Afleveringen
-
Notes:
- Rutger Leukfeldt discusses his background and how he became involved in cybersecurity research. - The importance of cybersecurity education and the new cybersecurity bachelor program at Leiden University.
- The need for a multidisciplinary approach to cybersecurity, which includes not only technical skills but also social and legal aspects.
- Hack_Right is a program designed for juvenile offenders in the Netherlands who have committed cyber-dependent crimes. The program aims to provide education and support to help young offenders turn away from cybercrime and develop positive skills and behaviors. Dr Leukfeldt emphasizes that the program is not about Russian hackers or fraudsters who make millions, but rather about those kids who are experimenting and need help. He also mentions that the program was evaluated through a research study conducted by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), which found that the program was effective in reducing recidivism among young offenders who participated in the program.
- Regarding interdisciplinary research, Dr Leukfeldt explains that it can be difficult because different disciplines have different traditions and expectations when it comes to research. For example, one discipline may prioritize publishing in academic journals, while another may prioritize presenting at conferences. This can create practical issues for a team that is trying to work together, as different members may have different timelines and goals. Additionally, traditional reviewers may not be familiar with other fields, which can make it challenging to defend interdisciplinary research against criticism. Rutger notes that these challenges can be overcome through effective communication and collaboration, but they do require effort and a willingness to work across disciplines.
- Rutger emphasizes the importance of being constructive and thoughtful in providing feedback. He suggests that reviewers should not only point out flaws in a paper but also offer suggestions for improvement. Additionally, he notes that good reviewers should try to approach a paper with an open mind and be willing to learn from it, even if they are not experts in the field. By doing so, reviewers can help to ensure that research is rigorous, relevant, and impactful. Rutger encourages everyone to strive to be that kind of reviewer who provides constructive feedback and helps to improve the quality of research.
About our Guest:
https://www.universiteitleiden.nl/en/staffmembers/rutger-leukfeldt#tab-1
https://nscr.nl/en/medewerker/dr-rutger-leukfeldt/
https://www.linkedin.com/in/rutgerleukfeldt
Papers or resources mentioned in this episode:
J. A. M. Schiks, Susanne van ât Hoff-de Goede & Rutger E. Leukfeldt (2023) An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention, Journal of Crime and Justice, DOI: 10.1080/0735648X.2023.2252394
Loggen, J., Moneva, A., & Leukfeldt, R. (2024). A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime. Computer Law & Security Review, 52, 105858.
https://doi.org/10.1016/j.clsr.2023.105858
Other:
Dutch police send young hackers to intern at IT companies
https://nltimes.nl/2018/12/18/dutch-police-send-young-hackers-intern-companies
20 Companies Pledge Support for the Hack_Right Program
https://www.bleepingcomputer.com/news/security/20-companies-pledge-support-for-the-hack-right-program/
-
Notes:
- Dr. BenoĂźt Dupont has written a book on the ecology of cybercrime, which was born from his frustration with the segmentation of research on cybercrime within criminology and between disciplines.
- The book argues that all research on cybercrime should be connected because we all live in the same digital ecosystem. - There are many hurdles and obstacles in the way of making positive change in the fight against cybercrime, but Dr. Dupont is optimistic about our chances.
- Residual cybercrime will always subsist, but it can also help identify vulnerabilities in technologies that the industry hasn't identified, which can help improve security.
- It's important to address the needs of victims of cybercrime, which is often forgotten.
- The government has the data or the tools to generate the data but needs to work with the private sector and academia to make sense of the data and agree on a roadmap for anti-cybercrime and anti-cybercrime control and prevention.
About our Guest:
Dr. BenoĂźt Dupont
https://crim.umontreal.ca/repertoire-departement/professeurs/professeur/in/in15263/sg/BenoĂźt Dupont/
https://www.linkedin.com/in/benoit-dupont-9369702/
Papers or resources mentioned in this episode:
Dupont, B., Grabosky, P., & Shearing, C. (2003). The Governance of Security in Weak and Failing States. Criminal Justice, 3(4), 331-349. https://doi.org/10.1177/146680250334001
Berg, J., Nakueira, S. & Shearing, C. 2014. Global Non- State Auspices of Security Governance. In: Bersot, H. & Ariigo, B. Eds. The Routledge Handbook of International Crime and Justice Studies. Routledge, 77-97
Other:
âMuch time and energy have been devoted by taxonomists to isolating morphological patterns of species and subspecies and determining the geographic ranges of each. This is only a stepping stone to further progress in many lines- units around which accumulations of knowledge could be formed for comparison with one another. Until such units are stabilized so that they can be recognized, specific knowledge cannot accumulate - it will of necessity be generalized because, without such standardization, one worker cannot add to the specific knowledge of others.â pp.3.
Woodbury, A. M. (1952). Ecological taxonomy. Science, 115(2992), 3-3.
-
Zijn er afleveringen die ontbreken?
-
Notes:
Dr. Kemp initially moved to Spain and worked as an English teacher before deciding to go back to university to study a social science. He ended up choosing criminology due to the available classes in the morning.While in university, Dr. Kemp became interested in corporate crime and white-collar crime, but later specialized in cybercrime due to its potential for funding and career opportunities.Dr. Kemp discussed the challenges of studying in a different country and in a non-native language. He initially had limited Spanish proficiency but learned the language to a level where he could pursue a degree taught mainly in Spanish.Cybercrime is still significantly underreported, with organizations often weighing the incentives and reasons not to report, such as reputational damage and potential increases in insurance premiums.Small and medium-sized enterprises (SMEs) face difficulties in reporting cybercrimes due to the technical abilities and resources required. The reporting systems are not conducive to SMEs, and there is a need for assistance and support from states to streamline the reporting process for smaller organizations.Dr. Kemp emphasized the importance of distinguishing between reporting cybercrimes to police and criminal justice authorities versus reporting to cybersecurity providers. He noted that there seems to be more interest in private organizations reporting to other private organizations, possibly due to concerns about reputational damage.Dr. Kemp highlighted the limited access to data in Spain and Latin American countries, which hinders research in those regions. He mentioned the lack of a culture of evaluation and the absence of centralized data repositories. This limitation is problematic due to the questionable generalizability of research findings from other countries to Spain and Latin America.Dr. Kemp expressed the need for more longitudinal surveys to better understand the effectiveness of cybersecurity controls and tools. Cross-sectional surveys have limitations in establishing causal relationships and unraveling the timing of control implementation and incidents.Dr. Kemp discussed his upcoming book on cyber fraud, which aims to bring international literature on the topic of cybercrime to the Spanish-speaking world. He acknowledged the challenge of applying research findings from other countries to Spanish-speaking contexts, particularly concerning offender characteristics and prevention measures.Dr. Kemp mentioned his recent work on online victimization and older people, focusing on the impact of fear of crime and the digital divide. He emphasized the need to address older adults' concerns and promote their full participation in the digital society.About our guest:
Dr Steven Kemp
https://www.udg.edu/ca/directori/pagina-personal?ID=2003705
https://www.linkedin.com/in/steven-kemp-ed/
Papers or resources mentioned in this episode:
Kemp, S., Buil-Gil, D., MirĂł-Llinares, F., & Lord, N. (2023). When do businesses report cybercrime? Findings from a UK study. Criminology & Criminal Justice, 23(3), 468-489. https://doi.org/10.1177/17488958211062359
Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, 103089.
https://doi.org/10.1016/j.cose.2022.103089
Kemp, S. (2022). Fraud reporting in Catalonia in the Internet era: Determinants and motives. European Journal of Criminology, 19(5), 994-1015. https://doi.org/10.1177/1477370820941405
Other:
I am pretty sure I mis-pronounced âGironaâ, my apologies to the good people from that part of the world.
-
About our guests:
Dr. Katalin Parti
https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/katalin-parti.html
https://www.linkedin.com/in/partikat
Papers or resources mentioned in this episode:
PROS: Performances to Reduce Online Scams
https://liberalarts.vt.edu/research-centers/center-for-gerontology/pros--performances-to-reduce-online-scams.html
Parti, Katalin, and Faika Tahir. 2023. "âIf We Donât Listen to Them, We Make Them Lose More than Money:â Exploring Reasons for Underreporting and the Needs of Older Scam Victims" Social Sciences 12, no. 5: 264. https://doi.org/10.3390/socsci12050264
Parti, K. (2022). âElder Scamâ Risk Profiles: Individual and Situational Factors of Younger and Older Age Groupsâ Fraud Victimization.
https://vtechworks.lib.vt.edu/bitstream/handle/10919/112369/Parti_IJCIC_2022.pdf?sequence=2&isAllowed=y
Boal, A. (2000). Theater of the Oppressed. United Kingdom: Pluto.
Freire, P. (1970). Pedagogy of the Oppressed. United States: Herder and Herder.
https://envs.ucsc.edu/internships/internship-readings/freire-pedagogy-of-the-oppressed.pdf
Other:
https://en.wikipedia.org/wiki/Pedagogy_of_the_Oppressed
https://en.wikipedia.org/wiki/Theatre_of_the_Oppressed
My laptop died a few hours before completing this episode. At this point I am guessing it was some kind of issue with the latest update. It is currently a brick. Good thing I spend a lot of time thinking about resilience otherwise this episode would not have happened.
-
About our guests:
Kenrick Bagnall
https://www.linkedin.com/in/kenrickbagnall/
Papers or resources mentioned in this episode:
KonCyber the Podcast
https://koncyberthepodcast.podbean.com
Other:
If I took anything from Kenrick's story, besides of course all of the policing and technical stuff, it was that you are not too old to seek or take advice nor are you too old to start again.
-
About our Guest:
Dr Teresa Scassa
https://techlaw.uottawa.ca/people/scassa-teresa
https://www.teresascassa.ca
Papers or resources mentioned in this episode:
Robinson, P., & Scassa, T. (2022). The Future of Open Data.
https://ruor.uottawa.ca/bitstream/10393/43648/1/9780776629759_WEB.pdf
Scassa, T. (2020). Designing data governance for data sharing: lessons from sidewalk Toronto.
Scassa, T., Robinson, P., & Mosoff, R. (2022). The Datafication of Wastewater:: Legal, Ethical and Civic Considerations. Technology and Regulation, 2022, 23-35
Scassa, T. (2022). The surveillant university: Remote proctoring, AI, and human rights. Can. J. Comp. & Contemp. L., 8, 271.
Scassa, T. (2023). Regulating AI in Canada: A critical look at the proposed artificial intelligence and data act. The Canadian Bar Review, 101(1)
Other:
This episode was edited using an 'AI' tool for part of the workflow and part of the intro was written by AI. The intro was then rewritten and some of the work of the other AI tool had to be redone manually. We are at the 'click a button and it is done' stage yet.
-
About our guests:
Dr. Richard Frank
https://www.sfu.ca/criminology/about/faculty/criminology-faculty/richard-frank.html
Noelle Warkentin
https://www.sfu.ca/iccrc/members/memberprofiles/Noelle-Warkentin.html
Papers or resources mentioned in this episode:
Noelle Warkentin, Richard Frank, Yuxuan (Cicilia) Zhang & Naomi Zakimi (2022) Potential cyber-threats against Canadaâs critical infrastructure: an investigation of online discussion forums,Criminal Justice Studies, 35:3, 322-345, DOI: 10.1080/1478601X.2022.2081568
Frank, R., & Mikhaylov, A. (2020). Beyond the âSilk Roadâ: Assessing illicit drug marketplaces on the public web. Open Source Intelligence and Cyber Crime: Social Media Analytics, 89-111.
https://link.springer.com/chapter/10.1007/978-3-030-41251-7_4
A. T. Zulkarnine, R. Frank, B. Monk, J. Mitchell and G. Davies, "Surfacing collaborated networks in dark web to find illicit and criminal content," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA, 2016, pp. 109-114, doi: 10.1109/ISI.2016.7745452.
https://ieeexplore.ieee.org/abstract/document/7745452
Other:
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
Episode Notes
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Diana Benitez
Kwasi Boakye-Boateng
https://www.linkedin.com/in/kwasi-boakye-boateng-63493412/
https://www.unb.ca/cic/membership/researchers.html
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Shabnam Saderi
https://scholar.google.com/citations?hl=en&user=LVnEWXoAAAAJ&view_op=list_works&citft=1&citft=2&citft=3&email_for_op=cic.unb.ca%40gmail.com&gmla=AHoSzlVYTOE3KQjjnontUQ0nxOb5LshadwXIRGvt5WbMjlB_dt6e06uBFq49mTOKhOeWY5rb6WW0IpdIgzZ5lXjpvCyfFEjJ42xdUQuchLkiWWagJkl1PfMwMuGFOXDqZre9N_ZGEm2GvkQTypZbTrueIZffWnmB92l0_WHPMWn87GGOA0zSox6_RsMGDVcrxwJuJLgrMRNQzD0DGaGURrf7JvqiKXFyQP_blMEiI4eIpSIK
https://www.unb.ca/cic/membership/researchers.html
Vicky Desjardins
https://www.linkedin.com/in/đ«vicky-desjardins-208134221/
-
About our guests:
Rachel Bleiman
https://liberalarts.temple.edu/content/rachel-bleiman
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Rege, A., & Bleiman, R. (2021, December). Collegiate Social Engineering Capture the Flag Competition. In 2021 APWG Symposium on Electronic Crime Research (eCrime) (pp. 1-11). IEEE.
Rege, A., Nguyen, T., & Bleiman, R. (2020, August). A social engineering awareness and training workshop for STEM students and practitioners. In 2020 IEEE Integrated STEM Education Conference (ISEC) (pp. 1-6). IEEE.
Rege, A., & Bleiman, R. (2023, March). A Free and Community-Driven Critical Infrastructure Ransomware Dataset. In Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20â21 June; Wales (pp. 25-37). Singapore: Springer Nature Singapore.
Other:
The CARE Lab
https://sites.temple.edu/care/social-engineering/course-projects/
The Critical Infrastructure Ransomware Attacks (CIRA) Dataset
https://sites.temple.edu/care/cira/
The Summer Social Engineering School
https://sites.temple.edu/socialengineering/
This episode was edited in part using a text based editing tool that uses machine learning. I think the results were a bit mixed on this episode, particularly in terms of workflow. The tools offer promise though.
-
About our guests:
Allysa Czerwinsky
https://www.socialsciences.manchester.ac.uk/criminology/research/postgraduate-research/phd-students/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Julia R. DeCook & Megan Kelly (2022) Interrogating the âincel menaceâ: assessing the threat of male supremacy in terrorism studies, Critical Studies on Terrorism, 15:3, 706-726, DOI: 10.1080/17539153.2021.2005099
Kelly, M., DiBranco, A., & DeCook, J. R. (2022). Misogynist incels and male supremacist violence. In Male supremacism in the United States (pp. 164-180). Routledge.
DeCook, Julia (19 March, 2021) The Issue Isnât Incels. Itâs Racist Misogyny, Global Network on Extremism & Technology**,** https://gnet-research.org/2021/03/19/the-issue-isnt-incels-its-racist-misogyny/
Other:
Research by Tim Squirrell et al
https://www.isdglobal.org/isd-publications/?fwp_publication_category=hate-and-polarisation
News articles regarding the Toronto Van attack:
https://www.cp24.com/news/victims-families-dignitaries-mark-fifth-anniversary-of-deadly-toronto-van-attack-1.6367465
https://www.vice.com/en/article/bvx4kq/incel-toronto-van-killer-found-guilty-of-murdering-10-people
The interview with Allysa was created as part of the secrev.org conference.
This episode was edited in part using text first audio edition that uses machine learning. It's not bad but I think there are some improvements.
-
About our guests:
Dr Kevin Steinmetz
https://www.k-state.edu/sasw/faculty/steinmetz.html
https://scholar.google.com/citations?user=mEgRonIAAAAJ&hl=en
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Steinmetz, K. F., & Henderson, H. (2012). Hip-Hop and Procedural Justice: Hip-Hop Artistsâ Perceptions of Criminal Justice. Race and Justice, 2(3), 155â178. https://doi.org/10.1177/2153368712443969
Kevin F. Steinmetz (2023) Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis,Journal of Applied Security Research, 18:2, 246-266, DOI: 10.1080/19361610.2021.2002119
Steinmetz, K. F., & Holt, T. J. (2023). Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations. Social Science Computer Review, 41(2), 592â607. https://doi.org/10.1177/08944393221117501
Goffman, E. (2002). The presentation of self in everyday life. 1959. Garden City, NY, 259.
Agnew, R. (2006). Pressured into crime: An overview of general strain theory.
Other:
This episode was in part edited using a text based audio editing which is an interesting application of machine learning technology to software.
-
About our guests:
Dr Jennifer L. Schally
https://cjrc.la.psu.edu/people/jennifer-l-schally/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Derrickson, K. (2023). Advance-Fee Pet Scams Through the Lens of Narrative Victimology.
https://etda.libraries.psu.edu/catalog/25084ksd5317
Whittaker, J. M., & Button, M. (2020). Understanding pet scams: A case study of advance fee and non-delivery fraud using victimsâ accounts. Australian & New Zealand Journal of Criminology, 53(4), 497-514.
Button, M., & Whittaker, J. (2021). Exploring the voluntary response to cyber-fraud: From vigilantism to responsibilisation. International Journal of Law, Crime and Justice, 66, 10048
Pemberton, A., Mulder, E., & Aarten, P. G. (2019). Stories of injustice: Towards a narrative victimology. European Journal of Criminology, 16(4), 391-412.
https://journals.sagepub.com/doi/pdf/10.1177/1477370818770843
Other:
The American Kennel Club on âHow to Spot a Puppy Scam Onlineâ
https://www.akc.org/expert-advice/puppy-information/spot-puppy-scam/
Brent, Y.(Nov 30, 2022) Beware kitten and puppy scams, as pandemic leads to spike in pet ripoffs, CBC News Canada.
https://www.cbc.ca/news/canada/kitten-pet-puppy-scam-spike-pandemic-canada-us-bbb-fraud-1.6667008
-
About our guests:
Jordan Howell
https://cina.gmu.edu/people/c-jordan-howell/
Prof Nicolas Vermeys
https://www.vermeys.com
Papers or resources mentioned in this episode:
Marie Ouellet, David Maimon, Jordan C Howell, Yubao Wu, The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces, The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1518â1536, https://doi.org/10.1093/bjc/azab116
Howell, C. J., Fisher, T., Muniz, C. N., Maimon, D., & Rotzinger, Y. (2023). A Depiction and Classification of the Stolen Data Market Ecosystem and Comprising Darknet Markets: A Multidisciplinary Approach. Journal of Contemporary Criminal Justice, 10439862231158005.
https://journals.sagepub.com/doi/pdf/10.1177/10439862231158005
Other:
An assessment of ransomware distribution on darknet markets
https://cybersecurity.att.com/blogs/security-essentials/an-assessment-of-ransomware-distribution-on-darknet-markets
The episode with Dr. Eden Kamar talking about using chatbots for research
https://cybercrimeology.com/episodes/my-parents-are-home-it-would-be-weird-chatbots-grooming-guardians
-
About our guests:
Dr Kyung-shick Choi
https://www.bu.edu/met/profile/kyung-shick-choi/
https://centercicboston.org
Prof Nicolas Vermeys
https://www.vermeys.com
Other:
Regarding the Canadian cybercrime laws mentioned:
https://www.rcmp-grc.gc.ca/en/cybercrime-defined
-
About our Guest:
Dr Eden Kamar
https://www.linkedin.com/in/eden-kamar/
Prof Nicolas Vermeys
https://www.vermeys.com
Mentioned in this Episode:
Kamar, E., Maimon, D., Weisburd, D., & Shabat, D. (2022). Parental guardianship and online sexual grooming of teenagers: A honeypot experiment. Computers in Human Behavior, 137, 107386.
https://doi.org/10.1016/j.chb.2022.107386
Other:
Thanks to Dr David Maimon for arranging this interview. Dr Eden Kamar was awarded her document and very quickly hired in the period between the recording and publishing of this episode. Congratulations the London Metropolitan University gaining an exciting new associate professor.
-
About our Guest:
Thomas Dearden
https://liberalarts.vt.edu/departments-and-schools/department-of-sociology/faculty/thomas-dearden.html
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Mentioned in this Episode:
France moving away from deterrence.
âusing a deterrent approach in cyberspace that would force any attacker to exercise restraint against France is fanciful, but adopting response strategies that galvanise all the options the State has available, both European and international, means cyber attacks can be made particularly costly for attackersâ- pp 131, page 39.
Secrétariat général de la défense et de la sécurité nationale (2022) National strategic review 2022 République Française
http://www.sgdsn.gouv.fr/uploads/2022/12/rns-uk-20221202.pdf
Australia moving towards deterrence.
Reuters 2022, 11 November Australia unveils joint cyber police taskforce to 'hunt down' hackers
https://www.reuters.com/technology/australia-unveils-joint-cyber-police-taskforce-hunt-down-hackers-2022-11-12/
The name of the mobile game developed in Vietnam was Flappy Bird.
https://en.wikipedia.org/wiki/Flappy_Bird
Other:
Apologies for the audio in this one, we were in a room that suddenly became a lot more crowded after we pressed record. If you hear yourself in the background, next time come over and say 'hi'.
-
About our Guests:
Dr Marti DeLiema
https://www.cehd.umn.edu/ssw/people/mdeliema/
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers Mentioned in this Episode:
DeLiema, M., Li, Y., & Mottola, G. (2022). Correlates of responding to and becoming victimized by fraud: Examining risk factors by scam type. International Journal of Consumer Studies.https://onlinelibrary.wiley.com/doi/10.1111/ijcs.12886
DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. Innovation in Aging, 5(4), igab043. https://doi.org/10.1093/geroni/igab043
Carpenter, P., & Roer, K. (2022). The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer . John Wiley & Sons.
https://www.securityculturebook.com
-
About our Guest:
Thomas Hyslip
https://www.usf.edu/cbcs/criminology/faculty-staff/t-hyslip.aspx
Greg
https://www.usa.gov
Scott Wright
https://www.linkedin.com/in/scottwright/
https://clickarmor.ca
Papers Mentioned in this Episode:
Paquet-Clouston, M., Paquette, S. O., Garcia, S., & Erquiaga, M. J. (2022). Entanglement: cybercrime connections of a public forum population. Journal of Cybersecurity, 8(1), tyac010.
Heath, C., & Heath, D. (2007). Made to stick: Why some ideas survive and others die. Random House.
https://heathbrothers.com/books/made-to-stick/
Other:
(Australia) Cyber Security Minister Clare O'Neil flags multiple reforms to protect personal data after Medibank data leaks
https://www.abc.net.au/news/2022-11-13/medibank-data-breach-cybersecurity-latest/101648178
âIânternational Counter Ransomware Task Force
https://www.homeaffairs.gov.au/cyber-security-subsite/Pages/counter-ransomware-initiative.aspx
- Laat meer zien