in everyday life. 1959. Garden City, NY, 259.

    Agnew, R. (2006). Pressured into crime: An overview of general strain theory.

    Other:

    This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.

  • About our guests:

    Dr Jennifer L. Schally

    https://cjrc.la.psu.edu/people/jennifer-l-schally/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.

    https://etda.libraries.psu.edu/catalog/25084ksd5317

    Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts. Australian & New Zealand Journal of Criminology, 53(4), 497-514.

    Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 10048

    Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. European Journal of Criminology, 16(4), 391-412.

    https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843

    Other:

    The American Kennel Club on “How to Spot a Puppy Scam Online”

    https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/

    Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.

    https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008

  • About our guests:

    Jordan Howell

    https://cina.gmu.edu/people/c-jordan-howell/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Papers or resources mentioned in this episode:

    Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1518–1536, https://doi.org/10.1093/bjc/azab116

    Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice, 10439862231158005.

    https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005

    Other:

    An assessment of ransomware distribution on darknet markets

    https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets

    The episode with Dr. Eden Kamar talking about using chatbots for research

    https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians

  • About our guests:

    Dr Kyung-shick Choi

    https://www.bu.edu/met/profile/kyung-shick-choi/

    https://centercicboston.org

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Other:

    Regarding the Canadian cybercrime laws mentioned:

    https://www.rcmp-grc.gc.ca/en/cybercrime-defined

  • About our Guest:

    Dr Eden Kamar

    https://www.linkedin.com/in/eden-kamar/

    Prof Nicolas Vermeys

    https://www.vermeys.com

    Mentioned in this Episode:

    Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. Computers in Human Behavior, 137, 107386.

    https://doi.org/10.1016/j.chb.2022.107386

    Other:

    Thanks to Dr David Maimon for arranging this interview. Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode. Congratulations the London Metropolitan University gaining an exciting new associate professor.

  • About our Guest:

    Thomas Dearden

    https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html

    Scott Wright

    https://www.linkedin.com/in/scottwright/

    https://clickarmor.ca

    Mentioned in this Episode:

    France moving away from deterrence.

    “using a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackers”- pp 131, page 39.

    Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française

    http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf

    Australia moving towards deterrence.

    Reuters 2022, 11 November Australia unveils joint cyber police taskforce to 'hunt down' hackers

    https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/

    The name of the mobile game developed in Vietnam was Flappy Bird.

    https://en.wikipedia.org/wiki/Flappy_Bird

    Other:

    Apologies for the audio in this one, we were in a room that suddenly became a lot more crowded after we pressed record. If you hear yourself in the background, next time come over and say 'hi'.

  • About our Guests:

    Dr Marti DeLiema

    https://www.cehd.umn.edu/ssw/people/mdeliema/

    Scott Wright

    https://www.linkedin.com/in/scottwright/

    https://clickarmor.ca

    Papers Mentioned in this Episode:

    DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. International Journal of Consumer Studies.https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886

    DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. Innovation in Aging, 5(4), igab043. https://doi.org/10.1093/geroni/igab043

    Carpenter, P., & Roer, K. (2022). The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer . John Wiley & Sons.

    https://www.securityculturebook.com

  • About our Guest:

    Thomas Hyslip

    https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx

    Greg

    https://www.usa.gov

    Scott Wright

    https://www.linkedin.com/in/scottwright/

    https://clickarmor.ca

    Papers Mentioned in this Episode:

    Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.

    Heath, C., & Heath, D. (2007). Made to stick: Why some ideas survive and others die. Random House.

    https://heathbrothers.com/books/made-to-stick/

    Other:

    (Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks

    https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178

    ​I​nternational Counter Ransomware Task Force

    https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx