Cybercrime has been the focus of public attention during the last decade. However, within the criminological field, no prior research initiatives have been launched in an effort to better understand this phenomenon using computer network data. Addressing this challenge, we employ the classical routine-activities and lifestyle perspective to raise hypotheses regarding the trends and origin of computer-focused crime incidents (i.e. computer exploits, port scans, and Denial of Service (DoS) attacks) against a large university computer network. We first propose that computer-focused crimes against a university network are determined by the university users’ daily activity patterns. In addition, we hypothesize that the social composition of the ...
AbstractModern computer networks generate significant volume of behavioural system logs on a daily b...
Abstract Over the past few years, a relatively new computingphenomenon has gained momentum: the spre...
Academic institutions house enormous amounts of critical information from social security numbers of...
Cybercrime has been the focus of public attention during the last decade. However, within the crimin...
We study the influence of daily routines of Dutch academic institutions on the number of DDoS attack...
Prior research on cybercrime victimization has generally emphasized the linkage between the frequenc...
Computer crimes are a major problem for today\u27s society. This thesis ascertains the extent and di...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
This study tests the assumptions of the routine activity theory on three online forms of victimizati...
Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for...
The threat of attacks enabled by malicious software, or programs used to compromise computer systems...
Although cybercrime has rapidly evolved and become a significant criminological issue, research reve...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Network intrusions have been active topic for researches for many years. However, in order to gain i...
The facilities of computer technology have not come out without drawbacks. Even though it makes the ...
AbstractModern computer networks generate significant volume of behavioural system logs on a daily b...
Abstract Over the past few years, a relatively new computingphenomenon has gained momentum: the spre...
Academic institutions house enormous amounts of critical information from social security numbers of...
Cybercrime has been the focus of public attention during the last decade. However, within the crimin...
We study the influence of daily routines of Dutch academic institutions on the number of DDoS attack...
Prior research on cybercrime victimization has generally emphasized the linkage between the frequenc...
Computer crimes are a major problem for today\u27s society. This thesis ascertains the extent and di...
We employ knowledge regarding the early phases of system trespassing events and develop a contextrel...
This study tests the assumptions of the routine activity theory on three online forms of victimizati...
Malicious software, such as viruses and Trojan horse programs, can automate a variety of attacks for...
The threat of attacks enabled by malicious software, or programs used to compromise computer systems...
Although cybercrime has rapidly evolved and become a significant criminological issue, research reve...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Network intrusions have been active topic for researches for many years. However, in order to gain i...
The facilities of computer technology have not come out without drawbacks. Even though it makes the ...
AbstractModern computer networks generate significant volume of behavioural system logs on a daily b...
Abstract Over the past few years, a relatively new computingphenomenon has gained momentum: the spre...
Academic institutions house enormous amounts of critical information from social security numbers of...