Skip to main content

2019 | OriginalPaper | Buchkapitel

9. Designing and Evaluating Crime Prevention Solutions for the Digital Age

verfasst von : Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, David Maimon

Erschienen in: Cybercrime Prevention

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter draws together the key empirical strands that have emerged throughout the preceding chapters and explicates the practical dimensions of this work. It acknowledges first that there has been very little research evaluating the effects of crime prevention initiatives on cybercrime. It then outlines ways in which this gap can be addressed in the future, and some of the issues that both researchers and practitioners will need to be aware of when it comes to implementing and evaluating cybercrime interventions. This chapter concludes by offering a number of recommendations for practitioners and researchers seeking to evaluate cybercrime interventions in the future.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We acknowledge that elsewhere, less methodologically robust studies have also examined the merits of other SCP approaches within cybercrime contexts, including the use of firewalls and passwords, vulnerability patching, police crackdowns, intrusion detection and prevention systems, honeypots, audit trails, website takedowns, fraud detection systems, and spam filtering (see further Chapter 2).
 
Literatur
Zurück zum Zitat Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology and criminal justice (6th ed.). Los Angeles, CA: Sage. Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology and criminal justice (6th ed.). Los Angeles, CA: Sage.
Zurück zum Zitat Becker, H. (1963). Outsiders. New York, NY: Free Press. Becker, H. (1963). Outsiders. New York, NY: Free Press.
Zurück zum Zitat Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory. Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory.
Zurück zum Zitat Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin. Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin.
Zurück zum Zitat Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime, 2, 122–141. Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime, 2, 122–141.
Zurück zum Zitat Dossetor, K. (2011). Cost-benefit analysis and its application to crime prevention and criminal justice research (Technical and Background Paper Series No. 42). Canberra, Australia: Australian Institute of Criminology. Dossetor, K. (2011). Cost-benefit analysis and its application to crime prevention and criminal justice research (Technical and Background Paper Series No. 42). Canberra, Australia: Australian Institute of Criminology.
Zurück zum Zitat Glenny, M. (2011). DarkMarket: Cyberthieves, cybercops and you. London, UK: The Brodley Head. Glenny, M. (2011). DarkMarket: Cyberthieves, cybercops and you. London, UK: The Brodley Head.
Zurück zum Zitat Grabosky, P. N. (1996). Unintended consequences of crime prevention. Crime Prevention Studies, 5, 25–56. Grabosky, P. N. (1996). Unintended consequences of crime prevention. Crime Prevention Studies, 5, 25–56.
Zurück zum Zitat Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline Academic Press. Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline Academic Press.
Zurück zum Zitat Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75–94. Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75–94.
Zurück zum Zitat Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder using civil remedies: Results from a randomized field experiment in Oakland, California. Crime Prevention Studies, 9, 141–159. Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder using civil remedies: Results from a randomized field experiment in Oakland, California. Crime Prevention Studies, 9, 141–159.
Zurück zum Zitat Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27). CrimeBB: Enabling cybercrime research on underground forums at scale. In WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–1854). ACM. https://doi.org/10.1145/3178876.3186178. Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27). CrimeBB: Enabling cybercrime research on underground forums at scale. In WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–1854). ACM. https://​doi.​org/​10.​1145/​3178876.​3186178.
Zurück zum Zitat Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and Justice Bulletin, 175, 1–12. Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and Justice Bulletin, 175, 1–12.
Zurück zum Zitat Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences attendees: Their autism-spectrum quotient (AQ) scores and self-reported adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 144–169). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch008.CrossRef Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences attendees: Their autism-spectrum quotient (AQ) scores and self-reported adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 144–169). Hershey, PA: IGI Global. https://​doi.​org/​10.​4018/​978-1-61692-805-6.​ch008.CrossRef
Zurück zum Zitat Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dangerous knowledge? Law and Contemporary Problems, 47(4), 61–81.CrossRef Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dangerous knowledge? Law and Contemporary Problems, 47(4), 61–81.CrossRef
Zurück zum Zitat Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., & Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s promising. In National Institute of Justice: Research in brief. Washington, DC: U.S. Department of Justice. Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., & Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s promising. In National Institute of Justice: Research in brief. Washington, DC: U.S. Department of Justice.
Zurück zum Zitat Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn, E. G., et al. (1992). The variable effects of arrest on criminal careers: The Milwaukee domestic violence experiment. The Journal of Criminal Law and Criminology, 83, 137–169. https://doi.org/10.2307/1143827.CrossRef Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn, E. G., et al. (1992). The variable effects of arrest on criminal careers: The Milwaukee domestic violence experiment. The Journal of Criminal Law and Criminology, 83, 137–169. https://​doi.​org/​10.​2307/​1143827.CrossRef
Zurück zum Zitat Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia: Australian Institute of Criminology. Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia: Australian Institute of Criminology.
Zurück zum Zitat Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX. Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX.
Zurück zum Zitat Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing information systems security: Critical success factors and indicators to measure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis (Eds.), Information security. ISC 2006 (Lecture Notes in Computer Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://doi.org/10.1007/11836810_38. Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing information systems security: Critical success factors and indicators to measure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis (Eds.), Information security. ISC 2006 (Lecture Notes in Computer Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://​doi.​org/​10.​1007/​11836810_​38.
Metadaten
Titel
Designing and Evaluating Crime Prevention Solutions for the Digital Age
verfasst von
Russell Brewer
Melissa de Vel-Palumbo
Alice Hutchings
Thomas Holt
Andrew Goldsmith
David Maimon
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-31069-1_9

Premium Partner