PodParley PodParley
Cybercrimeology cover art

All Episodes

Cybercrimeology — 128 episodes

#
Title
1

Who You Gonna Call?: Cybercrime Types and Expectations of Police Response

2

Disordered Sense-Making: Conflict Narratives in the Digital Era

3

Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders

4

Systematically Improving Cybersecurity Training

5

The Human beneath the Hoodie: Profiling pathways into cybercrime

6

Courses, Clicks and Consequences: Empiricizing Enterprise Security

7

The many minds of MITRE: building multidisciplinary human insider-risk research

8

Follow the Honey: Experiments in Cybercriminal Decision-Making

9

Crime Online: Hashtag Like and Subscribe, or don't

10

The Human in_security - deception, weapons, crime & culture

11

Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques

12

Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science

13

DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design

14

Wake up Calling: Impacting businesses by communicating cybersecurity risk

15

Anomie.exe: Geography, Strain and the Motivated Cyber Offender

16

The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

17

Building the Basics: Preparing Officers for the Present and Researching Training for the Future

18

The Open Science Revolution: Building Trust with Transparency

19

Cinematic Cybersecurity: What are movies teaching us about passwords?

20

Signals, Deception, and AI: Navigating Trust in the Digital World

21

Mapping the Digital Threat: The Geography of Cybercrime

22

Policing Street Trolls: Navigating Cop Baiting and Digital Extremism

23

Timing is Everything: Context-Based Cybersecurity Training

24

Hackting Out: Defacement and Hate Online amid Global Conflicts

25

Bridging realities: The Convergence of Ideology and Cybercrime

26

Caught in the Web: Virtual Kidnapping and Digital Scams

27

Automating CSAM Investigation: Research to Practice

28

Twenty24: Top Tips & Tricks for Better Presentations

29

1 Hundred: An AI assisted analysis of Cybercrimeology

30

Hack Righter: Working together to make good things better

31

The Ecosystem: Understanding Cybercrime and Cybersecurity

32

Minority Reporting: Beyond WEIRD(E) Cybercrime

33

Cybercrime Awareness Theatre: The revolutionary promise of story sharing

34

+Δ∵ CyberEngineer & CyberDetective & CyberAdvisor

35

Smart Everything, Data Everywhere & AI, all at once: The Weird Wide Web of Privacy

36

Change and Cybercrime Research: Modernizing Data Collection and Ethics

37

To PhD or not to PhD: Doctor's Orders

38

To PhD or not to PhD: The Challenge of a doctorate in cybercrime

39

To PhD or not to PhD: What is it to doctorate in cybercrime and should you ?

40

Education and Research Tools for Social Engineering and Ransomware

41

An Involuntarily Celibate Community: Research to understand incels

42

What is Social Engineering?

43

Pet Scammed: narratives of cyber fraud victimization

44

Darknet Honeypots: innovating research into online criminal markets

45

Opening the Internet's Toolbox: Building technical skills for crime research

46

My parents are home, it would be weird: Chatbots, Grooming & Guardians

47

There can be only one ... comparing theories of cybercrime

48

Ageless Security: Cybercrime prevention across the generation gap

49

At the Speed of Cyber: Criminal Investigations and Research

50

Its Exponential Crime: The shift to catch up to cybercrime

51

Fraudiculture: The World of Online Fraud

52

Twenty 23: Conferences

53

Cyber Predators: Writing wrongs

54

Cyber Insurance: What does it do for security?

55

Preparing Police for Cybercrime: building a global understanding

56

Baby Steps: The Pathways into Criminal Hacking, Money Muling and Innovative Research

57

New Fashioned Laundry: Cryptocurrency and the proceeds of crime

58

Cybersecurity Education for Better Digital Nations

59

Measuring Cybersecurity Awareness: Part of an Effective Education Process

60

Not Strictly Cybercriminal: Legitimate work for illegitimate ends

61

Scientists under attack: The Impact of Internet-Facilitated Harassment of Researchers

62

Surveillance Technology, the solution to {insert issue here}

63

The Lawful Espials in your pocket: Electronic Surveillance

64

Make Elections Great Again: Cyber-threats to Democracy

65

Safeguards: Secure your Choice to share your Research

66

Press Record. Trustworthy Truth Supply-chains in the Disinformation Age

67

Environmental Choices: Advancing the research of cybercrime prevention

68

CTF?WTF? : Designing and Competing in Capture the Flag competitions

69

Beyond Awareness: connecting cybersecurity knowledge, behaviour and victimization

70

CyberAware: How governments (may) change our behaviour for the better

71

The Right Tools: Advanced & Appropriate Methods For Advancing Cybercrime Research

72

Cyber Victims, Offenders & Policing in context of a life offline

73

Cybercrime Frenzy: Cloudy Data and the cascade Effect

74

Dark Data Scraping : Studying on the dark web, Publishing on the open web

75

Safety by Design: Making Crime Unfriendly Tech with just 3 Principles

76

Twenty 22

77

Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis

78

Tearing down the cross-disciplinary wall : Creating a reference on Method, Ethics & Data for Research

79

Knowing enough to be Dangerous: Podcasting for crime researchers

80

Dispatch CyberPolice or CyberSoldiers? The Complexities of High and Low Policing in Cyberspace

81

Red Flags: Supporting Seniors and a Nation victimized by Fraud

82

Smartphone Glass is always Tinted: The work of opening people's eyes to digital dangers

83

E-Learning Talks and Puppy Walks: Police Training for Cybercrime

84

Who moved my cheese: Engineering Smart farms, grids and AI

85

Vexing Validation Vectors: Password Creation Rules & Game Design thinking

86

Every dạy dỗ more to prevent cybercrime.

87

This Podcast is Clean and Cared for: Crime Prevention through Digital Environment Design

88

From Frankenstein to Hulk: Understanding Cybervictimology

89

VIVA las villains: Exploring Cybercrime against Businesses

90

Strained Dreams: Cybercrime and Institutional Anomie

91

Dishonest Criminals: Disputes in Cybercriminal markets

92

To put it bluntly: The unintended harms of cybersecurity

93

Cybercriminals are People Too

94

Social Cybersecurity: How to BEND a universe

95

Are you available .... for fraud?

96

Fraud Victims are no different to you.

97

Browser Windows of opportunity: Cyberspace and Changes in Crime

98

Questioning Advice: Rethinking Cybercrime Education

99

The Right Number of Cybercrimes

100

Twenty 21

101

Cybercrime Futures: Sect Social, Seek Global, Act Local.

102

Cybercrime History: New Fashioned Laundry

103

Cybercrime History: Who would take this opportunity?

104

Cybercrime History: Virtually Reflecting Reality, Part 6

105

Cybercrime History: Weapons and Worries Worldwide, Part 5

106

Cybercrime History: Managing a Manifest Mitnick, Part 4

107

Cybercrime History: Curious Captains are Calling, Pt 3

108

Cybercrime History: Global Regulators Part 2

109

Cybercrime History: Pioneers in Law, Part 1

110

Too Good to be True: Cybersecurity advice and susceptibility to fraud

111

Will you comply?: Why employees follow IT Security Policy, or not.

112

Town and Country: The role of Space, Place and Technology in Domestic and Family Violence

113

The Online Frontline: Investigating and Preventing Cybercrime

114

The Things of Internet: Actor Network Theory and Cybercrime

115

Cybercrime and Deterrence: The Theory behind Stop it!, or else ...

116

Cyber-Routine Activities Theory: Risky business

117

Social Learning Theory and Cybercrime: The impact of Family, Friends and Bronies

118

General Theory and Cybercrime: Low Self-Control and crime online

119

Getting started with Cybercrime Theory

120

Why Sell Drugs Online?

121

Goldphish memories: Aging and susceptibility to fraud

122

Turn up your Radio: Cybersecurity learning for older adults

123

Good Habits: Teaching Digital Hygiene and Cyber Self-defence

124

Organized Cybercrime: Its all about the Money

125

Understanding eWhoring

126

Providing Cybersecurity for Victims of Intimate Partner Violence

127

The Consumer Spyware Industry

128

Experiences of Technology-Facilitated Domestic Violence