cyber crime

Cybercrime

Gavel at a computer keyboard

Author/s (editor/s):

Broadhurst, R.

Publication year:

2017

Publication type:

Book chapter

Find this publication at:
The Palgrave Handbook of Australian and New Zealand Criminology, Crime, and Justice,

Broadhurst, R. (2017): “Cybercrime”, in A. Deckert & R. Sarre (Eds.), The Palgrave Handbook of Australian and New Zealand Criminology, Crime, and Justice, Palgrave McMillan: Chapter 15.

What the underground market for ransomware looks like

Man in a hoody behind computer code

Author/s (editor/s):

Rod Broadhurst

Publication year:

2017

Publication type:

Opinion piece

Find this publication at:
What the underground market for ransomware looks like

Broadhurst, R. (May 16 2017): “What the underground market for ransomware looks like”, The Conversation.

Online Child Exploitation Material – Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children’s eSafety Commissioner

At symbol next to a gavel

Author/s (editor/s):

Maxim, D., Orlando, S., Skinner, K. and Broadhurst, R.,

Publication year:

2016

Publication type:

Report

Find this publication at:
Online Child Exploitation Material – Trends and Emerging Issues: Research Report of the Australian National University Cybercri

Maxim, D., Orlando, S., Skinner, K. and Broadhurst, R., (November 4, 2016): Online Child Exploitation Material – Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children’s eSafety Commissioner, Canberra, ACT: The Australian National University.

Phishing and Spam: A Pilot Experiment

A lock

Author/s (editor/s):

Broadhurst, R., Skinner, K., Sifniotis, N., Orlando, S., Max

Publication year:

2016

Publication type:

Report

Find this publication at:
Phishing and Spam: A Pilot Experiment

Broadhurst, R., Skinner, K., Sifniotis, N., Orlando, S., Maxim, D. and Ougrinovski, G., (2016). Phishing and Spam: A Pilot Experiment. Canberra, ACT: The Australian National University.

Organizations and cybercrime: An analysis of the nature of groups engaged in cyber crime

A hand coming out of a secured cloud to stop another hand reaching for your credit card online

Author/s (editor/s):

Broadhurst, R., Grabosky, P., Alazab, M., and Chon, S.

Publication year:

2014

Publication type:

Journal article

Find this publication at:
Organizations and cybercrime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M., and Chon, S., (2014). “Organizations and cybercrime: An analysis of the nature of groups engaged in cyber crime”, International Journal of Cyber Criminology, Vol 8 (1), pp 1-20.

Towards a feature rich model for predicting spam emails containing malicious attachments and urls

Secured cloud over computer code

Author/s (editor/s):

Mamoun Alazab
Roderic Broadhurst
KN Tran

Publication year:

2013

Publication type:

Conference Paper

Find this publication at:
Towards a feature rich model for predicting spam emails containing malicious attachments and urls

KN Tran, M Alazab, R Broadhurst: “Towards a feature rich model for predicting spam emails containing malicious attachments and urls”, Australasian Data Mining Conference Canberra, ACT, 2013. https://scholar.google.com.au/citations?view_op=view_citation&hl=en&user...

Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime

Computer code

Author/s (editor/s):

Lennon Y.C. Chang
Peter Grabosky
Lena Y. Zhong

Publication year:

2018

Publication type:

Journal article

Chang, LYC., Zhong, YL., Grabosky, P. (forthcoming). “Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime”, Regulation & Governance. (DOI: 10.1111/rego.12125)

Cybercrime and cyber security in ASEAN

Iphone showing a green skull over green computer code

Author/s (editor/s):

Lennon Y.C. Chang
Liu, J.
Trevor, M.
Chang, L.

Publication year:

2017

Publication type:

Book chapter

Find this publication at:
Cybercime and cyber security in ASEAN

Lennon Y.C Chang (2017): “Cybercrime and cyber security in ASEAN”, in Liu, J., Tevor, M. and Chang, L. (eds) Comparative Criminology in Asia, Chapter 10. New York: Springer. (in Press)

Spam and Crime

Computer code with a magnifity glass held over to show spam mail

Author/s (editor/s):

Peter Drahos
Roderic Broadhurst
Mamoun Alazab

Publication year:

2017

Publication type:

Book chapter

Find this publication at:
Regulatory Theory: Spam and Crime

Broadhurst, R. and Alazab, M., (2017): “Spam and Crime”, in Drahos, P (ed) Regulatory Theory: Foundations and Applications, Canberra: ANU Press, pp 517-532.

Pages

Updated:  10 August 2017/Responsible Officer:  Director, RegNet/Page Contact:  Director, RegNet