top of page

Program 2023

Day One

Pathways into cybercrime: social opportunities, criminal careers, and the intertwinement of crime, Joeri Loggen, Asier Moneva, Rutger Leukfeldt

In the minds of malicious hackers: An assessment of mental health, adversity, and criminal engagement, Katelyn Smith, C. Jordan Howell, Taylor Fisher

This is great, but watch out: The effect of risk and reward implication on credential leak target selection, Danielle Stibbe, Stijn Ruiter, Wouter Steenbeek

Hacktivism: together we stand, divided we fall! The organizational dynamics of hacktivist networks, Marco Romagna, Rutger Leukfeldt

Day Two

Cyber-victimisation in Spain during COVID-19. Small Test, Abel Gonzalez-Garcia

Is the fear of interpersonal cybercrime different from the fear of property cybercrime? An empirical study, Inês Sousa Guedes, José Martins, Samuel Moreira

Investigating the Cross-Contextual Online and Offline Victim-Offender Overlap among U.S. Adults, Rachel McNealey, Taylor Fisher

Identifying offending and victimisation patterns in child sexual abuse investigations using biometrics, Russell Brewer, Bryce Westlake, Thomas Swearingen, Arun Ross, Katie Logos

How Organized is Cybercrime in West Africa? Characteristics of Cybercriminals (Yahoo Boys and Sakawa Boys), Suleman Lazarus, Geoffrey U. Okolorie

The Evolution of Nigerian Cybercriminals, Jonathan Lusthaus, Tom Holt, Michael Levi, Rutger Leukfeldt

A new model of policing? Analysing law enforcement views on cybercrime disruption, James Martin, Chad Whelan, Diarmaid Harkin

The civilianisation of cybercrime policing: A comparative perspective on Australia and Canada, Chad Whelan, Benoît Dupont, Diarmaid Harkin, James Martin, Marie-Pier Villeneuve-Dubuc, Masarah Paquet-Clouston

The business of ransomware and its effects on business, Noelle Warkentin, Yuxuan (Cicilia) Zhang

Examining ransomware payment decision-making among SMEs, Sifra Matthijsse, Susanne van ‘t Hoff-de Goede, Asier Moneva, Rutger Leukfeldt

Sales tactics and stolen credentials on illicit online markets: a panel data analysis, Renushka Madarie, Christianne de Poot, Marleen Weulen Kranenberg

All that glitters is not gold: Analysis of a discussion forum on the use of bitcoin in crime, Patricia Saldaña-Taboada

The Victims of Ransomware Attacks, Pia Huesch, Jamie McColl, James Sullivan, Jason R. Nurse, Gareth Mott, Sarh Turner, Nandita Parrnaik, Keenan Jones

Cybercriminal profiling and cyber-attack attribution based on cultural dimensions - A ransomware group case study, Konstantinos Mersinans, Aimee Liu

Ransomware group evolutions in the era of geo-political conflict, David S. Wall

A latent class analysis of scam and fraud victimization, Isabella Voce

"I just want my money back." Experiences of victims of online fraud with using a civil procedure to recover fraudulent money, Susanne van 't Hoff-de Goede, Merel van Leuken

Human, political and technological factors involved in a public health approach to fraud, Michael Levi

Insights from a Large-Scale Interview Study on Cybercrime against Small and Medium-sized Enterprises in Germany, Sascha Fahl, Nicolas Huaman

Day Three

Privacy breach in the form of unauthorised access to e-banking (not only), Katerina Kudrlova

Digital Piracy, Gender, and Informal Sanctions, Adam Bossler, George Burruss

Who searches for DDoS attacks and what exactly do they search for?, Asier Moneva, Rutger Leukfeldt, Wouter Klijnsoon

Understanding the human drivers of cybercriminality, and  new methods to prevent, investigate and mitigate cybercriminal behaviour: CC-DRIVER and RAYUELA projects, Rubén Fernandez, José Diego

On sexual offences in the Metaverse, Bianca Steffes, Anna Zichler, Simone Salemi

Sex Trafficking Under the Guise of Sex Work: An  Investigation of Online Classifieds Ads, Yuxuan (Cicilia)Zhang, Noelle Warkentin

Disruption, novelties or socio-technic (recon)figurations? Digital competencies and infrastructures meet the desire to decriminalize, Julia Katherina Mahnken

Darknet Enabled Hacking: A Comprehensive Threat Assessment, C. Jordan Howell, Lauren Tremblay, Roan Ali

What Matters? Cybersecurity Expert Knowledge Sharing for Threats and Risk Assessment, Isabelle, Rochette, Fyscillia Ream, Marie-Pier Villeneuve-Dubuc, Benoît Dupont

The role of metacognition in IT-security: Lessons learned and implications for educational practice, Stefan Sütterlin

Exploring the Relationship among Individual Traits, Cybersecurity Attitudes, and Threat Appraisals: Implications for Improving Cybersecurity Hygiene, George Burruss, Taylor Fisher, Fawn Ngo, Richard Moule

bottom of page