Criminals documenting themselves doing something illegal seems counterproductive. Creating a video that could prove their guilt seems bizarre. Even though it is illogical, it still happens. Sveinung Sandberg and Thomas Ugelvik looked into this phenomenon. They analyzed 51 Norwegian higher court decisions involving the use of a camera as an integrated part of an offence. …
Presented at the SERENE-RISC Workshop October 2017. Joseph Mudge Co-operators General Insurance Company Collaboration toward a knowledge engineering model for cyber risk assessment Collaboration among cyber risk experts is important for a robust Canadian cybersecurity posture. Although data sharing agreements are an important way that organizations can collaborate toward improving cybersecurity, there are sometimes barriers to …
Presented at the SERENE-RISC Workshop October 2017 Jason Jaskolka Carleton University Many of today’s most critical systems such as those found in the transportation, financial, medical, communications, and national defense domains are becoming more complex and interconnected. Because of this, there is an increasingly critical need for ensuring the security of these systems and the …
Presented at the SERENE-RISC Workshop, October 2017. Scientific Director Benoît Dupont reports on SERENE-RISC activities for the past 4 years of cybersecurity knowledge mobilization in Canada and provides insight on what we have planned for the future. SERENE-RISC has surpassed expectations due to the support of our network members to provide innovative resources and …
Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …
Can we do research with data that is leaked or stolen and dumped on the internet? This is an ethical question that is difficult to answer as it quickly gets complicated. Unfortunately, WWJD? is of no help in a lot of situations. Ideas about research ethics developed before the information age can fall short where …
Presented at the SERENE-RISC Workshop, 2017 October Spam detection software can use both handcrafted rules and machine learning techniques. At ZEROSPAM we are aiming at reducing the need to create or edit rules manually to adapt to constantly evolving email-borne threats. At the same time, the performance of our machine learning tools could be improved …
Presented at the SERENE-RISC Workshop, 2017 October. Detecting anomalies on the automotive control bus with machine learning. Cars are vulnerable to hacking. While automotive cyber attacks are not yet a widespread threat, learning how to detect them will be an important part of future countermeasures. Attacks must be crafted for specific models, so attack detectors must …
Presented at the SERENE-RISC Workshop, 2017 October Academics, scientists, private sector and public sector actors have long relied on sociodemographic data, marketing data and other typological clusters to set context, variables and other tools in their respective research efforts. Whether its cutting edge emergency medicine research or dated law enforcement research from the 1970s, sociodemographic …
Thomas J. Holt – Surveying the State of Research On Policing Cybercrime: Local to Transnational Gaps
Presented at the SERENE-RISC Workshop, 2017 October. This presentation will provide an overview of the current state of criminological scholarship on policing cybercrimes. The current body of knowledge regarding line officers’ perceptions of cybercrime will be considered, as well as our knowledge of the specialized roles of forensic examiners. The limitations of this research will be considered, along with possible …