Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged Risks
Phishing Risks in a University Student Community

By Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias and Yuguang Ipsen

In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or ‘spear’. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams.Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Analysis of the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students.


Trends & issues in crime and criminal justice no. 587. Canberra: Australian Institute of Criminology. 2020. 16p.

Benefits and Risks of Implementing Cloud-Based Technology for Child Sexual Abuse Investigations in Australia

By Bryce Westlake, Russell Brewer, Kellie Toole, Tom Daly, Thomas Swearingen, Scott Fletcher, Franco Ucci and Katie Logos

Transitioning to cloud-based infrastructure (CBI) for processing child sexual abuse material (CSAM) collected during police investigations could address resource challenges agencies currently face. While CBI provides quantifiable scalability and budgetary and interagency collaborative advantages, potential risks associated with data security, data sovereignty, and various legal and regulatory concerns may make agencies hesitant to make this transition. However, this paper demonstrates how a ‘shared responsibility model’ approach to cloud security can minimize risks, allowing investigators to take advantage of CBI benefits. In partnership with Oracle Corporation, we demonstrate how this could be implemented and continually monitored for new vulnerabilities within a CSAM context over time.   

Trends & issues in crime and criminal justice no. 699. Canberra: Australian Institute of Criminology. 2024. 

Exploring the Risk of Resulting in Homicide and Suicide in Spanish Missing Person Cases

By Néstor García-Barceló, Miguel Ángel Alcázar Córcoles, Javier Revuelta Menéndez, Penny Woolnough, José Luis González Álvarez 

The study explores in depth the relationship between missing persons’ psychosocial and criminological characteristics/circumstances and violent-fatal outcomes (suicide and homicide). A relational analytical explicative study of 929 cases and controls was designed using a retrospective and stratified design. Data gathering was conducted through the content analysis of judicial and police information, as well as the development of psychological autopsy techniques and semi-structured interviews with the persons involved in the missing person cases including offenders in prison. Bivariate and multivariate statistical techniques were utilized for analyses. The findings showed that there are different risk and protective factors which can distinguish between a good state of health, suicide, and homicide outcomes. This research entails implications for prevention and police risk assessment systems.. 

European Journal on Criminal Policy and Research (2024) 30:545–565