Follow

Articles from 2021

PDF

Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment, Daren Fisher, David Maimon, and Tamar Berenblum

PDF

Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks, Dhara Shah, T. G. Harrison, Christopher B. Freas, David Maimon, and Robert W. Harrison

Articles from 2020

PDF

Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks, Maryam Jalalitabar, Marco Valero, and Anu G. Bourgeois

PDF

Attacking and securing beacon-enabled 802.15.4 networks, Sang Shin Jung, Marco Valero, Anu G. Bourgeois, and Raheem Beyah

PDF

Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature, David Maimon

PDF

Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors, David Maimon, C. Jordan Howell, Scott Jacques, and Robert Perkins

PDF

The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, and Scott Jacques

Articles from 2019

PDF

Digital First: The Ontological Reversal and New Challenges for IS Research, Richard L. Baskerville, Michael D. Myers, and Youngjin Yoo

PDF

Website Defacement and Routine Activities: Considering the Importance of Hackers’ Valuations of Potential Targets, C. Jordan Howell, George W. Burruss, David Maimon, and Shradha Sahani

Link

Cyber-Dependent Crimes: An Interdisciplinary Review, David Maimon and Eric L. Louderback

PDF

Online Deception and Situations Conducive to the Progression of Non-Payment Fraud, David Maimon, Mateus Rennó Santos, and Youngsam Park

Articles from 2018

PDF

Continuous Restricted Boltzmann Machines, Robert W. Harrison

Articles from 2017

Link

Illegal Roaming and File Manipulation on Target Computers: Assessing the Effect of Sanction Threats on System Trespassers’ Online Behaviors, Alexander Testa, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2016

PDF

Learning from the Offenders' Perspective on Crime Prevention, Scott Jacques and Elizabeth Bonomo

Articles from 2015

Link

On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, David Maimon, Theodore Wilson, Wuling Ren, and Tamar Berenblum

Link

The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace, Theodore Wilson, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2013

Link

Daily Trends and Origin of Computer-Focused Crimes against a Large University Computer Network: An Application of the Routine-Activities and Lifestyle Perspective, David Maimon, Amy Kamerdze, Michel Cukier, and Bertrand Sobesto

Link

Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System, David Maimon, Bertrand Sobesto, and Michel Cukier

Articles from 2012

PDF

The Offenders’ Perspective on Prevention: Guarding Against Victimization and Law Enforcement, Scott Jacques and Danielle Reynald