english

A language Model for Compromised User Analysis

Accounts of social network users can be compromised in a number of ways. When malware infects a user account, that account can be used to spread spam and malware as well as to gather personal information. Current online systems employ authentication mechanism to verify user’s identities and determine their corresponding authorities. Once authenticated, users are …

Assessing the Macro-Level correlates of Malware Infections using a routine Activities framework

Malicious software poses a massive threat to individuals worldwide. Malicious software, or malware, can automate attacks in order to acquire sensitive information or interrupt critical infrastructures. In this study, Thomas Holt and his colleagues looked at malicious software from a criminology point of view. By using a routine activities framework, the authors examined the macro-correlates …

Determinants of reporting cybercrime

Criminology studies on determinants of reporting crimes have been growing for the past decades. It is important for victims to report crimes to help police organizations acknowledge the prevalence of different types of crime. Prevalence of cybercrime has increased and is now becoming part of individuals’ everyday life. While the literature about determinants of reporting …

The dark side of ubiquitous connectivity

Mobile devices such as smartphones and tablets are often referred as the ‘Swiss pocketknives’ of today’s individual, as they serve a range of needs, activities and purposes. Along with the rapid spread of smartphones, smartphone-based Social Networking Service (SNS) has penetrated into our daily lives by allowing people to maintain close and intimate relationships with …

Why don’t employees follow security policy ?

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness Burcu Bulgurcu and researchers from the Saunders School of Business at the University of British Colombia looked into the problem of employees not complying with security policy.  Security policy is (generally) put in place to protect the company from attacks directed …

From online to offline sexual offending: Episodes and obstacles

Script theory is well known to criminologists. This approach of studying crime allows one to break down criminal acts into a series of steps and is useful when analyzing the processes, decisions and actions of offenders. Generally, these scripts are used to study offenses such as crime against property (e.g. theft), suicide bombings or carjacking. …

CAFC Bulletin: fraude au président / courriels d’affaires compromis | BEC Scams

Arnaque de l’enquêteur bancaire Le Centre antifraude du Canada produit des bulletins régulièrement pour aider les Canadiens à mieux se protéger contre la fraude. Que sont les courriels d’affaires compromis? Le courriel d’affaires compromis, aussi appelé fraude au président, fraude par virement bancaire ou arnaque des dirigeants d’entreprise, il s’agit d’une ruse complexe qui trompe une entreprise …