Search Keywords
For a quick search in the Knowledge database below, please use the search box. Also, note that using one or more of the dropdown filters will optimise your search.
Watch this video to find out more about our Knowledge Database and the publications we have collected here for you: video
Knowledge Database
  • Coping After Terrorism for Survivors

    FBI | Published in 2019
    The information in this handbook is intended to help you understand reactions to an act of terrorism or mass violence. You may or may not experience these reactions. This handbook is not intended to be a substitute for the role of professionals with expertise in counseling trauma victims.
    Keywords: self-help, support, terrorism, trauma, victimisation
  • The challenges of countering human trafficking in the digital era

    Europol | Published in 2020
    Modern communication technologies – namely the internet, social media and mobile applications – have significantly impacted the way in which organised crime groups involved in international trafficking in human beings (THB) operate. Technology has broadened criminals’ ability to traffic human beings for different types of exploitation (including sexual and labour exploitation, the removal of organs, illegal adoption of children and forced marriages).
    Keywords: cybercrime, human trafficking
  • Mapping study on cyberviolence

    Council of Europe | Published in 2018
    While cyberviolence may be targeted at any individual or group and may entail a wide range of acts, this mapping study focuses in particular on children and women, who are often the victims of cyberviolence. The experience and solutions with regard to these victims should modus modendi be applicable to other categories of victims while taking into account the specificities of violence against different categories of victims. The present study is thus aimed at: mapping acts that constitute cyberviolence and drawing conclusions as to typologies and concepts; providing examples of national experiences and responses to such acts (including policies, strategies, legislation, cases and case law); discussing international responses under the Budapest Convention and other treaties (in particular the Istanbul and Lanzarote Conventions of the Council of Europe); developing recommendations as to the further course of action.
    Keywords: children, cybercrime, gender based violence, victimisation, violence
  • Research agenda: The human factor in cybercrime and cybersecurity

    E. Rutger Leukfeldt | Published in 2017
    The aim of this research agenda is to stimulate research on the human factor in cybercrime and cybersecurity. The agenda provides the state-of-the-art of research on the role of the human factor in this field. In addition, examples are given of important research questions and innovative methods and datasets that are needed for future studies. This agenda can be seen as a foundation for further thought with disciplines, inside and outside the social sciences, about how these topics and questions can best be answered.
    Keywords: cross-border crime, cybercrime, victimisation
  • ECSO Barometer 2020: “Cybersecurity in light of COVID-19”

    ECSO | Published in 2020
    From March to May 2020, the European Cyber Security Organisation (ECSO) conducted surveys with its members and the cybersecurity community (large companies, RTO’s/universities, regions/clusters, SME’s, public administrations, EU institutions/agencies, users/operators, and associations) in order to better understand the impact of the COVID-19 pandemic on the activity of cybersecurity stakeholders during the crisis period, as well as their expected challenges post-crisis.
    Keywords: covid, cybercrime, security, victimisation
  • Cross-border Access to E-Evidence: Framing the Evidence

    Gloria González Fuster, Sergi Vázquez Maymir | Published in 2020
    This paper aims at situating the policy discourse accompanying current European Union (EU) initiatives on facilitating access by public authorities to data held by private companies, including in scenarios regarded as crossing jurisdictional borders. More concretely, it contextualises these initiatives in light of the absence of publicly available statistical information on some of the issues which are at the very core of these matters.
    Keywords: cross-border crime, cybercrime, justice
  • Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis

    Eric Rutger Leukfeldt, Majid Yar | Published in 2016
    The central question of this article is whether routine activity theory (RAT) can be used as an analytical framework to study cybercrimes. Both a theoretical analysis and an analysis of empirical studies have thus far failed to provide a clear answer. The multivariate analysis presented in this article tries to avoid some of the limitations of other RAT-based studies. Based on a large sample (N = 9,161), the effects of value, visibility, accessibility, and guardianship on victimization of six cybercrimes have been studied. Analysis shows some RAT elements are more applicable than others. Visibility clearly plays a role within cybercrime victimization. Accessibility and personal capable guardianship show varying results. Value and technical capable guardianship show almost no effects on cybercrime victimization.
    Keywords: cybercrime, prevention, victimisation
  • Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization

    E. Rutger Leukfeldt | Published in 2014
    This article investigates phishing victims, especially the increased or decreased risk of victimization, using data from a cybercrime victim survey in the Netherlands (n = 10,316). Routine activity theory provides the theoretical perspective. According to routine activity theory, several factors influence the risk of victimization. A multivariate analysis was conducted to assess which factors actually lead to increased risk of victimization. The model included background and financial data of victims, their Internet activities, and the degree to which they were ‘‘digitally accessible’’ to an offender. The analysis showed that personal background and financial characteristics play no role in phishing victimization. Among eight Internet activities, only ‘‘targeted browsing’’ led to increased risk. As for accessibility, using popular operating systems and web browsers does not lead to greater risk, while having up-to-date antivirus software as a technically capable guardian has no effect. The analysis showed no one, clearly defined group has an increased chance of becoming a victim. Target hardening may help, but opportunities for prevention campaigns aimed at a specific target group or dangerous online activities are limited. Therefore, situational crime prevention will have to come from a different angle.
    Keywords: cybercrime, victimisation
  • Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap

    Marleen Weulen Kranenbarg, Thomas J. Holt, Jean-Louis van Gelder | Published in 2017
    Cybercrime research suggests that, analogous to traditional crime, victims are more likely to be offenders. This overlap could be caused by shared risk factors, but it is unclear if these are comparable to traditional risk factors. Utilizing a high risk sample of computer-dependent cyber-offenders and traditional offenders (N = 535) we compare victimization, offending, and victimization-offending between cybercrime and traditional crime. Cybercrime results show a considerable victim-offender overlap and correlates like low self-control and routine activities partly explain differences in victimization, offending, and victimization-offending. Some cybercrime correlates are related to the digital context, but show similar patterns for cybercrime and traditional crime.
    Keywords: cybercrime, trauma, victimisation
  • EU Kids Online 2020

    Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., Ólafsson, K., Livingstone, S., and Hasebrink, U. | Published in 2020
    This report presents the findings from a survey of children aged 9–16 from 19 European countries. The data were collected between autumn 2017 and summer 2019 from 25,101 children by national teams from the EU Kids Online network. A theoretical model and a common methodology to guide this work was developed during four phases of the network’s work, and is discussed at the outset of this report. The main findings from the key topic areas are summarised, which correspond to the factors identified in the theoretical model: Access, Practices and skills, Risks and opportunities, and Social context.
    Keywords: children, cybercrime, data protection

Subscribe to Our Newsletter


© 2024 VSE, All Rights Reserved