Skip to main content
Top

2019 | OriginalPaper | Chapter

9. Designing and Evaluating Crime Prevention Solutions for the Digital Age

Authors : Russell Brewer, Melissa de Vel-Palumbo, Alice Hutchings, Thomas Holt, Andrew Goldsmith, David Maimon

Published in: Cybercrime Prevention

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter draws together the key empirical strands that have emerged throughout the preceding chapters and explicates the practical dimensions of this work. It acknowledges first that there has been very little research evaluating the effects of crime prevention initiatives on cybercrime. It then outlines ways in which this gap can be addressed in the future, and some of the issues that both researchers and practitioners will need to be aware of when it comes to implementing and evaluating cybercrime interventions. This chapter concludes by offering a number of recommendations for practitioners and researchers seeking to evaluate cybercrime interventions in the future.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We acknowledge that elsewhere, less methodologically robust studies have also examined the merits of other SCP approaches within cybercrime contexts, including the use of firewalls and passwords, vulnerability patching, police crackdowns, intrusion detection and prevention systems, honeypots, audit trails, website takedowns, fraud detection systems, and spam filtering (see further Chapter 2).
 
Literature
go back to reference Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology and criminal justice (6th ed.). Los Angeles, CA: Sage. Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology and criminal justice (6th ed.). Los Angeles, CA: Sage.
go back to reference Becker, H. (1963). Outsiders. New York, NY: Free Press. Becker, H. (1963). Outsiders. New York, NY: Free Press.
go back to reference Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory. Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory.
go back to reference Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin. Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin.
go back to reference Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime, 2, 122–141. Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime, 2, 122–141.
go back to reference Dossetor, K. (2011). Cost-benefit analysis and its application to crime prevention and criminal justice research (Technical and Background Paper Series No. 42). Canberra, Australia: Australian Institute of Criminology. Dossetor, K. (2011). Cost-benefit analysis and its application to crime prevention and criminal justice research (Technical and Background Paper Series No. 42). Canberra, Australia: Australian Institute of Criminology.
go back to reference Glenny, M. (2011). DarkMarket: Cyberthieves, cybercops and you. London, UK: The Brodley Head. Glenny, M. (2011). DarkMarket: Cyberthieves, cybercops and you. London, UK: The Brodley Head.
go back to reference Grabosky, P. N. (1996). Unintended consequences of crime prevention. Crime Prevention Studies, 5, 25–56. Grabosky, P. N. (1996). Unintended consequences of crime prevention. Crime Prevention Studies, 5, 25–56.
go back to reference Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline Academic Press. Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline Academic Press.
go back to reference Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75–94. Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75–94.
go back to reference Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder using civil remedies: Results from a randomized field experiment in Oakland, California. Crime Prevention Studies, 9, 141–159. Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder using civil remedies: Results from a randomized field experiment in Oakland, California. Crime Prevention Studies, 9, 141–159.
go back to reference Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27). CrimeBB: Enabling cybercrime research on underground forums at scale. In WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–1854). ACM. https://doi.org/10.1145/3178876.3186178. Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27). CrimeBB: Enabling cybercrime research on underground forums at scale. In WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–1854). ACM. https://​doi.​org/​10.​1145/​3178876.​3186178.
go back to reference Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and Justice Bulletin, 175, 1–12. Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and Justice Bulletin, 175, 1–12.
go back to reference Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences attendees: Their autism-spectrum quotient (AQ) scores and self-reported adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 144–169). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch008.CrossRef Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences attendees: Their autism-spectrum quotient (AQ) scores and self-reported adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 144–169). Hershey, PA: IGI Global. https://​doi.​org/​10.​4018/​978-1-61692-805-6.​ch008.CrossRef
go back to reference Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dangerous knowledge? Law and Contemporary Problems, 47(4), 61–81.CrossRef Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dangerous knowledge? Law and Contemporary Problems, 47(4), 61–81.CrossRef
go back to reference Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., & Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s promising. In National Institute of Justice: Research in brief. Washington, DC: U.S. Department of Justice. Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., & Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s promising. In National Institute of Justice: Research in brief. Washington, DC: U.S. Department of Justice.
go back to reference Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn, E. G., et al. (1992). The variable effects of arrest on criminal careers: The Milwaukee domestic violence experiment. The Journal of Criminal Law and Criminology, 83, 137–169. https://doi.org/10.2307/1143827.CrossRef Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn, E. G., et al. (1992). The variable effects of arrest on criminal careers: The Milwaukee domestic violence experiment. The Journal of Criminal Law and Criminology, 83, 137–169. https://​doi.​org/​10.​2307/​1143827.CrossRef
go back to reference Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia: Australian Institute of Criminology. Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia: Australian Institute of Criminology.
go back to reference Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX. Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX.
go back to reference Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing information systems security: Critical success factors and indicators to measure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis (Eds.), Information security. ISC 2006 (Lecture Notes in Computer Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://doi.org/10.1007/11836810_38. Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing information systems security: Critical success factors and indicators to measure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis (Eds.), Information security. ISC 2006 (Lecture Notes in Computer Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://​doi.​org/​10.​1007/​11836810_​38.
Metadata
Title
Designing and Evaluating Crime Prevention Solutions for the Digital Age
Authors
Russell Brewer
Melissa de Vel-Palumbo
Alice Hutchings
Thomas Holt
Andrew Goldsmith
David Maimon
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-31069-1_9

Premium Partner