Cybersecurity Research
The Evidence-Based Cybersecurity Research Group at the Andrew Young School of Policy Studies at Georgia State University seeks to produce empirical evidence and provide systematic reviews of existing empirical research regarding the potential effect of existing cyber security policies and tools in preventing the development and progression of cyber-dependent crimes.
Publications
- Illicit Activity Detection in Large-Scale Dark and Opaque Web Social Networks
- Examining the crime prevention claims of crime prevention through environmental design on system-trespassing behaviors: a randomized experiment
- The Restrictive Deterrent Effect of Warning Messages Sent to Active Romance Fraudsters: An Experimental Approach
- Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors
- Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature
- Attacking and securing beacon-enabled 802.15.4 networks
- Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks
- Learning from the Offenders' Perspective on Crime Prevention
- The Offenders’ Perspective on Prevention: Guarding Against Victimization and Law Enforcement
- Online Deception and Situations Conducive to the Progression of Non-Payment Fraud
- Website Defacement and Routine Activities: Considering the Importance of Hackers’ Valuations of Potential Targets
- Digital First: The Ontological Reversal and New Challenges for IS Research
- The Effect of a Surveillance Banner in an Attacked Computer System: Additional Evidence for the Relevance of Restrictive Deterrence in Cyberspace
- Restrictive Deterrent Effects of a Warning Banner in an Attacked Computer System
- On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents
- Detecting Illicit Drug Ads in Google+ Using Machine Learning
- Characteristics of Bitcoin Transactions on Cryptomarkets
- Detecting Illicit Drug Ads in Google+ Using Machine Learning
- Characteristics of Bitcoin Transactions on Cryptomarkets
- Python Scrapers for Scraping Cryptomarkets on Tor
- Information Security: Going Digital
- Predictably Deterrable? The Case of System Trespassers
- Web-Based Intelligence for IDS
- Re-Thinking Online Offenders’ SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks
- On the Relevance of Social Media Platforms in Predicting The Volume and Patterns of Web Defacement Attacks
- Distributed Decentralized Domain Name Service
- A Model Architecture for Big Data Applications using Relational Databases
- A Distributed Greedy Heuristic for Computing Voronoi Tessellations with Applications Towards Peer-to-Peer Networks
- High Performance Attack Estimation in Large-Scale Network Flows
- Predicting Opioid Epidemic by Using Twitter Data
- Existing Evidence for the Effectiveness of Antivirus in Preventing Cyber Crime Incidents
- Existing Evidence for the Effectiveness of Firewalls in Preventing Cyber Crime Incidents
- Existing Evidence for the Effectiveness of Honeypots in Preventing Cyber Crime Incidents
- Existing Evidence for the Effectiveness of IDS/IPS in Preventing Cyber Crime Incidents
- Existing Evidence for the Effectiveness of Passwords in Preventing Cyber Crime Incidents
- Existing Evidence for the Effectiveness of Prompt Vulnerability Patching in Preventing Cyber Crime Incidents