- Cybercrime and Law Enforcement Studies
- Crime Patterns and Interventions
- Spam and Phishing Detection
- Hate Speech and Cyberbullying Detection
- Crime, Illicit Activities, and Governance
- Terrorism, Counterterrorism, and Political Violence
- Information and Cyber Security
- Crime, Deviance, and Social Control
- Blockchain Technology Applications and Security
- Privacy, Security, and Data Protection
- Criminal Justice and Corrections Analysis
- Misinformation and Its Impacts
- Sex work and related issues
- Gender, Feminism, and Media
University of Tulsa
2023-2024
University of Alabama
2021-2023
University of Cambridge
2019-2021
Michigan State University
2014-2016
Research examining offender risk reduction strategies within illicit markets focus primarily on those operating in the real world for drugs and stolen goods. Few have considered that may be used by individuals virtual are hidden from public view. This study addresses this gap through a grounded theory analysis of posts 10 Russian three English language web forums selling data to engage identity theft fraud. The findings indicate buyers employ multiple reduce their loss unreliable vendors,...
Researchers have begun to explore the problem of mass data breaches, where consumer information is acquired by cybercriminals and sold in open markets on-line. Although studies document social processes market relationships between buyers sellers, few considered revenues earned from transactions. This study explored these issues using a sample threads 10 Russian language 3 English Web forums used sell stolen data. Estimates were generated on total number transactions completed participants...
The global spread of technology and the Internet has produced unique threats that previously did not exist, such as computer hacking malicious software to compromise systems. These acts have considerable economic social consequences, leading them be criminalized in most countries. Recent research with U.S. college samples found peer behavior attitudes supportive offending are correlated involvement hacking. Few considered these relationships a cross-national context, particularly respect...
The second edition of the book, Crime as Structured Action, addresses relationship between masculinities, race, class, sexuality, and crime. It is divided into five chapters plus an introductio...
Trust and reputation play a core role in underground cybercrime markets, where participants are anonymous there is little legal recourse for dispute arbitration. These markets exist tension between two opposing forces: the drive to hide incriminating information, trust stability benefits that greater openness yields. Revealing information about transactions mitigate scams also provides valuable data market. We analyse first dataset, of which we aware, created completed on well-known...
With increasing monitoring and regulation by platforms, communities with criminal interests are moving to the dark web, which hosts content ranging from whistle-blowing privacy, drugs, terrorism, hacking. Using post discussion data six web forums we construct interaction graphs use social network analysis tools study these underground communities. We observe structure of each highlight structural patterns identify nodes importance through centrality analysis. Our findings suggest that in...
Despite the rapid escalation of cybercrimes in modern society, few viable cybersecurity and cybercrime prevention programs exist. Consequently, this research considers as a key element for mitigating potential risk incidents cybercrime. The study aims to understand role individuals’ knowledge awareness shaping their intention behavior United States. results reveal that information communications technology variables, education, income, gender are contributing predictors level knowledge....
We document and evaluate emerging policing strategies that are reshaping how centralised law enforcement agencies deal with online cybercrime markets. The first of these we term infrastructural policing, drawn from campaigns to disrupt international drug markets involving targeting the administrators who maintain infrastructure supporting second, influence a strategy counter-radicalisation delivery highly targeted messaging potential customers. illustrate study market for Denial Service...
Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks their services systems. In some cases, those produce unintended consequences, which must then be addressed. Unintended consequences can potentially induce harm, adversely affecting user behaviour, inclusion, the infrastructure itself (including other countermeasures). Here we propose a framework for preemptively identifying harms of in cybersecurity. The identifies series go beyond...
Current literature on online criminal and deviant groups recognizes the role of forums in transfer knowledge socialization members, but debates Internet radicalization processes context extremist groups. This study contributes to discussion by examining process through use social learning theory network analysis. innovation allows for assessment impact interactions with forum members process. Findings found strong support differential association reinforcement, showed possibility other...
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered articulated how cybersecurity may impact legitimate users (often those whose use of a managed system needs be protected, and preserved). This oversight characterises the ‘blunt’ nature many controls. Here we present framework produced from consideration concerns across methods cybercrime opportunity reduction behaviour change, existing risk management guidelines. We...
The "Great Firewall of China" (GFW) has become a familiar trope in information security circles. China is comparatively shut off from the rest Internet, with extensive censorship and blocking websites, especially those hosted outside China. Chinese public use variety methods to circumvent online practised by state. In scaling Firewall", these ordinary users Internet now make so-called "airport services" which allow tunnelling through censored websites. This resulted emergence both an illicit...
Understanding the reasons and pathways of people becoming involved in cybercrime has been an important topic for research within different disciplines. Studies have explored skilled hackers into deviant behaviour with a focus on online gaming, however little conducted around understanding risk perception cybercrime. This study investigates both surface dark web forums, focusing variety topics from hacking to gaming. The aim this is a) investigate ways perceived among members underground...
We introduce ExtremeBB, a textual database of over 53.5M posts made by 38.5k users on 12 extremist bulletin board forums promoting online hate, harassment, the manosphere and other forms extremism. It enables large-scale analyses qualitative quantitative historical trends going back two decades: measuring hate speech toxicity; tracing evolution different strands ideology; tracking relationships between subcultures, behaviours, real-world violence; monitoring communities in near real time....
The anonymity provided in underground forums has led to the growth of illicit substance drug markets. Online markets seem be safer for transactions, with reduced risks being arrested. However, criminals conscious keeping a dark web market user friendly. This study investigates both surface and forums, focusing on online aims to: a) investigate ways risk is perceived among members vendors throughout stages transactions b) identify avoidance practices utilised within these We hypothesise that...