SlideShare a Scribd company logo
1 of 7
Cybercrime
Understanding the Offender,
Victim, and Managers
Thomas J. Holt
Associate Professor
School of Criminal Justice
holtt@msu.edu
517-353-9563
Criminological Theories and
Cybercrime
Offender Data From Online Sources
Understanding Victimization
• Surveys are primary vehicle to understand
victimization correlates:
– Machine-based protective software fail to predict
victimization
– Individual deviance and self control matter
– Peer behavior is also significant to increase
proximity to offenders
• Collaboration is key to expand our knowledge,
linking mass machine collected data with
survey responses
Place Managers and Responders
How Do We Get There?
• Collaboration is the most important answer
– Interdisciplinary data collection and analysis
– Tool development, mass data collection, assessment
of first responders
• Developing a common language across all fields:
– MSU Interdisciplinary Conference on Cybercrime-
March 17, 18th, 2016
• Education is a huge component
– CJ445, CJ/CSE 429, CJ490- Topics: Digital Forensics
How Do We Get There?
• Collaboration is the most important answer
– Interdisciplinary data collection and analysis
– Tool development, mass data collection, assessment
of first responders
• Developing a common language across all fields:
– MSU Interdisciplinary Conference on Cybercrime-
March 17, 18th, 2016
• Education is a huge component
– CJ445, CJ/CSE 429, CJ490- Topics: Digital Forensics

More Related Content

What's hot

SLA Silicon Valley 2013 Altmetrics
SLA Silicon Valley 2013 AltmetricsSLA Silicon Valley 2013 Altmetrics
SLA Silicon Valley 2013 AltmetricsWilliam Gunn
 
Interdisciplinary IT Security
Interdisciplinary IT SecurityInterdisciplinary IT Security
Interdisciplinary IT Securityashiyan
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer TechniquesFrederick Lane
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
Opportunities beyond electronic resource management: An extension of the Core...
Opportunities beyond electronic resource management: An extension of the Core...Opportunities beyond electronic resource management: An extension of the Core...
Opportunities beyond electronic resource management: An extension of the Core...NASIG
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 yearsAl Imran, CISA
 
Developing your research question
Developing your research questionDeveloping your research question
Developing your research questionJenine Beekhuyzen
 
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...Cybera Inc.
 
Finding Knowledge: Assessing Knowledge in the Age of Search
Finding Knowledge: Assessing Knowledge in the Age of SearchFinding Knowledge: Assessing Knowledge in the Age of Search
Finding Knowledge: Assessing Knowledge in the Age of SearchSimon Knight
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 

What's hot (11)

SLA Silicon Valley 2013 Altmetrics
SLA Silicon Valley 2013 AltmetricsSLA Silicon Valley 2013 Altmetrics
SLA Silicon Valley 2013 Altmetrics
 
Interdisciplinary IT Security
Interdisciplinary IT SecurityInterdisciplinary IT Security
Interdisciplinary IT Security
 
Forensic Computer Techniques
Forensic Computer TechniquesForensic Computer Techniques
Forensic Computer Techniques
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
Resume
ResumeResume
Resume
 
Opportunities beyond electronic resource management: An extension of the Core...
Opportunities beyond electronic resource management: An extension of the Core...Opportunities beyond electronic resource management: An extension of the Core...
Opportunities beyond electronic resource management: An extension of the Core...
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 years
 
Developing your research question
Developing your research questionDeveloping your research question
Developing your research question
 
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...
Cyber Summit 2014 - An Open Data Initiative: A general overview and learning ...
 
Finding Knowledge: Assessing Knowledge in the Age of Search
Finding Knowledge: Assessing Knowledge in the Age of SearchFinding Knowledge: Assessing Knowledge in the Age of Search
Finding Knowledge: Assessing Knowledge in the Age of Search
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 

Similar to Cybercrime: Understanding the Offender, Victim and Managers

The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Trackerdealy14
 
The bully tracker final
The bully tracker finalThe bully tracker final
The bully tracker finalCMchambers
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data SciencePhilip Bourne
 
Potential vulnerabilities to e-learning - Mimecast
Potential vulnerabilities to e-learning - MimecastPotential vulnerabilities to e-learning - Mimecast
Potential vulnerabilities to e-learning - MimecastJisc
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...Ansgar Koene
 
Countering Electoral Interference
Countering Electoral InterferenceCountering Electoral Interference
Countering Electoral InterferenceOECD Governance
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Marten den Haring
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramTyrone Grandison
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurityJisc
 
Digital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyDigital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyIna Smith
 
Mainstreaming information literacy: analysing Educational Preventing Violent ...
Mainstreaming information literacy: analysing Educational Preventing Violent ...Mainstreaming information literacy: analysing Educational Preventing Violent ...
Mainstreaming information literacy: analysing Educational Preventing Violent ...IL Group (CILIP Information Literacy Group)
 
The UVA School of Data Science
The UVA School of Data ScienceThe UVA School of Data Science
The UVA School of Data SciencePhilip Bourne
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docxAliAgral2
 

Similar to Cybercrime: Understanding the Offender, Victim and Managers (20)

The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Tracker
 
The bully tracker final
The bully tracker finalThe bully tracker final
The bully tracker final
 
UVA School of Data Science
UVA School of Data ScienceUVA School of Data Science
UVA School of Data Science
 
Potential vulnerabilities to e-learning - Mimecast
Potential vulnerabilities to e-learning - MimecastPotential vulnerabilities to e-learning - Mimecast
Potential vulnerabilities to e-learning - Mimecast
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Countering Electoral Interference
Countering Electoral InterferenceCountering Electoral Interference
Countering Electoral Interference
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Creating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity ProgramCreating A Diverse CyberSecurity Program
Creating A Diverse CyberSecurity Program
 
Communicating cybersecurity
Communicating cybersecurityCommunicating cybersecurity
Communicating cybersecurity
 
Digital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyDigital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media Literacy
 
Mainstreaming information literacy: analysing Educational Preventing Violent ...
Mainstreaming information literacy: analysing Educational Preventing Violent ...Mainstreaming information literacy: analysing Educational Preventing Violent ...
Mainstreaming information literacy: analysing Educational Preventing Violent ...
 
The UVA School of Data Science
The UVA School of Data ScienceThe UVA School of Data Science
The UVA School of Data Science
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
 

More from Michigan State University Research

Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Michigan State University Research
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Michigan State University Research
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Michigan State University Research
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University Research
 

More from Michigan State University Research (20)

NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617NFRO interdisciplinary international 081617
NFRO interdisciplinary international 081617
 
Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017Web accessible nfro 2017 as of 08152017
Web accessible nfro 2017 as of 08152017
 
SmartAg/Food Engineering Overview
SmartAg/Food Engineering OverviewSmartAg/Food Engineering Overview
SmartAg/Food Engineering Overview
 
The Internet of Plants
The Internet of PlantsThe Internet of Plants
The Internet of Plants
 
Digital Agriculture
Digital AgricultureDigital Agriculture
Digital Agriculture
 
A New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for DiabetesA New Magnetic Resononance Imaging Biomarker for Diabetes
A New Magnetic Resononance Imaging Biomarker for Diabetes
 
MSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing FacilityMSU Transgenic and Genome Editing Facility
MSU Transgenic and Genome Editing Facility
 
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...Intelligent and Automatic In vivo Detection and Quantification of Transplante...
Intelligent and Automatic In vivo Detection and Quantification of Transplante...
 
Re-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KCRe-budgeting & Report Tracking in KC
Re-budgeting & Report Tracking in KC
 
Budget Development in KC
Budget Development in KCBudget Development in KC
Budget Development in KC
 
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
Submitting and Editing Proposals and Tracking Proposal Activity and COI Compl...
 
Proposal Development in KC
Proposal Development in KCProposal Development in KC
Proposal Development in KC
 
Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16Thomas D. Gregory 9 14-16
Thomas D. Gregory 9 14-16
 
Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16Taking an ancient path towards artificial intelligence 10-12-16
Taking an ancient path towards artificial intelligence 10-12-16
 
Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16Michigan State University coffee break: building a budget 10-20-16
Michigan State University coffee break: building a budget 10-20-16
 
Domicology: Changing the CEM Paradigm
Domicology: Changing the CEM ParadigmDomicology: Changing the CEM Paradigm
Domicology: Changing the CEM Paradigm
 
Removal of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.DemolitionRemoval of Abandoned Properties Deconstruction vs.Demolition
Removal of Abandoned Properties Deconstruction vs.Demolition
 
Advancing the Science of Domicology
Advancing the Science of DomicologyAdvancing the Science of Domicology
Advancing the Science of Domicology
 
Advancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable ConstructionAdvancing Domicology for Sustainable Construction
Advancing Domicology for Sustainable Construction
 
Harnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for BioenergyHarnessing Microbe-Electrode Interactions for Bioenergy
Harnessing Microbe-Electrode Interactions for Bioenergy
 

Recently uploaded

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 

Recently uploaded (20)

Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 

Cybercrime: Understanding the Offender, Victim and Managers

  • 1. Cybercrime Understanding the Offender, Victim, and Managers Thomas J. Holt Associate Professor School of Criminal Justice holtt@msu.edu 517-353-9563
  • 3. Offender Data From Online Sources
  • 4. Understanding Victimization • Surveys are primary vehicle to understand victimization correlates: – Machine-based protective software fail to predict victimization – Individual deviance and self control matter – Peer behavior is also significant to increase proximity to offenders • Collaboration is key to expand our knowledge, linking mass machine collected data with survey responses
  • 5. Place Managers and Responders
  • 6. How Do We Get There? • Collaboration is the most important answer – Interdisciplinary data collection and analysis – Tool development, mass data collection, assessment of first responders • Developing a common language across all fields: – MSU Interdisciplinary Conference on Cybercrime- March 17, 18th, 2016 • Education is a huge component – CJ445, CJ/CSE 429, CJ490- Topics: Digital Forensics
  • 7. How Do We Get There? • Collaboration is the most important answer – Interdisciplinary data collection and analysis – Tool development, mass data collection, assessment of first responders • Developing a common language across all fields: – MSU Interdisciplinary Conference on Cybercrime- March 17, 18th, 2016 • Education is a huge component – CJ445, CJ/CSE 429, CJ490- Topics: Digital Forensics