skip to main content

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 11:00 PM ET on Friday, December 13 until 2:00 AM ET on Saturday, December 14 due to maintenance. We apologize for the inconvenience.


Search for: All records

Award ID contains: 1723635

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Jaishankar, K. (Ed.)
    Compared to other topics, cybercrime is a relatively new addition to the criminological literature. interest in the topic has grown over the past decade, with a handful of scholars leading efforts to generate empirical understanding about the topic. Common conclusions reached in these studies are that more research is needed, cybercrime is interdisciplinary in nature, and cybercrime should be addressed as an international problem. In this study, we examine a sample of 593 prior cybercrime scholarly articles to identify the types of research strategies used in them, the patterns guiding those strategies, whether the research is interdisciplinary, and the degree to which scholars engage in international cybercrime studies. Attention is also given to co-authorship as well as citation patterns. Implications for future research are provided. 
    more » « less
  2. Wu, Hongyi (Ed.)
    The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discussions of some challenges we encountered with each practice. Recommendations for other cybersecurity programs seeking to expand the use of high impact practices are provided. 
    more » « less
  3. The study of white-collar crime has evolved over the past eight decades. So too has the nature of white-collar crime. Varieties of white-collar crime have changed as the types of occupations evolved. One change in the occupational arena that has likely impacted white-collar crime involves technological changes. In particular, with the advent of the computer, new opportunities for crime have developed within the workplace and outside of it. Few studies, however, have explored cybercrime within a white-collar crime framework. To address this void in the literature, in this study, a sample of 109 cases investigated by the U.S. Department of Justice are reviewed in order to determine how these cybercrimes can be characterized as white-collar crimes. 
    more » « less
  4. The study of cyber security is an interdisciplinary pursuit that includes STEM disciplines as well as the social sciences. While research on cyber security appears to be central in STEM disciplines, it is not yet clear how central cyber security and cyber crime is to criminal justice scholarship. In order to examine the connections between cyber security and criminal justice, in this study attention is given to the way that criminal justice scholars have embraced cyber crime research and coursework. Results show that while there are a number of cyber crime courses included in criminal justice majors there are not a large number of cyber crime research studies incorporated in mainstream criminal justice journals. ________________________________________________________________________ 
    more » « less