Yi Ting Chua

ORCID: 0000-0003-3592-0109
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybercrime and Law Enforcement Studies
  • Crime Patterns and Interventions
  • Spam and Phishing Detection
  • Hate Speech and Cyberbullying Detection
  • Crime, Illicit Activities, and Governance
  • Terrorism, Counterterrorism, and Political Violence
  • Information and Cyber Security
  • Crime, Deviance, and Social Control
  • Blockchain Technology Applications and Security
  • Privacy, Security, and Data Protection
  • Criminal Justice and Corrections Analysis
  • Misinformation and Its Impacts
  • Sex work and related issues
  • Gender, Feminism, and Media

University of Tulsa
2023-2024

University of Alabama
2021-2023

University of Cambridge
2019-2021

Michigan State University
2014-2016

Research examining offender risk reduction strategies within illicit markets focus primarily on those operating in the real world for drugs and stolen goods. Few have considered that may be used by individuals virtual are hidden from public view. This study addresses this gap through a grounded theory analysis of posts 10 Russian three English language web forums selling data to engage identity theft fraud. The findings indicate buyers employ multiple reduce their loss unreliable vendors,...

10.1080/17440572.2015.1013211 article EN Global Crime 2015-02-23

Researchers have begun to explore the problem of mass data breaches, where consumer information is acquired by cybercriminals and sold in open markets on-line. Although studies document social processes market relationships between buyers sellers, few considered revenues earned from transactions. This study explored these issues using a sample threads 10 Russian language 3 English Web forums used sell stolen data. Estimates were generated on total number transactions completed participants...

10.1080/01639625.2015.1026766 article EN Deviant Behavior 2016-02-10

The global spread of technology and the Internet has produced unique threats that previously did not exist, such as computer hacking malicious software to compromise systems. These acts have considerable economic social consequences, leading them be criminalized in most countries. Recent research with U.S. college samples found peer behavior attitudes supportive offending are correlated involvement hacking. Few considered these relationships a cross-national context, particularly respect...

10.1080/15564886.2015.1121944 article EN Victims & Offenders 2016-01-05

The second edition of the book, Crime as Structured Action, addresses relationship between masculinities, race, class, sexuality, and crime. It is divided into five chapters plus an introductio...

10.1080/01924036.2013.875681 article EN International Journal of Comparative and Applied Criminal Justice 2014-01-02

Trust and reputation play a core role in underground cybercrime markets, where participants are anonymous there is little legal recourse for dispute arbitration. These markets exist tension between two opposing forces: the drive to hide incriminating information, trust stability benefits that greater openness yields. Revealing information about transactions mitigate scams also provides valuable data market. We analyse first dataset, of which we aware, created completed on well-known...

10.1145/3419394.3423636 article EN 2020-10-23

With increasing monitoring and regulation by platforms, communities with criminal interests are moving to the dark web, which hosts content ranging from whistle-blowing privacy, drugs, terrorism, hacking. Using post discussion data six web forums we construct interaction graphs use social network analysis tools study these underground communities. We observe structure of each highlight structural patterns identify nodes importance through centrality analysis. Our findings suggest that in...

10.1109/eurospw51379.2020.00071 article EN 2020-09-01

Despite the rapid escalation of cybercrimes in modern society, few viable cybersecurity and cybercrime prevention programs exist. Consequently, this research considers as a key element for mitigating potential risk incidents cybercrime. The study aims to understand role individuals’ knowledge awareness shaping their intention behavior United States. results reveal that information communications technology variables, education, income, gender are contributing predictors level knowledge....

10.1177/00111287231180093 article EN Crime & Delinquency 2023-06-13

We document and evaluate emerging policing strategies that are reshaping how centralised law enforcement agencies deal with online cybercrime markets. The first of these we term infrastructural policing, drawn from campaigns to disrupt international drug markets involving targeting the administrators who maintain infrastructure supporting second, influence a strategy counter-radicalisation delivery highly targeted messaging potential customers. illustrate study market for Denial Service...

10.1080/10439463.2021.1883608 article EN cc-by Policing & Society 2021-02-10

Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks their services systems. In some cases, those produce unintended consequences, which must then be addressed. Unintended consequences can potentially induce harm, adversely affecting user behaviour, inclusion, the infrastructure itself (including other countermeasures). Here we propose a framework for preemptively identifying harms of in cybersecurity. The identifies series go beyond...

10.1109/ecrime47957.2019.9037589 article EN 2019-11-01

Current literature on online criminal and deviant groups recognizes the role of forums in transfer knowledge socialization members, but debates Internet radicalization processes context extremist groups. This study contributes to discussion by examining process through use social learning theory network analysis. innovation allows for assessment impact interactions with forum members process. Findings found strong support differential association reinforcement, showed possibility other...

10.1080/09546553.2024.2304800 article EN Terrorism and Political Violence 2024-02-12

10.1007/s10610-023-09555-9 article EN European Journal on Criminal Policy and Research 2023-08-09

Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered articulated how cybersecurity may impact legitimate users (often those whose use of a managed system needs be protected, and preserved). This oversight characterises the ‘blunt’ nature many controls. Here we present framework produced from consideration concerns across methods cybercrime opportunity reduction behaviour change, existing risk management guidelines. We...

10.3233/jcs-210047 article EN other-oa Journal of Computer Security 2022-06-29

The "Great Firewall of China" (GFW) has become a familiar trope in information security circles. China is comparatively shut off from the rest Internet, with extensive censorship and blocking websites, especially those hosted outside China. Chinese public use variety methods to circumvent online practised by state. In scaling Firewall", these ordinary users Internet now make so-called "airport services" which allow tunnelling through censored websites. This resulted emergence both an illicit...

10.1109/ecrime47957.2019.9037500 article EN 2019-11-01

Understanding the reasons and pathways of people becoming involved in cybercrime has been an important topic for research within different disciplines. Studies have explored skilled hackers into deviant behaviour with a focus on online gaming, however little conducted around understanding risk perception cybercrime. This study investigates both surface dark web forums, focusing variety topics from hacking to gaming. The aim this is a) investigate ways perceived among members underground...

10.1109/ecrime54498.2021.9738790 article EN 2021-12-01

We introduce ExtremeBB, a textual database of over 53.5M posts made by 38.5k users on 12 extremist bulletin board forums promoting online hate, harassment, the manosphere and other forms extremism. It enables large-scale analyses qualitative quantitative historical trends going back two decades: measuring hate speech toxicity; tracing evolution different strands ideology; tracking relationships between subcultures, behaviours, real-world violence; monitoring communities in near real time....

10.48550/arxiv.2111.04479 preprint EN cc-by arXiv (Cornell University) 2021-01-01

The anonymity provided in underground forums has led to the growth of illicit substance drug markets. Online markets seem be safer for transactions, with reduced risks being arrested. However, criminals conscious keeping a dark web market user friendly. This study investigates both surface and forums, focusing on online aims to: a) investigate ways risk is perceived among members vendors throughout stages transactions b) identify avoidance practices utilised within these We hypothesise that...

10.1080/0735648x.2023.2267035 article EN cc-by-nc-nd Journal of Crime and Justice 2023-10-09
Coming Soon ...