Cyber crime science
This presentation is the property of its rightful owner.
Sponsored Links
1 / 20

Cyber-crime Science PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Cyber-crime Science. Pieter Hartel. The Course. Goals Study cybercrime from a social perspective Organisation Teams of three Do an experiment Write a paper Review other papers Present the paper at a conference Team. Lecturers

Download Presentation

Cyber-crime Science

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Cyber crime science

Cyber-crime Science

Pieter Hartel

The course

The Course

  • Goals

    • Study cybercrime from a social perspective

  • Organisation

    • Teams of three

    • Do an experiment

    • Write a paper

    • Review other papers

    • Present the paper at a conference


Cyber-crime Science

Cyber crime science


  • Lecturers

    • Pieter Hartel (course organisation, computer science)

    • Marianne Junger (social science)

  • Teaching assistants

    • Lorena Montoya

    • Jan Willem Bullée

    • Elmer Lastdrager

    • Inés CarvaljalGallardo

Cyber-crime Science



  • Theory

    • What is Crime and Cyber-crime?

    • Technology (ICT) creates opportunity

    • Crime Science

    • Opportunity reduction works

  • Practice

    • How to do an opportunity reducing experiment in this course?

Cyber-crime Science

Crime and cyber crime

Crime and Cyber-crime

  • Crime

    • Behaviour commonly considered harmful, serious

  • Disorder

    • Lack of order, broader than crime

  • Cyber-crime

    • ICT used as a tool, target or place

[New09] G. R. Newman. Cybercrime. In M. D. Krohn, et al, editors, Handbook on Crime and Deviance. Springer, Nov 2009.

Cyber-crime Science

Porn on video billboard

Porn on video billboard

Cyber-crime Science

Cyber crime is big business

Cyber-crime is big business

[And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), Berlin, Germany, Jun 2012.

Cyber-crime Science

Ict creates opportunity

ICT creates opportunity

  • Offenders know that they run little risk

  • Targets often don’t understand the risks

Cyber-crime Science

Crime science

Crime Science

  • Five principles of opportunity reduction

    • Increase effort

    • Increase risks

    • Reduce rewards

    • Reduce provocation

    • Remove excuses

  • Measure the effect of the intervention

Cyber-crime Science

Opportunity reduction works

Opportunity reduction works

Clicked on link (%)

[Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation of anti-phishing training. In 5th Symp. on Usable Privacy and Security (SOUPS), page Article 3, Mountain View, California, Jul 2009. ACM.


Cyber-crime Science

Cyber crime science


Cyber-crime Science



  • Is an intervention as coursework feasible?

    • Yes, but it’s hard work

    • … and it can be a lot of fun

  • Check out what 43 teams have done in previous years

[Har12] P. H. Hartel and M. Junger. Teaching engineering students to "think thief". Technical Report TR-CTIT-12-19, CTIT, University of Twente, Jul 2012.

Cyber-crime Science

Interactive trash cans n 24

Interactive trash cans, N=24

Cyber-crime Science

Social sports leak n 308

Social Sports leak, N=308

[Sto14] B. Stottelaar, J. Senden, and A. L. Montoya Morales. Online social sports networks as crime facilitators. Crime Science, 3:Article 8, 2014.

Cyber-crime Science

Course schedule

Course Schedule

PII form

Ethical committee







proposal &


(5 weeks)

APA paper writing

Present ideas

Present again

Experiment & draft paper

(9 weeks)

Research Methods


final paper

review &


(6 weeks)


Cyber-crime Science

Help is at hand

Help is at hand

  • What?

    • Clinics: get feedback or discuss

    • F2F in Enschede or via Skype

  • When?

    • Sign up via the doodle to get a 20-minute timeslot

    • 12 and 19 September, 3 October and more

  • More details on website

Cyber-crime Science



  • By coursework only

    • Quality of the paper

    • Quality of the reviews

    • Quality of the presentations

  • You will be marked by your peers

    • And you may not like it…

    • But the lecturers and TAs are the moderators

Cyber-crime Science

Cyber crime science


  • Team topic (week 1)

    • What is the crime/disorder and how will you prevent it?

  • Draft proposal (week 3)

    • What are the risks for the researchers and the subjects?

    • What is the control group?

  • Final draft proposal (week 5)

    • Does my design work? Do a pilot!

  • Draft paper (week 14)

    • Can someone else repeat the experiment?

  • Final paper (week 18)

    • Are the results statistically significant?

Cyber-crime Science

What to do next

What to do next?

  • Sign up via the site

  • Complete and sign the PII form now

  • Social science training : 0.5 bonus point

  • Write 1 A4 Research proposal with:

    • Background

    • Method

    • Three key references

    • Appendix: Checklist Ethical Committee

  • For the forms and deadlines see:

Cyber-crime Science

Project ideas

Project ideas

  • Elmer ([email protected])

    • Phishing on Facebook

    • Phishing puzzles

  • Lorena ([email protected])

    • Socio-physical differences in the compliance to a request to surrender credentials

  • Jan-Willem ([email protected])

    • Social engineering for software updates

    • Dynamic digital interventions

Cyber-crime Science

  • Login