Program 2022
Day One
The offline-online overlap: Exploring the importance of school characteristics on cyberbullying victimization, Jin R. Lee & Erica Fissel
When victims strike back: Victim responses to cyber-fraud victimization, Fyscillia Ream, Akim Laniel-Lanani & Benoît Dupont
Examining risk profiles for cybercrime victimization, Susan van't Hoff de Goede
Does one ad a day keep cybercrime at bay?, Asier Moneva
Using short boosters to counter the decay in anti-phishing training, Jan-Willem Bullee
Police officers’ perceptions on the role of international collaboration while intervening and investigating on the darkweb, Marie-Pier Villeneuve-Dubuc
Law Enforcement Roundtable
Risky or Not? Identifying Outliers Within Online Hacking Discussion Forums, Noelle Warkentin
Finding needles in haystacks – Identifying potential threats in online right-wing discussion forums, Richard Frank
Identifying delinquent individuals through their passwords: The similarity and difference of network of users in their password’s creation strategies, Andréanne Bergeron
Hanging out on the streets and on the screen: a longitudinal analyses of the effects of online and offline time use on cyber-delinquency, Marleen Weulen Kranenberg
Day Two
Online Risky Behaviors Scale Validation and Identification of Behavioral Sub-groups: An Assessment Using Classical Test Theory and the Rasch Model, Troy Smith
An Assessment of Cryptomixing Services in Online Illicit Markets, Tom Holt
Rational Vendors on the Cryptomarket Ecosystem: Risk, Benefit, and Sales, Shu Liu
Digital piracy, gender, and techniques of neutralization: Do male college students use different techniques of neutralization than female students?, Adam Bossler
Identity Theft Prevention: An Experimental Evaluation of Prospect Theory, C. J. Howell
Motivating Cyber Hygiene through Information: Does Framing Promote Protection Motivation in Online Behavior?, George Burruss
Hacking efficiency: online mobility and the least effort principle, Asier Moneva
The non-consensual dissemination of intimate images (NCII): victims’ rationales behind not reporting this crime and their perspective on how to legally conserve NCII, Aurélie Gilen
The psychological impact of cybercrime victimization: The importance of personal and circumstantial factors, Jildau Borwell
Ransomware models in Organizations: Vaccination Model Vs. recurrent campaigns, Tamar Berenblum
Uncovering threat in the dark: A qualitative analysis of Darknet forum content relating to cyber security and critical infrastructure, Cicilia Zhang
Communities & Digital Crime: Identifying the Links Between Community-Level Internet Technology and Cyber Offending, Rachel McNealey