Publications

Examining ransomware payment decision-making among small- and medium-sized enterprises

organizations
cyber-dependent crime
ransomware
quantitative methods

Journal article

Interest in booter services and distributed denial of service attacks: Insight from Google search data

indidivual offenders
cyber-dependent crime
DDoS-attacks
mixed methods

Journal article

Pathways Into, Desistance From, and Risk Factors Related to Cyber-Dependent Crime: A Systematic Narrative Review

developmental criminology
individual offenders
cyber-dependent crime
hacking
qualitative methods

Journal article

Stolen data markets on Telegram: a crime script analysis and situational crime prevention measures

environmental criminology
criminal networks
cyber-enabled crime
data theft
qualitative methods

Journal article

Sweeter than honey: Are Gmail accounts associated with greater rewards at a higher risk of hijacking?

classical criminology
individual offenders
cyber-enabled crime
data theft
quantitative methods

Journal article

Criminal expertise and hacking efficiency

psychological criminology
individual offenders
cyber-dependent crime
hacking
quantitative methods

Journal article

Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands

general victims
general cybercrime
mixed methods

Journal article

Fieldwork Experiences Researching Cybercriminals

general offenders
general cybercrime
theoretical

Book chapter

A systematic narrative review of pathways into, desistance from, and risk factors of financial-economic cyber-enabled crime

developmental criminology
individual offenders
cyber-enabled crime
fraud
qualitative methods

Journal article

The effect of online ad campaigns on DDoS-attacks: A cross-national difference-in-differences quasi-experiment

behavioral economics
individual offenders
cyber-dependent crime
DDoS-attacks
quantitative methods

Journal article

Conjunctive Analysis of Case Configurations (CACC)

environmental criminology
crime contexts
traditional crime
mixed methods

Book chapter

Insider threats among Dutch SMEs: Nature and extent of incidents, and cyber security measures

organizations
general cybercrime
insider threats
mixed methods

Journal article

Familial concentration of crime in a digital era: Criminal behavior among family members of cyber offenders

biological criminology
individual offenders
general cybercrime
quantitative methods

Journal article

Understanding cybercrime involvement: a quasi-experiment on engagement with money mule recruitment ads on Instagram

cultural criminology
criminal networks
cyber-enabled crime
money muling
quantitative methods

Journal article

Alerting consciences to reduce cybercrime: A quasi-experimental design using warning banners

environmental criminology
individual offenders
cyber-dependent crime
DDoS-attacks
quantitative methods

Journal article

Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective

environmental criminology
crime contexts
cyber-dependent crime
hacking
quantitative methods

Journal article

Empty streets, busy internet: A time-series analysis of cybercrime and fraud trends during COVID-19

environmental criminology
crime trends
general cybercrime
fraud
quantitative methods

Journal article

The Annual Conference on the Human Factor in Cybercrime: An analysis of participation in the 2018 and 2019 meetings

organizations
general cybercrime
mixed methods

Book chapter

Cybercrime and shifts in opportunities during COVID-19: A preliminary analysis in the UK

environmental criminology
crime trends
general cybercrime
quantitative methods

Journal article

Cyber places, crime patterns, and cybercrime prevention: An environmental criminology and crime analysis approach through data science

environmental criminology
crime contexts
general cybercrime
quantitative methods

Doctoral thesis

Environmental criminology and cybercrime: Shifting focus from the wine to the bottles

environmental criminology
crime contexts
general cybercrime
theoretical

Book chapter

Hunter or prey? Exploring the situational profiles that define repeated online harassment victims and offenders

environmental criminology
individual offenders and victims
cyber-enabled crime
harassment
mixed methods

Journal article

The dark figure and the cyber fraud Rise in Europe: Evidence from Spain

crime trends
cyber-enabled crime
fraud
quantitative methods

Journal article

Comparing correlates of offline and online fraud victimisation and impacts

individual victims
cyber-enabled crime
fraud
quantitative methods

Journal article

100% sure bets? Exploring the precipitation-control strategies of fixed-match informing websites and the environmental features of their networks

environmental criminology
crime contexts
cyber-enabled crime
fraud
mixed methods

Journal article

What about cyberspace (and cybercrime alongside it)? A reply to Farrell and Birks “Did cybercrime cause the crime drop?”

environmental criminology
crime trends
cyber-enabled crime
fraud
theoretical

Journal article

Can metadata be used to measure the anonymity of Twitter users? Results of a confirmatory factor analysis

environmental criminology
crime contexts
cyber-enabled crime
quantitative methods

Journal article

Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments

environmental criminology
crime contexts
cyber-enabled crime
hate speech
quantitative methods

Journal article

Conjunctive analysis of case configurations: An introduction to configural thinking

crime contexts
traditional crime
assault
mixed methods

Journal article

More articles »

Publications

Reuse

Text and figures are licensed under Creative Commons Attribution CC BY 4.0. The figures that have been reused from other sources don't fall under this license and can be recognized by a note in their caption: "Figure from ...".