Cybercrime Observatory - Publications

Computer code
Title: Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime
Author(s):
  • Lennon Y.C. Chang
  • Peter Grabosky
  • Lena Y. Zhong
Date of publications: 2018
Publication type: Journal article

» further information

Gavel at a computer keyboard
Title: Cybercrime
Author(s):
  • Broadhurst, R.
Date of publications: 2017
Publication type: Book chapter

» further information

Iphone showing a green skull over green computer code
Title: Cybercrime and cyber security in ASEAN
Author(s):
  • Lennon Y.C. Chang
  • Liu, J.
  • Trevor, M.
  • Chang, L.
Date of publications: 2017
Publication type: Book chapter

» further information

Computer code with a magnifity glass held over to show spam mail
Title: Spam and Crime
Author(s):
  • Peter Drahos
  • Roderic Broadhurst
  • Mamoun Alazab
Date of publications: 2017
Publication type: Book chapter

» further information

Word access on an ipad with a person wearing gloves holding it
Title: The Governance of Cyberspace
Author(s):
  • Lennon Y.C. Chang
  • Peter Grabosky
  • Peter Drahos
Date of publications: 2017
Publication type: Book chapter

» further information

The meaning of phishing
Title: Gone Phishing: How to Avoid Getting Hooked
Author(s):
  • Nick Sifniotis
Date of publications: 2017
Publication type: Journal article

» further information

Computer code with a red lock on the screen
Title: Cyber Terrorism - Research Review: Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology
Author(s):
  • Roderic Broadhurst
  • Hannah Woodford-Smith
  • Donald Maxim
  • Bianca Sabol
  • Stephanie Orlando
  • Ben Chapman-Schmidt
  • Mamoun Alazab
Date of publications: 2017
Publication type: Report

» further information

Man in a hoody behind computer code
Title: What the underground market for ransomware looks like
Author(s):
  • Rod Broadhurst
Date of publications: 2017
Publication type: Opinion piece

» further information

computer code
Title: Spam and Criminal Activity
Author(s):
  • Alazab, M.; Broadhurst, R.
Date of publications: 2016
Publication type: Journal article

» further information

At symbol next to a gavel
Title: Online Child Exploitation Material – Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children’s eSafety Commissioner
Author(s):
  • Maxim, D., Orlando, S., Skinner, K. and Broadhurst, R.,
Date of publications: 2016
Publication type: Report

» further information

A lock
Title: Phishing and Spam: A Pilot Experiment
Author(s):
  • Broadhurst, R., Skinner, K., Sifniotis, N., Orlando, S., Max
Date of publications: 2016
Publication type: Report

» further information

Keyboard with a lock symbol on one of the buttons
Title: Internet Vigilantism: Attitudes and Experiences of University Students Toward Cyber Crowdsourcing in Hong Kong
Author(s):
  • Lennon Y.C. Chang
  • Ryan Poon
Date of publications: 2016
Publication type: Journal article

» further information

Cyber robber
Title: Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime
Author(s):
  • Lennon Y.C. Chang
  • Lena Y. Zhong
  • Peter Grabosky
Date of publications: 2016
Publication type: Journal article

» further information

A hand coming out of a secured cloud to stop another hand reaching for your credit card online
Title: Organizations and cybercrime: An analysis of the nature of groups engaged in cyber crime
Author(s):
  • Broadhurst, R., Grabosky, P., Alazab, M., and Chon, S.
Date of publications: 2014
Publication type: Journal article

» further information

malware computer code
Title: Hybrid Wrapper-Filter Approach for Malware Detection
Author(s):
  • Mamoun Alazab
  • Shamsul Huda
  • Jemal Abawajy
  • Rafiqul Islam
  • John Yearwood
  • Sitalakshmi Venkatraman
  • Roderic Broadhurst
Date of publications: 2014
Publication type: Journal article

» further information

Secured cloud over computer code
Title: Towards a feature rich model for predicting spam emails containing malicious attachments and urls
Author(s):
  • Mamoun Alazab
  • Roderic Broadhurst
  • KN Tran
Date of publications: 2013
Publication type: Conference Paper

» further information

Updated:  10 August 2017/Responsible Officer:  Director, RegNet/Page Contact:  Director, RegNet