Predicting new hackers' criminal careers: A group-based trajectory approach

CJ Hoffman, CJ Howell, RC Perkins, D Maimon… - Computers & …, 2024 - Elsevier
The current study employs group-based trajectory modeling to assess the longitudinal attack
patterns of new hackers involved in website defacement. Specifically, we track the activity of …

Offending concentration on the internet: An exploratory analysis of bitcoin-related cybercrime

D Buil-Gil, P Saldaña-Taboada - Deviant Behavior, 2022 - Taylor & Francis
Crime research has repeatedly shown that small proportions of offenders are responsible for
large proportions of crimes. While there is a substantial body of evidence for this 'offending …

[HTML][HTML] Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements

SGA van de Weijer, TJ Holt, ER Leukfeldt - Computers in Human Behavior …, 2021 - Elsevier
Longitudinal criminological studies greatly improved our understanding of the longitudinal
patterns of criminality. These studies, however, focused almost exclusively on traditional …

Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials

D Maimon, CJ Howell, GW Burruss - Computers in Human Behavior, 2021 - Elsevier
Extensive criminological research has investigated the effectiveness of law enforcement
efforts to prevent offenders' reoffending and effect changes in criminal behavior patterns …

The illicit ecosystem of hacking: A longitudinal network analysis of website defacement groups

RC Perkins, M Ouellet, CJ Howell… - Social Science …, 2023 - journals.sagepub.com
Over the past four decades, research on hackers has widely propagated within the social
sciences. Although this area of scholarship yields rich insight into the interpersonal …

The human factor of cybercrime

B Dupont, T Holt - Social Science Computer Review, 2022 - journals.sagepub.com
This volume highlights the central role of the human factor in cybercrime and the need to
develop a more interdisciplinary research agenda to understand better the constant …

Trajectories of Software Piracy and Multi-Domain Predictors

Y Lee, J Kim, W Jennings, EYC Wu - Crime & Delinquency, 2024 - journals.sagepub.com
This study aims to deepen the understanding of software piracy through a developmental
perspective and risk and protective factors approach. We employ group-based trajectory …

Examine Website Defacement Dataset by Exploiting Some Classifiers' Capabilities

EIM Zayid, I Isah, YA Adam, NAA Farah, OA Alshehri - 2023 - preprints.org
Website defacement is an illegal electronic act of changing a website. In this paper, robust
machine learning classifiers' capabilities were exploited to select the best input feature set …

Organizational and Organized Cybercrime

Y Zeng, D Buil-Gil - CrimRxiv, 2023 - crimrxiv.com
Cybercrime has been on the rise since the internet became widespread in the 1990s,
affecting individuals as well as private organizations and public agencies. There is an …

Exploring Criminogenic Differences Between Violent, Nonviolent Criminal, and Nonoffending Extremists

ND Turner - 2024 - search.proquest.com
Existing counterterrorism policy is mostly focused on preventing violent extremism. The
problem is violent extremism is rare. Most extremists will never engage in violence. Some …