Curricula - Knowledge - Navigation

On the identification of suspicious users on social networks

The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people

Emerging challenges in Organized Cyber-Crime and Terrorist Networks

Organized Crime (OC) and Terrorist Networks (TN) have risen to major and persistent threats for the European Union and its population. The IT growth of the past decade caused a migration of OC/TN to the cyber domain as well as the introduction of cybercrime. As a consequence, the technological dimensions of criminal activities are becoming

Cybercrime and Organized Crime

Cybercrime is now far away of hackers fighting with computer systems just for fun or to teas administrators. The growth of the digital economy completely changed the criminal scene where access to assets stored in the computer’s systems becomes a objective of the crime. Possibility of high profit combined with practically very low risks made

The impact of incentives, and the value of gentle rule enforcement

Recent research demonstrates that human reactions to incentives are highly sensitive to the probability of regret.  Quick learning toward rational behaviour was found only when the option that maximizes expected return also minimizes the probability of regret.  This observation implies that a gentle rule enforcement system that ensures a high probability of enforcement is often

The description-experience gap, and the impact of rare terrorist attacks

People exhibit overweighting to rare events in many settings.  For example, tourists behaviour typically exhibit high sensitivity to the possibility of rare terrorist attacks.  Yet in other settings, people behave as if they believe that “it won’t happen to me.”  A common example is texting while driving.  Recent research suggests that this pattern is a

Are Booter Services indicative of a new form of organised crime group online?

Recent changes in the cyberthreat landscape, especially high yield cybercrimes such as Ransomware and other crimes of extortion, are creating a logical (crime) environment for the creation of a more sustainable mafia-type hierarchical model of organised crime which specifically seeks to protect offenders, invest proceeds to increase wealth, power and influence and ultimately their sustainability.

What was first? Polarization dynamics which foster terrorism

In that regard, the Parliamentary Assembly of the Council of Europe remains “deeply concerned about Islamic extremism as well as about extremism against Muslim communities in Europe” and already recognized in 2010 that “both phenomena reinforce each other”[1] noting that “Islamic radicalism and manipulation of religious beliefs for political reasons oppose human rights and democratic