All Episodes
Cybercrimeology — 128 episodes
Who You Gonna Call?: Cybercrime Types and Expectations of Police Response
Disordered Sense-Making: Conflict Narratives in the Digital Era
Beyond “The Cybercriminal”: Understanding Diversity in Cyber Offenders
Systematically Improving Cybersecurity Training
The Human beneath the Hoodie: Profiling pathways into cybercrime
Courses, Clicks and Consequences: Empiricizing Enterprise Security
The many minds of MITRE: building multidisciplinary human insider-risk research
Follow the Honey: Experiments in Cybercriminal Decision-Making
Crime Online: Hashtag Like and Subscribe, or don't
The Human in_security - deception, weapons, crime & culture
Visualizing Conti: Revealing the Business of Ransomware-as-a-Service through New Analytical Techniques
Fake It Until You Break It: The pay-to-publish paper mills exploiting the over metrification of Science
DeReact, DeFatigue and Deceive: Psychology for Better Cybersecurity Design
Wake up Calling: Impacting businesses by communicating cybersecurity risk
Anomie.exe: Geography, Strain and the Motivated Cyber Offender
The Ethical Hacker Pathway: Exploring Positive Cyber Behavior
Building the Basics: Preparing Officers for the Present and Researching Training for the Future
The Open Science Revolution: Building Trust with Transparency
Cinematic Cybersecurity: What are movies teaching us about passwords?
Signals, Deception, and AI: Navigating Trust in the Digital World
Mapping the Digital Threat: The Geography of Cybercrime
Policing Street Trolls: Navigating Cop Baiting and Digital Extremism
Timing is Everything: Context-Based Cybersecurity Training
Hackting Out: Defacement and Hate Online amid Global Conflicts
Bridging realities: The Convergence of Ideology and Cybercrime
Caught in the Web: Virtual Kidnapping and Digital Scams
Automating CSAM Investigation: Research to Practice
Twenty24: Top Tips & Tricks for Better Presentations
1 Hundred: An AI assisted analysis of Cybercrimeology
Hack Righter: Working together to make good things better
The Ecosystem: Understanding Cybercrime and Cybersecurity
Minority Reporting: Beyond WEIRD(E) Cybercrime
Cybercrime Awareness Theatre: The revolutionary promise of story sharing
+Δ∵ CyberEngineer & CyberDetective & CyberAdvisor
Smart Everything, Data Everywhere & AI, all at once: The Weird Wide Web of Privacy
Change and Cybercrime Research: Modernizing Data Collection and Ethics
To PhD or not to PhD: Doctor's Orders
To PhD or not to PhD: The Challenge of a doctorate in cybercrime
To PhD or not to PhD: What is it to doctorate in cybercrime and should you ?
Education and Research Tools for Social Engineering and Ransomware
An Involuntarily Celibate Community: Research to understand incels
What is Social Engineering?
Pet Scammed: narratives of cyber fraud victimization
Darknet Honeypots: innovating research into online criminal markets
Opening the Internet's Toolbox: Building technical skills for crime research
My parents are home, it would be weird: Chatbots, Grooming & Guardians
There can be only one ... comparing theories of cybercrime
Ageless Security: Cybercrime prevention across the generation gap
At the Speed of Cyber: Criminal Investigations and Research
Its Exponential Crime: The shift to catch up to cybercrime
Fraudiculture: The World of Online Fraud
Twenty 23: Conferences
Cyber Predators: Writing wrongs
Cyber Insurance: What does it do for security?
Preparing Police for Cybercrime: building a global understanding
Baby Steps: The Pathways into Criminal Hacking, Money Muling and Innovative Research
New Fashioned Laundry: Cryptocurrency and the proceeds of crime
Cybersecurity Education for Better Digital Nations
Measuring Cybersecurity Awareness: Part of an Effective Education Process
Not Strictly Cybercriminal: Legitimate work for illegitimate ends
Scientists under attack: The Impact of Internet-Facilitated Harassment of Researchers
Surveillance Technology, the solution to {insert issue here}
The Lawful Espials in your pocket: Electronic Surveillance
Make Elections Great Again: Cyber-threats to Democracy
Safeguards: Secure your Choice to share your Research
Press Record. Trustworthy Truth Supply-chains in the Disinformation Age
Environmental Choices: Advancing the research of cybercrime prevention
CTF?WTF? : Designing and Competing in Capture the Flag competitions
Beyond Awareness: connecting cybersecurity knowledge, behaviour and victimization
CyberAware: How governments (may) change our behaviour for the better
The Right Tools: Advanced & Appropriate Methods For Advancing Cybercrime Research
Cyber Victims, Offenders & Policing in context of a life offline
Cybercrime Frenzy: Cloudy Data and the cascade Effect
Dark Data Scraping : Studying on the dark web, Publishing on the open web
Safety by Design: Making Crime Unfriendly Tech with just 3 Principles
Twenty 22
Be a Curious Romantic: Understanding how Romance Fraud Works with Linguistic Analysis
Tearing down the cross-disciplinary wall : Creating a reference on Method, Ethics & Data for Research
Knowing enough to be Dangerous: Podcasting for crime researchers
Dispatch CyberPolice or CyberSoldiers? The Complexities of High and Low Policing in Cyberspace
Red Flags: Supporting Seniors and a Nation victimized by Fraud
Smartphone Glass is always Tinted: The work of opening people's eyes to digital dangers
E-Learning Talks and Puppy Walks: Police Training for Cybercrime
Who moved my cheese: Engineering Smart farms, grids and AI
Vexing Validation Vectors: Password Creation Rules & Game Design thinking
Every dạy dỗ more to prevent cybercrime.
This Podcast is Clean and Cared for: Crime Prevention through Digital Environment Design
From Frankenstein to Hulk: Understanding Cybervictimology
VIVA las villains: Exploring Cybercrime against Businesses
Strained Dreams: Cybercrime and Institutional Anomie
Dishonest Criminals: Disputes in Cybercriminal markets
To put it bluntly: The unintended harms of cybersecurity
Cybercriminals are People Too
Social Cybersecurity: How to BEND a universe
Are you available .... for fraud?
Fraud Victims are no different to you.
Browser Windows of opportunity: Cyberspace and Changes in Crime
Questioning Advice: Rethinking Cybercrime Education
The Right Number of Cybercrimes
Twenty 21
Cybercrime Futures: Sect Social, Seek Global, Act Local.
Cybercrime History: New Fashioned Laundry
Cybercrime History: Who would take this opportunity?
Cybercrime History: Virtually Reflecting Reality, Part 6
Cybercrime History: Weapons and Worries Worldwide, Part 5
Cybercrime History: Managing a Manifest Mitnick, Part 4
Cybercrime History: Curious Captains are Calling, Pt 3
Cybercrime History: Global Regulators Part 2
Cybercrime History: Pioneers in Law, Part 1
Too Good to be True: Cybersecurity advice and susceptibility to fraud
Will you comply?: Why employees follow IT Security Policy, or not.
Town and Country: The role of Space, Place and Technology in Domestic and Family Violence
The Online Frontline: Investigating and Preventing Cybercrime
The Things of Internet: Actor Network Theory and Cybercrime
Cybercrime and Deterrence: The Theory behind Stop it!, or else ...
Cyber-Routine Activities Theory: Risky business
Social Learning Theory and Cybercrime: The impact of Family, Friends and Bronies
General Theory and Cybercrime: Low Self-Control and crime online
Getting started with Cybercrime Theory
Why Sell Drugs Online?
Goldphish memories: Aging and susceptibility to fraud
Turn up your Radio: Cybersecurity learning for older adults
Good Habits: Teaching Digital Hygiene and Cyber Self-defence
Organized Cybercrime: Its all about the Money
Understanding eWhoring
Providing Cybersecurity for Victims of Intimate Partner Violence
The Consumer Spyware Industry
Experiences of Technology-Facilitated Domestic Violence