ABSTRACT

Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge.

 

This book offers an interdisciplinary approach to research on cybercrime and lays out frameworks for collaboration between the fields. Bringing together international experts, this book explores a range of issues from malicious software and hacking to victimization and fraud. This work also provides direction for policy changes to both cybersecurity and criminal justice practice based on the enhanced understanding of cybercrime that can be derived from integrated research from both the technical and social sciences. The authors demonstrate the breadth of contemporary scholarship as well as identifying key questions that could be addressed in the future or unique methods that could benefit the wider research community.

 

This edited collection will be key reading for academics, researchers, and practitioners in both computer security and law enforcement. This book is also a comprehensive resource for postgraduate and advanced undergraduate students undertaking courses in social and technical studies.

chapter 1|14 pages

Situating the problem of cybercrime in a multidisciplinary context

ByTHOMAS J. HOLT

chapter 2|22 pages

The evolution of cybercrime, 2006–2016

ByPETER GRABOSKY

chapter 4|20 pages

Conducting large-scale analyses of underground hacker communities

ByVICTOR BENJAMIN, SAGAR SAMTANI, HSINCHUN CHEN

chapter 7|22 pages

Ransomware and cryptocurrency: partners in crime

ByGAIL-JOON AHN, ADAM DOUPE, ZIMING ZHAO AND KEVIN LIAO

chapter 8|23 pages

Organizational cybervictimization: data breach prevention using a victimological approach

ByMARK STOCKMAN, JOSEPH NEDELEC, WILLIAM MACKEY

chapter 10|22 pages

Gendering cybercrime

ByALICE HUTCHINGS AND YI TING CHUA

chapter 12|32 pages

Adaptation strategies of cybercriminals to interventions from public and private sectors

ByFLOOR JANSEN AND JARMO VAN LENTHE