Abstract
This chapter draws together the key empirical strands that have emerged throughout the preceding chapters and explicates the practical dimensions of this work. It acknowledges first that there has been very little research evaluating the effects of crime prevention initiatives on cybercrime. It then outlines ways in which this gap can be addressed in the future, and some of the issues that both researchers and practitioners will need to be aware of when it comes to implementing and evaluating cybercrime interventions. This chapter concludes by offering a number of recommendations for practitioners and researchers seeking to evaluate cybercrime interventions in the future.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We acknowledge that elsewhere, less methodologically robust studies have also examined the merits of other SCP approaches within cybercrime contexts, including the use of firewalls and passwords , vulnerability patching , police crackdowns, intrusion detection and prevention systems , honeypots , audit trails , website takedowns , fraud detection systems , and spam filtering (see further Chapter 2).
References
Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology and criminal justice (6th ed.). Los Angeles, CA: Sage.
Ball, M., Broadhurst, R., Niven, A., & Trivedi, H. (2019). Data capture and analysis of darknet markets. Retrieved from https://ssrn.com/abstract=3344936; http://dx.doi.org/10.2139/ssrn.3344936.
Baruch, Y., & Holtom, B. C. (2008). Survey response rate levels and trends in organizational research. Human Relations, 61(8), 1139–1160. https://doi.org/10.1177/0018726708094863.
Becker, H. (1963). Outsiders. New York, NY: Free Press.
Bleakley, P. (2018). Watching the watchers: Taskforce Argos and the evidentiary issues involved with infiltrating Dark Web child exploitation networks. The Police Journal: Theory, Practice and Principles, 1–16. https://doi.org/10.1177/0032258X18801409.
Champion, M. (2017, May 13). This is what it’s like to be wrongly accused of being a paedophile because of a typo by police. BuzzFeed News. Retrieved from https://www.buzzfeed.com/matthewchampion/this-mans-life-was-destroyed-by-a-police-typo. Accessed 20 July 2019.
Christin, N. (2013, May 13–17). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In WWW ’13 Proceedings of the 22nd International Conference on World Wide Web. New York, NY: ACM. https://doi.org/10.1145/2488388.2488408.
Clark, T. (2008). ‘We’re over-researched here!’: Exploring accounts of research fatigue within qualitative research engagements. Sociology, 42(5), 953–970. https://doi.org/10.1177/0038038508094573.
Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory.
Cohen, J. (1992). A power primer. Quantitative Methods in Psychology, 112(1), 155–159. https://doi.org/10.1037/0033-2909.112.1.155.
Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Boston, MA: Houghton Mifflin.
Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime, 2, 122–141.
Dossetor, K. (2011). Cost-benefit analysis and its application to crime prevention and criminal justice research (Technical and Background Paper Series No. 42). Canberra, Australia: Australian Institute of Criminology.
Ekblom, P., & Pease, K. (1995). Evaluating crime prevention. Crime and Justice, 19, 585–662. https://doi.org/10.1086/449238.
Farrington, D. P. (2003). Methodological quality standards for evaluation research. The ANNALS of the American Academy of Political and Social Science, 587(1), 49–68. https://doi.org/10.1177/0002716202250789.
Farrington, D. P., Gottfredson, D. C., Sherman, L. W., & Welsh, B. C. (2002). The Maryland Scientific Methods Scale. In L. W. Sherman, D. P. Farrington, B. C. Welsh, & D. L. MacKenzie (Eds.), Evidence-based crime prevention (pp. 13–21). London, UK: Routledge. https://doi.org/10.4324/9780203166697_chapter_2.
Farrington, D. P., & Welsh, B. C. (2005). Randomized experiments in criminology: What have we learned in the last two decades? Journal of Experimental Criminology, 1(1), 9–38. https://doi.org/10.1007/s11292-004-6460-0.
Faust, K., & Tita, G. (2019). Social networks and crime: Pitfalls and promises for advancing the field. Annual Review of Criminology, 2(1), 99–122. https://doi.org/10.1146/annurev-criminol-011518-024701.
Florêncio, D., & Herley, C. (2013). Sex, lies and cyber-crime surveys. In B. Schneier (Ed.), Economics of information security and privacy III (pp. 35–53). New York, NY: Springer. https://doi.org/10.1007/978-1-4614-1981-5_3.
Gideon, L. (Ed.). (2012). Handbook of survey methodology for the social sciences. New York, NY: Springer-Verlag. https://doi.org/10.1007/978-1-4614-3876-2.
Glenny, M. (2011). DarkMarket: Cyberthieves, cybercops and you. London, UK: The Brodley Head.
Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112–130. https://doi.org/10.1177/1362480614538645.
Grabosky, P. N. (1996). Unintended consequences of crime prevention. Crime Prevention Studies, 5, 25–56.
Green, G. S. (1985). General deterrence and television cable crime: A field experiment in social control. Criminology, 23(4), 629–645. https://doi.org/10.1111/j.1745-9125.1985.tb00367.x.
Hancock, L. (1978). Police discretion in Victoria. The Australian and New Zealand Journal of Sociology, 14(1), 33–40. https://doi.org/10.1177/144078337801400113.
Holt, T. J., Brewer, R., & Goldsmith, A. (2018). Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behavior, 1–13. https://doi.org/10.1080/01639625.2018.1472927.
Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of initiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online: Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline Academic Press.
Hutchings, A. (2019). Cambridge Computer Crime Database. Retrieved from http://www.cl.cam.ac.uk/~ah793/cccd.html. Accessed 2 January 2018.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163–1178. https://doi.org/10.1080/01639625.2016.1169829.
Hutchings, A., Clayton, R., & Anderson, R. (2016, June 1–3). Taking down websites to prevent crime. In 2016 APWG Symposium on Electronic Crime Research (eCrime). IEE. https://doi.org/10.1109/eCRIME.2016.7487947.
Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption and intervention approaches. Global Crime, 18(1), 11–30. https://doi.org/10.1080/17440572.2016.1197123.
Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal of Qualitative Criminal Justice & Criminology, 7(1), 75–94.
Ioannidis, J. P. (2005). Why most published research findings are false. PLoS Med. 2, e124. https://doi.org/10.1371/journal.pmed.0020124.
King, M. (2001). A point of minimal important difference (MID): A critique of terminology and methods. Expert Review of Pharmacoeconomics and Outcomes Research, 11(2), 171–184. https://doi.org/10.1586/erp.11.9.
Kleinman, P. H., & Lukoff, I. F. (1981). Official crime data. Criminology, 19(3), 449–454. https://doi.org/10.1111/j.1745-9125.1981.tb00429.x.
Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder using civil remedies: Results from a randomized field experiment in Oakland, California. Crime Prevention Studies, 9, 141–159.
McCord, J. (2003). Cures that harm: Unanticipated outcomes of crime prevention programs. The ANNALS of the American Academy of Political and Social Science, 587(1), 16–30. https://doi.org/10.1177/0002716202250781.
Moore, T., & Clayton, R. (2011). Ethical dilemmas in take-down research. In G. Danezis, S. Dietrich, & K. Sako (Eds.), Financial cryptography and data security workshop. FC 2011 (Lecture Notes in Computer Science, Vol. 7126, pp. 154–168). Berlin, Germany: Springer. https://doi.org/10.1007/978-3-642-29889-9_14.
Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27). CrimeBB: Enabling cybercrime research on underground forums at scale. In WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–1854). ACM. https://doi.org/10.1145/3178876.3186178.
Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and Justice Bulletin, 175, 1–12.
Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences attendees: Their autism-spectrum quotient (AQ) scores and self-reported adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 144–169). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.ch008.
Shaw, I., Greene, J., & Mark, M. (Eds.). (2006). The Sage handbook of evaluation. London, UK: Sage. https://doi.org/10.4135/9781848608078.n11.
Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dangerous knowledge? Law and Contemporary Problems, 47(4), 61–81.
Sherman, L. W. (1993). Defiance, deterrence, and irrelevance: A theory of the criminal sanction. Journal of Research in Crime and Delinquency, 30(4), 445–473. https://doi.org/10.1177/0022427893030004006.
Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., & Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s promising. In National Institute of Justice: Research in brief. Washington, DC: U.S. Department of Justice.
Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn, E. G., et al. (1992). The variable effects of arrest on criminal careers: The Milwaukee domestic violence experiment. The Journal of Criminal Law and Criminology, 83, 137–169. https://doi.org/10.2307/1143827.
Simons, H. (2006). Ethics in evaluation. In I. Shaw, J. Greene, & M. Mark (Eds.), The Sage handbook of evaluation (pp. 243–265). London, UK: Sage. https://doi.org/10.4135/9781848608078.n11.
Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial. Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/cbo9780511481604.
Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia: Australian Institute of Criminology.
Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX.
Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing information systems security: Critical success factors and indicators to measure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis (Eds.), Information security. ISC 2006 (Lecture Notes in Computer Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://doi.org/10.1007/11836810_38.
Weisburd, D. (2003). Ethical practice and evaluation of interventions in crime and justice: The moral imperative for randomized trials. Evaluation Review, 27(3), 336–354. https://doi.org/10.1177/0193841X03027003007.
Welsh, B. C., & Farrington, D. P. (2001). Toward an evidence-based approach to preventing crime. The ANNALS of the American Academy of Political and Social Science, 578(1), 158–173. https://doi.org/10.1177/000271620157800110.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Brewer, R., de Vel-Palumbo, M., Hutchings, A., Holt, T., Goldsmith, A., Maimon, D. (2019). Designing and Evaluating Crime Prevention Solutions for the Digital Age. In: Cybercrime Prevention. Crime Prevention and Security Management. Palgrave Pivot, Cham. https://doi.org/10.1007/978-3-030-31069-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-31069-1_9
Published:
Publisher Name: Palgrave Pivot, Cham
Print ISBN: 978-3-030-31068-4
Online ISBN: 978-3-030-31069-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)