top of page

Program 2022

Day One

The offline-online overlap: Exploring the importance of school characteristics on cyberbullying victimization, Jin R. Lee & Erica Fissel

When victims strike back: Victim responses to cyber-fraud victimization, Fyscillia Ream, Akim Laniel-Lanani & Benoît Dupont

Examining risk profiles for cybercrime victimization, Susan van't Hoff de Goede

Does one ad a day keep cybercrime at bay?, Asier Moneva

Using short boosters to counter the decay in anti-phishing training, Jan-Willem Bullee

Police officers’ perceptions on the role of international collaboration while intervening and investigating on the darkweb, Marie-Pier Villeneuve-Dubuc

Law Enforcement Roundtable

Risky or Not? Identifying Outliers Within Online Hacking Discussion Forums, Noelle Warkentin

Finding needles in haystacks – Identifying potential threats in online right-wing discussion forums, Richard Frank

Identifying delinquent individuals through their passwords: The similarity and difference of network of users in their password’s creation strategies, Andréanne Bergeron

Hanging out on the streets and on the screen: a longitudinal analyses of the effects of online and offline time use on cyber-delinquency, Marleen Weulen Kranenberg

Day Two

Online Risky Behaviors Scale Validation and Identification of Behavioral Sub-groups: An Assessment Using Classical Test Theory and the Rasch Model, Troy Smith

An Assessment of Cryptomixing Services in Online Illicit Markets, Tom Holt

Rational Vendors on the Cryptomarket Ecosystem: Risk, Benefit, and Sales, Shu Liu

Digital piracy, gender, and techniques of neutralization: Do male college students use different techniques of neutralization than female students?, Adam Bossler

Identity Theft Prevention: An Experimental Evaluation of Prospect Theory, C. J. Howell

Motivating Cyber Hygiene through Information: Does Framing Promote Protection Motivation in Online Behavior?, George Burruss

Hacking efficiency: online mobility and the least effort principle, Asier Moneva

The non-consensual dissemination of intimate images (NCII): victims’ rationales behind not reporting this crime and their perspective on how to legally conserve NCII, Aurélie Gilen

The psychological impact of cybercrime victimization: The importance of personal and circumstantial factors, Jildau Borwell

Ransomware models in Organizations: Vaccination Model Vs. recurrent campaigns, Tamar Berenblum

 Uncovering threat in the dark: A qualitative analysis of Darknet forum content relating to cyber security and critical infrastructure, Cicilia Zhang

Communities & Digital Crime: Identifying the Links Between Community-Level Internet Technology and Cyber Offending, Rachel McNealey

bottom of page