David Maimon
YOU?
Author Swipe
View article: The organized activities of ransomware groups: A social network approach
The organized activities of ransomware groups: A social network approach Open
View article: The organized activities of ransomware groups: A social network approach
The organized activities of ransomware groups: A social network approach Open
View article: Illicit Markets on Encrypted Platforms
Illicit Markets on Encrypted Platforms Open
View article: The art
The art Open
View article: Crime and Calculation: The Decision-Making of Dark Web Actors
Crime and Calculation: The Decision-Making of Dark Web Actors Open
View article: Comparative Analysis of Cyber Fraud Ecosystems: Telegram and Dark Web Platforms in Digital Criminal Landscapes
Comparative Analysis of Cyber Fraud Ecosystems: Telegram and Dark Web Platforms in Digital Criminal Landscapes Open
View article: Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions
Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions Open
View article: Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions
Engaging in cyber hygiene: the role of thoughtful decision-making and informational interventions Open
Introduction The effectiveness of human-centric cybersecurity largely depends on end-users’ adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theore…
View article: The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment
The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment Open
View article: What Money Can Do: Examining the Effects of Rewards on Online Romance Fraudsters' Deceptive Strategies
What Money Can Do: Examining the Effects of Rewards on Online Romance Fraudsters' Deceptive Strategies Open
With the advent of the internet, romance fraud â or instances wherein individuals use fake identities and sham romantic relationships to defraud others â has moved online. Victims of this crime experience harms to their financial, soci…
View article: What are ‘mule addresses’? Criminologists explain how vacant properties serve as depots for illegal online purchases
What are ‘mule addresses’? Criminologists explain how vacant properties serve as depots for illegal online purchases Open
View article: The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment
The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment Open
View article: The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment
The Relevance of Targets’ Sexual Knowledge in the Progression of Online Sexual Grooming Events: Findings from an Online Field Experiment Open
Although the typical end goal of an online grooming event is to lure a minor into performing sexual activity (either online or offline), no previous study has examined the relevance of targets' sexual knowledge on the progression of these …
View article: Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds Open
View article: The Moderating Role of Thoughtfully Reflective Decision-Making on the Relationship between Information Security Messages and SMiShing Victimization: An Experiment
The Moderating Role of Thoughtfully Reflective Decision-Making on the Relationship between Information Security Messages and SMiShing Victimization: An Experiment Open
Security messages, as a form of information security awareness training, are designed to encourage individuals to make an informed security decision, reducing their susceptibility to online victimization. To date, no known study has assess…
View article: Open Source Intelligence in Online Stolen Data Markets: Assessment of Network Disruption Strategies
Open Source Intelligence in Online Stolen Data Markets: Assessment of Network Disruption Strategies Open
View article: The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces Open
View article: Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment
Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment Open
View article: The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces
The Network of Online Stolen Data Markets: How Vendor Flows Connect Digital Marketplaces Open
View article: Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors
Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors Open
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as perso…
View article: Editorial: Cognition, Behavior and Cybersecurity
Editorial: Cognition, Behavior and Cybersecurity Open
Cybersecurity appears to be the ultimate paradox: while cybersecurity budgets are increased every year, and a vast array of new security products and services appear in the market, cyber attacks have been increasing in scale and scope ever…
View article: Editorial: Cognition, Behavior and Cybersecurity
Editorial: Cognition, Behavior and Cybersecurity Open
View article: Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks
Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks Open
View article: The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach
The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach Open
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be …
View article: Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors
Situational Awareness and Public Wi-Fi Users’ Self-Protective Behaviors Open
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as perso…
View article: Sketchy darknet websites are taking advantage of the COVID-19 pandemic – buyer beware
Sketchy darknet websites are taking advantage of the COVID-19 pandemic – buyer beware Open
View article: Extended Validation in the Dark Web: Evidence from Investigation of the Certification Services and Products Sold on Darknet Markets
Extended Validation in the Dark Web: Evidence from Investigation of the Certification Services and Products Sold on Darknet Markets Open
View article: Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature
Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature Open
View article: SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report)
SSL/TLS Certificates and Their Prevalence on the Dark Web (First Report) Open
View article: Out of control online? A combined examination of peer-offending and perceived formal and informal social control in relation to system-trespassing
Out of control online? A combined examination of peer-offending and perceived formal and informal social control in relation to system-trespassing Open
Compared to the offline world, the online environment is more anonymous and therefore less easily controlled. Criminological theories generally show that people are more likely to commit crime when they experience or perceive less formal o…