Cybercrimeology

Cybercrime and Deterrence: The Theory behind Stop it!, or else ...

Episode Summary

Deterrence Theory might be deceptively simple, but complex in its application, and there may well be no place more complicated for application than cyberspace. Dr David Maimon helps us understand better the detail of Deterrence Theory and its practical uses online. David Maimon is the Director of the Evidence Based Cybersecurity Research Group and an Associate Professor in the department of Criminal Justice and Criminology at Georgia State University.

Episode Notes

About the Guest:

https://aysps.gsu.edu/profile/david-maimon-2/

The Evidence-Based Cybersecurity Research Group

https://ebcs.gsu.edu/

Papers mentioned in this episode:

MAIMON, D., ALPER, M., SOBESTO, B. and CUKIER, M. (2014), RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM. Criminology, 52: 33-59. doi:10.1111/1745-9125.12028

Testa, A., Maimon, D., Sobesto, B. and Cukier, M. (2017), Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy, 16: 689-726. doi:10.1111/1745-9133.12312

David Maimon, Theodore Wilson, Wuling Ren, Tamar Berenblum, On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 615–634, https://doi.org/10.1093/bjc/azu104

Other:

Not mentioned at all but this series of white papers compiling evidence for particular defensive tools or strategies is very handy.  

https://scholarworks.gsu.edu/ebcs_tools/