skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Disciplinary and Interdisciplinary Trends in Cybercrime Research: An Examination
Compared to other topics, cybercrime is a relatively new addition to the criminological literature. interest in the topic has grown over the past decade, with a handful of scholars leading efforts to generate empirical understanding about the topic. Common conclusions reached in these studies are that more research is needed, cybercrime is interdisciplinary in nature, and cybercrime should be addressed as an international problem. In this study, we examine a sample of 593 prior cybercrime scholarly articles to identify the types of research strategies used in them, the patterns guiding those strategies, whether the research is interdisciplinary, and the degree to which scholars engage in international cybercrime studies. Attention is also given to co-authorship as well as citation patterns. Implications for future research are provided.  more » « less
Award ID(s):
1723635
PAR ID:
10201947
Author(s) / Creator(s):
;
Editor(s):
Jaishankar, K.
Date Published:
Journal Name:
International journal of cyber criminology
Volume:
14
Issue:
1
ISSN:
0974-2891
Page Range / eLocation ID:
81-105
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. In the last decade, cybercrime has risen considerably. One key factor is the proliferation of online cybercrime communities, where actors trade products and services, and also learn from each other. Accordingly, understanding the operation and behavior of these communities is of great interest, and they have been explored across multiple disciplines with different, often quite novel, approaches. This survey explores the challenges inherent to the field and the methodological approaches researchers used to understand this space. We note that, in many cases, cybercrime research is more of an art than a science. We highlight the good practices and propose a list of recommendations for future cybercrime community scholars, including taking steps to verify and validate results, establishing privacy and ethical research practices, and mitigating the challenge of ground truth data. 
    more » « less
  2. There is a growing recognition of the need for interdisciplinarity in science, technology, engineering and mathematics (STEM) education. The purpose of the present study is to identify antecedents, processes, and outcomes of an interdisciplinary, collaborative conference and ongoing collaboration. The Breaking Boundaries in STEM education conference was developed with multiple goals, including fostering collaborative interdisciplinary scientific writing for publication among teacher-scholars who participated in one of three interdisciplinary working groups. One hundred teacher-scholars with interest in STEM education participated in the conference. A comparative study of three working groups from the conference was conducted using a triangulation of qualitative and quantitative methods. Surveys and behavioral observations were completed at the conference, and phone interviews with attendees were conducted 3-4 months later. Groups varied in their readiness to collaborate. Several themes emerged that might explain why one group was highly productive, one group was moderately productive, and one group was not productive at completing publications after the conference. Groups with a narrower disciplinary span, stronger leadership presence, a paper champion, motivated leader, and a leader with a strong recent history of publishing on the topic, were more ready to collaborate, and they experienced faster, smoother completion of publications. Further research and more passage of time, such as a few years, is needed to determine the quantity, quality, span of disciplinarity, novelty, and generativity of the publications over time. The generalizability of these themes to other interdisciplinary collaborative studies is briefly discussed. 
    more » « less
  3. Promoting Students Engaging In Scientific and Mathematical Interdisciplinary Collaborations (SEISMIC) requires careful thought. At Bridgewater State University, teams of SEISMIC Scholars are supported by an NSF S-STEM grant for low-income, academically talent STEM majors. SEISMIC Scholars engage throughout a three-year period in a series of humanities, social-science, service learning and STEM research courses that explicitly help Scholars frame their studies of Science and Mathematics as socially relevant and fundamentally interdisciplinary. This poster will report on the structure of the SEISMIC courses, providing examples of assignments and activities, all of which help to tie students together in a community that views Science as socially relevant and culturally informed. 
    more » « less
  4. This article synthesizes findings from an international virtual conference, funded by the United States National Science Foundation, focused on the home mathematics environment (HME). In light of inconsistencies and gaps in research investigating relations between the HME and children’s outcomes, the purpose of the conference was to discuss actionable steps and considerations for future work. The conference was composed of international researchers with a wide range of expertise and backgrounds. Presentations and discussions during the conference centered broadly on the need to better operationalize and measure the HME as a construct—focusing on issues related to child, family, and community factors, country and cultural factors, and the cognitive and affective characteristics of caregivers and children. Results of the conference and a subsequent writing workshop include a synthesis of core questions and key considerations for the field of research on the HME. Findings highlight the need for the field at large to use multi-method measurement approaches to capture nuances in the HME, and to do so with increased international and interdisciplinary collaboration, open science practices, and communication among scholars. 
    more » « less
  5. Online underground forums have been widely used by cybercriminals to trade the illicit products, resources and services, which have played a central role in the cybercrim-inal ecosystem. Unfortunately, due to the number of forums, their size, and the expertise required, it's infeasible to perform manual exploration to understand their behavioral processes. In this paper, we propose a novel framework named iDetector to automate the analysis of underground forums for the detection of cybercrime-suspected threads. In iDetector, to detect whether the given threads are cybercrime-suspected threads, we not only analyze the content in the threads, but also utilize the relations among threads, users, replies, and topics. To model this kind of rich semantic relationships (i.e., thread-user, thread-reply, thread-topic, reply-user and reply-topic relations), we introduce a structured heterogeneous information network (HIN) for representation, which is capable to be composed of different types of entities and relations. To capture the complex relationships (e.g., two threads are relevant if they were posted by the same user and discussed the same topic), we use a meta-structure based approach to characterize the semantic relatedness over threads. As different meta-structures depict the relatedness over threads at different views, we then build a classifier using Laplacian scores to aggregate different similarities formulated by different meta-structures to make predictions. To the best of our knowledge, this is the first work to use structural HIN to automate underground forum analysis. Comprehensive experiments on real data collections from underground forums (e.g., Hack Forums) are conducted to validate the effectiveness of our developed system iDetector in cybercrime-suspected thread detection by comparisons with other alternative methods. 
    more » « less