Thomas J. Holt
YOU?
Author Swipe
View article: Examining Phishing Attempts on Data Breach Victims
Examining Phishing Attempts on Data Breach Victims Open
Data breaches are an everyday occurrence, exposing the personal details of millions globally. The victim impacts of data breaches can be considerable, including a range of financial harms such as fraud and identity crime, as well as non-fi…
View article: The evolution of Nigerian cybercrime: Two case studies of UK-based offender networks
The evolution of Nigerian cybercrime: Two case studies of UK-based offender networks Open
Thus far, the literature on cybercrime has focussed on ‘cyber-dependent’, rather than ‘cyber-enabled’ crime. This has meant the emphasis has been on online settings, technical offences, and Western cybercriminals. This paper seeks to parti…
View article: Does age matter? Examining seniors’ experiences of romance fraud
Does age matter? Examining seniors’ experiences of romance fraud Open
Using the premise of a genuine relationship, romance fraud offenders deceive victims for monetary gain. Research on romance fraud has grown, but limited work explores the demographic correlates of victimisation. An assumption exists that o…
View article: Exploring and Estimating the Revenues of Cybercrime-As-Service Providers: Analyzing Booter and Stresser Services
Exploring and Estimating the Revenues of Cybercrime-As-Service Providers: Analyzing Booter and Stresser Services Open
Research on cybercrime-as-service markets has increased substantially over the last decade, particularly the use of so-called booter and stresser services that enable individuals to engage in high volume denial of service attacks against w…
View article: Exploring the Role of Self-Control Across Distinct Patterns of Cyber-Deviance in Emerging Adolescence
Exploring the Role of Self-Control Across Distinct Patterns of Cyber-Deviance in Emerging Adolescence Open
A disproportionally large number of adolescents engage in cyber-deviance. However, it is unclear if distinct patterns of adolescent cyber-deviance are evident, and if so, whether and to what extent low self-control is associated with diffe…
View article: Responding to cybercrime: Perceptions and need of Australian police and the general community
Responding to cybercrime: Perceptions and need of Australian police and the general community Open
No description available
View article:
Open
Criminology & Public PolicyEarly View EDITORIAL INTRODUCTION Cynthia Lum, Cynthia Lum Editor-in-ChiefSearch for more papers by this authorChristopher S. Koper, Christopher S. Koper Editor-in-ChiefSearch for more papers by this authorJin R.…
View article: Assessing nation‐state‐sponsored cyberattacks using aspects of Situational Crime Prevention
Assessing nation‐state‐sponsored cyberattacks using aspects of Situational Crime Prevention Open
Research Summary This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation‐state‐sponsored cyberattacks relative to those performed b…
View article: Minor‐focused sextortion by adult strangers: A crime script analysis of newspaper and court cases
Minor‐focused sextortion by adult strangers: A crime script analysis of newspaper and court cases Open
Summary Sextortion is a form of image‐based sexual abuse in which an offender threatens to distribute sexually explicit images, videos, or information to gain victim compliance. In some sextortion incidents involving minor children, offend…
View article: An Assessment of Cryptomixing Services in Online Illicit Markets
An Assessment of Cryptomixing Services in Online Illicit Markets Open
The internet has become a popular marketplace for the sale of illicit products, including stolen personal information, drugs, and firearms. Many of these products are acquired using cryptocurrencies, which are generally defined as forms of…
View article: More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime
More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime Open
Romance fraud occurs when an offender uses the guise of a genuine relationship to defraud an individual for financial gain. Known statistics indicate that millions are lost each year to this form of fraud. However, the potential for romanc…
View article: To pay or not to pay: An exploratory analysis of sextortion in the context of romance fraud
To pay or not to pay: An exploratory analysis of sextortion in the context of romance fraud Open
Romance fraud, where an offender uses the guise of a genuine relationship for monetary gain, affects millions globally. Further to financial losses, evidence suggests victims may also be targeted for sextortion, where the offender either h…
View article: Exploring Risk Avoidance Practices Among On-Demand Cybercrime-as-Service Operations
Exploring Risk Avoidance Practices Among On-Demand Cybercrime-as-Service Operations Open
Criminologists have recently explored online cybercrime-as-service markets where offenders offer hacking tools and services for a fee. So-called “stresser” or “booter” markets offering distributed reflective denial of service (DRDoS) attac…
View article: Introducing and Exploring the Extremist Cybercrime Database (ECCD)
Introducing and Exploring the Extremist Cybercrime Database (ECCD) Open
This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that inc…
View article: Child Sexual Abuse Material Online: The Perspective of Online Investigators on Training and Support
Child Sexual Abuse Material Online: The Perspective of Online Investigators on Training and Support Open
The development of online technologies in recent decades has led to the proliferation of the distribution, consumption, and sale of child sexual abuse material (CSAM) online. This trend has arguably also contributed to the sexual abuse of …
View article: Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals
Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals Open
Criminologists have frequently debated whether offenders are specialists, in that they consistently perform either one offense or similar offenses, or versatile by performing any crime based on opportunities and situational provocations. S…
View article: Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements Open
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether re…
View article: Ontwikkelingstrajecten van hackers: een longitudinale studie naar defacements op Nederlandse websites
Ontwikkelingstrajecten van hackers: een longitudinale studie naar defacements op Nederlandse websites Open
Developmental trajectories of hackers: a longitudinal study of defacements on Dutch websites In this study we examined the developmental trajectories of hackers, based on their self-reported web defacements. During a web defacement, the co…
View article: The Human Factor of Cybercrime
The Human Factor of Cybercrime Open
This volume highlights the central role of the human factor in cybercrime and the need to develop a more interdisciplinary research agenda to understand better the constant evolution of online harms and craft more effective responses. The …
View article: The Use of Military Profiles in Romance Fraud Schemes
The Use of Military Profiles in Romance Fraud Schemes Open
Romance fraud occurs when offenders use the guise of a genuine relationship to defraud a victim, typically via online communications. Research has focused on the general structure of romance frauds, but few scholars have considered the pot…