Cybercrime Prevention
Cybercrime Prevention
Cybercrime Prevention
SECURITY MANAGEMENT
Cybercrime
Prevention
Theory and Applications
Russell Brewer
Melissa de Vel-Palumbo
Alice Hutchings
Thomas Holt
Andrew Goldsmith
David Maimon
Crime Prevention and Security Management
Series Editor
Martin Gill
Perpetuity Research
Tunbridge Wells, Kent, UK
It is widely recognized that we live in an increasingly unsafe society,
but the study of security and crime prevention has lagged behind in
its importance on the political agenda and has not matched the level
of public concern. This exciting new series aims to address these issues
looking at topics such as crime control, policing, security, theft, work-
place violence and crime, fear of crime, civil disorder, white collar crime
and anti-social behaviour. International in perspective, providing criti-
cally and theoretically-informed work, and edited by a leading scholar in
the field, this series will advance new understandings of crime prevention
and security management.
Cybercrime
Prevention
Theory and Applications
Russell Brewer Melissa de Vel-Palumbo
School of Social Sciences Centre for Crime Policy and Research
University of Adelaide Flinders University
Adelaide, SA, Australia Adelaide, SA, Australia
This Palgrave Pivot imprint is published by the registered company Springer Nature
Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Series Editor’s Preface
v
vi SERIES EDITOR’S PREFACE
vii
viii ACKNOWLEDGEMENTS
4 Educational Workshops 51
5 Mentoring Programs 63
ix
x CONTENTS
7 Positive Diversions 93
Index 147
List of Tables
xi
CHAPTER 1
Setting the Scene
Introduction
Criminological research has made significant advances in the development,
deployment, and evaluation of the myriad crime prevention strategies
designed to identify and target individuals at various stages of the offend-
ing life cycle. This work, however, is principally rooted in understand-
ings of what may be loosely called ‘traditional’ crime settings (Newman
and Clarke 2003). Cybercrime is a relatively new crime type, and there
has been little systematic attention given to the specific digital settings
and contexts in which it occurs. As a result, many cybercrime prevention
1 Such activities can be distinguished from cyber-enabled crimes which are regarded as
‘traditional’ crimes that are augmented through the use of computers or networking tech-
nologies (e.g. fraud) (McGuire and Dowling 2013).
1 SETTING THE SCENE 3
References
Andrews, D. A., & Bonta, J. (2010). Rehabilitating criminal justice policy.
Psychology, Public Policy, and Law, 16, 39–55. https://doi.org/10.1037/
a0018362.
Andrews, D. A., Zinger, I., Hoge, R. D., Bonta, J., Gendreau, P., & Cullen, F.
T. (1990). Does correctional treatment work? A clinically relevant and psy-
chologically informed meta-analysis. Criminology, 28, 369–404. https://doi.
org/10.1111/j.1745-9125.1990.tb01330.x.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers.
The International Journal of Cyber Criminology, 4, 643–656.
Bonta, J., & Andrews, D. A. (2017). The psychology of criminal conduct (6th ed.).
New York, NY: Routledge.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and
computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell
(Eds.), Corporate hacking and technology-driven crime: Social dynam-
ics and implications (pp. 38–67). Hershey, PA: IGI Global. https://doi.
org/10.4018/9781616928056.ch003.
Braithwaite, J. (1989). Crime, shame and reintegration. Cambridge, UK:
Cambridge University Press. https://doi.org/10.1017/cbo9780511804618.
Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime pre-
vention. Crime & Delinquency, 22(3), 284–296. https://doi.org/10.1177/
001112877602200302.
12 R. BREWER ET AL.
Holt, T. J., Smirnova, O., & Chua, Y. T. (2016). Exploring and estimating the
revenues and profits of participants in stolen data markets. Deviant Behavior,
37, 353–367. https://doi.org/10.1080/01639625.2015.1026766.
Holt, T. J., Soles, J., & Leslie, L. (2008, April). Characterizing malware writ-
ers and computer attackers in their own words. Paper presented at the 3rd
International Conference on Information Warfare and Security, Omaha, NE.
Hutchings, A., & Holt, T. J. (2016). A crime script analysis of the online sto-
len data market. British Journal of Criminology, 55, 596–614. https://doi.
org/10.1093/bjc/azu106.
Jordan, T., & Taylor, P. (1998). A sociology of hackers. The Sociological Review,
46, 757–780. https://doi.org/10.1111/1467-954X.00139.
Koehler, J. A., Lösel, F., Akoensi, T. D., & Humphreys, D. K. (2013). A sys-
tematic review and meta-analysis on the effects of young offender treatment
programs in Europe. Journal of Experimental Criminology, 9, 19–43. https://
doi.org/10.1007/s11292-012-9159-7.
Landreth, B. (1985). Out of the inner circle. Seattle, WA: Microsoft Press.
Leukfeldt, R., Kleemans, E. R., & Stol, W. (2017). Origin, growth, and crim-
inal capabilities of cybercriminal networks: An international empirical analy-
sis. Crime, Law and Social Change, 67, 39–53. https://doi.org/10.1007/
s10611-016-9663-1.
Lipsey, M. W., & Derzon, J. H. (1998). Predictors of serious delinquency
in adolescence and early adulthood: A synthesis of longitudinal research.
In R. Loeber & D. P. Farrington (Eds.), Serious and violent offenders: Risk
factors and successful interventions (pp. 86–105). Thousand Oaks, CA: Sage.
https://doi.org/10.4135/9781452243740.n6.
McGuire, M. & Dowling S. (2013). Cyber crime: A review of the evidence (Home
Office Research Report No. 75).
Meyer, G. R. (1989). The social organization of the computer underground.
Master’s thesis. Retrieved from the National Institute of Standards and
Technology Computer Security Resource Center (ADA390834).
Motoyama, M., McCoy, D., Levchenko, K., Savage, S., & Voelker, G. M. (2011,
November). An analysis of underground forums. In Proceedings of the 2011
ACM SIGCOMM Internet Measurement Conference (pp. 71–80). New York,
NY: ACM.
Murray, J., & Farrington, D. P. (2010). Risk factors for conduct disorder and
delinquency: Key findings from longitudinal studies. The Canadian Journal of
Psychiatry, 55, 633–642. https://doi.org/10.1177/070674371005501003.
Newman, G., & Clarke, R. (2003). Superhighway robbery: Preventing e-commerce
crime. Cullompton, NJ: Willan Press. https://doi.org/10.4324/9781843924876.
Rhodes, J. E. (2002). Stand by me: The risks and rewards of mentoring today’s
youth. Cambridge, MA: Harvard University Press.
14 R. BREWER ET AL.
Introduction
In order to facilitate safe and secure Internet infrastructures, many cor-
porations and individuals use technical tools and security policies that
aim to configure the online environment in such a way that reduces the
probability of cybercrime from occurring or progressing. For instance,
firewalls and intrusion detection/prevention systems are commonly
used by large organisations to prevent the progression of cybercrime
(Bace and Mell 2001). Similarly, one important policy often incorpo-
rated into contemporary computing environments is the implementation
of surveillance means in users’ computer systems (Eivazi 2011). These
and other approaches to prevent the development of cybercrime coincide
with the list of crime prevention strategies that are recommended by the
situational crime prevention (SCP) perspective (Homel and Clarke 1997;
Cornish and Clarke 2003), originally designed to prevent the occurrence
of offline crimes.
In this chapter, we explore the theoretical underpinnings of the SCP
approach to crime prevention and details how this suite of techniques
has been applied in both offline and digital contexts. We then scrutinise
the available empirical evidence regarding the potential effect of SCP
approaches in deterring cyber-offenders from engaging in or escalating
their criminal activities. Despite the growing number of individuals and
organisations that implement these tools and policies on their computing
environments, the effectiveness of these strategies in preventing and miti-
gating the occurrence of malicious cyber activities is limited. This chapter
concludes by revealing the limitations of SCP in preventing cybercrime,
as well as by elucidating the most promising configurations of SCP inter-
ventions in digital contexts moving forward.
Current Applications
SCP approaches have also been used extensively in the offline or ‘tradi-
tional’ contexts. In fact, many of the 25 techniques discussed in Cornish
and Clarke’s (2003) elaboration of the SCP perspective have proven
useful in reducing different types of offline crime. For example, after
reviewing a set of 41 studies, Welsh and Farrington (2008a) reported
that CCTV cameras were effective in reducing vehicle crimes, consistent
with the SCP strategy that calls for increasing formal surveillance. Welsh
and Farrington (2008b) further reported that improved street lighting
significantly reduces the probability of crime in public space, consist-
ent with the SCP strategy that calls for assisting natural surveillance.
Similarly, after reviewing evidence from 19 studies, Bennett et al. (2009)
reported that neighbourhood watches are effective in reducing crimes
20 R. BREWER ET AL.
1 It is important to note that evidence reviewed did not include findings which reported
results of scans performed under lab conditions (of either collected or synthesised samples
of attacks). Although valuable for providing insights regarding specific features of these
tools and policies, these examinations are not representative of real-life situations since they
do not account for human, organisational, environmental, and other external factors that
may influence the performance and execution of these tools in the field.
22 R. BREWER ET AL.
Using the data collected by Maimon et al. (2014), Testa et al. (2017)
explored the effect of a warning on mitigating trespassers’ levels of activ-
ity in an attacked computer system. These scholars reported three key
findings. First, the presence of a warning banner on an attacked com-
puter system had no statistically significant effect on the probability of
either navigation or ‘change file permission’ commands being entered
on the system. Second, the presence of a warning banner did not affect
either the probability or the average rate of navigation commands being
entered on computers infiltrated by system trespassers with administra-
tive privileges. However, the presence of a warning banner significantly
increased the proportion of target computers with ‘change file permis-
sion’ commands. Specifically, while 52% of the warning target com-
puters attacked by an administrative system trespasser recorded the
‘change file permission’ command, only 39% of the no-warning tar-
get computers that were attacked by administrative system trespassers
recorded a ‘change file permission’ command. Moreover, the average
rate of ‘change file permission’ commands entered on the warning tar-
get computers was significantly higher than the average rate of ‘change
file permission’ commands on no-warning computers. In contrast, these
authors reported that a warning banner substantially reduced the use of
both navigation and ‘change file permission’ commands on computers
attacked by system trespassers with non-administrative privileges.
Jones et al. (2016) explored what type of warning message—sanction
threats or moral persuasion—were more effective in reducing the prob-
ability of system trespassers manipulating data, and fetching software
and data, while on a compromised computer system. Using a similar
approach to that described in the aforementioned studies, Jones et al.
(2016) deployed the target computers on the Internet infrastructure
of a large Chinese university for a period of four months and waited
for trespassers to use brute force to access these computers. Once they
had accessed the computers, system trespassers were randomly assigned
to one of four experimental conditions (i.e. a 2 × 2 factorial design).
In the first treatment condition, the target computers were configured
to present an ‘altruistic’ message of moral persuasion. In the second
treatment condition, the target computers were set to present a ‘stand-
ard’ legal sanction threat. In the third treatment condition, the target
computers were configured to display an ‘ambiguous’ warning message.
Finally, target computers in the control condition were set to present
no message to trespassers. The authors found no significant effect from
2 SITUATIONAL CRIME PREVENTION 25
One key conclusion that can be drawn from this chapter is that rigor-
ous evidence regarding the effectiveness of security tools in preventing
and mitigating cybercrime is relatively scarce. Specifically, the availa-
ble evidence regarding the effectiveness of SCP techniques in prevent-
ing cybercrime tends to focus on three key strategies: antivirus products,
warnings, and formal surveillance software and tools. Research on the
effectiveness of antivirus products in detecting and preventing malware
infection reveals that most products are able to detect and prevent most
malware attacks. In contrast, research findings from studies that investi-
gate the effectiveness of warning and surveillance in preventing and mit-
igating malicious hacking reveal that both techniques are limited in their
effectiveness to reduce incidents. It remains unknown whether other sit-
uational crime preventions techniques, such as firewalls, passwords, and
security awareness programs, effectively reduce cybercrime. Given the
promise that these strategies carry, we encourage security researchers to
empirically assess the effectiveness of these strategies more widely in dig-
ital contexts.
One of the underlying reasons behind the relative scarcity of empir-
ical research in this area could be the absence of universally accepted
information security frameworks, theories, and measurement metrics
to provide organisations with practical tools for assessing the effective-
ness of security controls and policies to prevent cybercrime (Torres et al.
2006). Indeed, the most common approach for the implementation of
information security practices in governmental and private organisations
by Information Technology officers draws on their managers’ personal
experience in the field and world views (Siponen and Willison 2009).
Such an approach does not require rigorous empirical evaluations of
security tools and policies in order to support decision-making by these
professionals. However, Blakley (2002) suggests that this approach has
failed to prevent organisations from becoming the targets and victims of
cybercrime. Therefore, Blakely proposes the adoption of an information
security approach that monetises information security and calls for quan-
tifying the effectiveness of security tools and policies in achieving their
stated goals. Since this approach to information security is still relatively
new, there lacks an abundance of evaluations of security control, poli-
cies, and tools. However, with time, and with the realisation that organ-
isations should quantify and evaluate both their cyber-related risks and
the effectiveness of their security posture in mitigating them, there will
likely be an increase in the number of rigorous scientific evolutions of
28 R. BREWER ET AL.
References
Algaith, A., Gashi, I., Sobesto, B., Cukier, M., Haxhijaha, S., & Bajrami, G.
(2016, June 28–July 1). Comparing detection capabilities of antivirus prod-
ucts: An empirical study with different versions of products from the same
vendors. In 2016 46th Annual IEEE/IFIP International Conference on
Dependable Systems and Networks Workshop (DSN-W) (pp. 48–53). IEEE.
https://doi.org/10.1109/DSN-W.2016.45.
Atzeni, A., & Lioy, A. (2006). Why to adopt a security metric? A brief survey.
In D. Gollmann, F. Massacci, & A. Yautsiukhin (Eds.), Quality of protection:
Advances in information security (Vol. 23, pp. 1–12). Boston, MA: Springer.
https://doi.org/10.1007/978-0-387-36584-8_1.
AV Comparatives. (2011). On demand detection of malicious software. Available at
https://www.av-comparatives.org/images/stories/test/ondret/avc_od_feb2011.
pdf. Accessed 15 June 2019.
Bace, R., & Mell, P. (2001). NIST special publication on intrusion detection systems.
Retrieved from the Defense Technical Information Center (ADA393326).
Bell, J., & Burke, B. (1992). Cruising Cooper Street situational crime prevention:
Successful case studies (2nd ed.). Guilderland, NY: Harrow and Heston.
Bennett, T., Holloway, K., & Farrington, D. P. (2009). A review of the effective-
ness of neighbourhood watch. Security Journal, 22(2), 143–155. https://doi.
org/10.1057/palgrave.sj.8350076.
Berlin, K., Slater, D., & Saxe, J. (2015). Malicious behavior detection using
windows audit logs. In Proceedings of the 8th ACM Workshop on Artificial
Intelligence and Security (pp. 35–44). New York, NY: ACM. https://doi.
org/10.1145/2808769.2808773.
2 SITUATIONAL CRIME PREVENTION 29
Bishop, P., Bloomfield, R., Gashi, I., & Stankovic, V. (2011, November 29–
December 2). Diversity for security: A study with off-the-shelf antivirus
engines. In 2011 IEEE 22nd International Symposium on Software Reliability
Engineering (pp. 11–19). IEEE. https://doi.org/10.1109/ISSRE.2011.15.
Blais, E., & Bacher, J.-L. (2007). Situational deterrence and claim padding:
Results from a randomized field experiment. Journal of Experimental
Criminology, 3(4), 337–352. https://doi.org/10.1007/s11292-007-9043-z.
Blakley, B. (2002, May 16–17). The measure of information security is dol-
lars. In Proceedings (online) of the First Annual Workshop on Economics and
Information Security (WEIS ’02) (pp. 1–4). Berkeley, CA.
Bonneau, J. (2012, May 20–23). The science of guessing: Analyzing an anonymized
corpus of 70 million passwords. In 2012 IEEE Symposium on Security and Privacy
(pp. 538–552). IEEE. https://doi.org/10.1109/SP.2012.49.
Cazier, J. A., & Medlin, B. D. (2006). Password security: An empirical investi-
gation into e-commerce passwords and their crack times. Information Systems
Security, 15(6), 45–55. https://doi.org/10.1080/10658980601051318.
Ciocchetti, C. A. (2011). The eavesdropping employer: A twenty-first century
framework for employee monitoring. American Business Law Journal, 48(2),
285–369. https://doi.org/10.1111/j.1744-1714.2011.01116.x.
Clarke, R. V. (1995). Situational crime prevention. Crime and Justice, 19,
91–150. https://doi.org/10.1086/449230.
Cornish, D. B., & Clarke, R. V. (2003). Opportunities, precipitators and crim-
inal decisions: A reply to Wortley’s critique of situational crime prevention.
Crime Prevention Studies, 16, 41–96.
Cozens, P. M., Saville, G., & Hillier, D. (2005). Crime prevention through
environmental design (CPTED): A review and modern bibliography.
Property Management, 23(5), 328–356. https://doi.org/10.1108/
02637470510631483.
Crawford, A., & Evans, K. (2017). Crime prevention and community safety. In
A. Leibling, S. Maruna, & L. McAra (Eds.), The Oxford handbook of criminol-
ogy (6th ed., pp. 797–824). Oxford, UK: Oxford University Press. https://
doi.org/10.1093/he/9780198719441.001.0001.
Crow, W. J., & Bull, J. L. (1975) Robbery deterrence: An applied behavioral sci-
ence demonstration—Final report. La Jolla, CA: Western Behavioral Sciences
Institute.
Dacey, R. F. (2003). Information security: Effective patch management is critical
to mitigating software vulnerabilities. Washington, DC: General Accounting
Office.
D’Arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in
the IS security literature: Making sense of the disparate findings. European
Journal of Information Systems, 20(6), 643–658. https://doi.org/10.1057/
ejis.2011.23.
30 R. BREWER ET AL.
Howell, C. J., Cochran, J. K., Powers, R. A., Maimon, D., & Jones, H. M.
(2017). System trespasser behavior after exposure to warning messages at a
Chinese computer network: An examination. International Journal of Cyber
Criminology, 11(1). https://doi.org/10.5281/zenodo.495772.
Hsiao, D. K., Kerr, D. S., & Madnick, S. E. (1979). Computer security. New
York, NY: Academic Press.
Hutchings, A., Clayton, R., & Anderson, R. (2016, June 1–3). Taking
down websites to prevent crime. In 2016 APWG Symposium on Electronic
Crime Research (eCrime) (pp. 1–10). https://doi.org/10.1109/
ECRIME.2016.7487947.
Hutchings, A., Pastrana, S., & Clayton, R. (2019). Displacing big data:
How criminals cheat the system. In E. R. Leukfeldt & T. J. Holt (Eds.),
Cybercrime: The human factor. Oxon, UK: Routledge.
Jeffrey, C. R., Hunter, R. D., & Griswold, J. (1987). Crime prevention and com-
puter analysis of convenience store robberies in Tallahassee. Florida Police
Journal, 34, 65–69.
Jones, H., Maimon, D., & Ren, W. (2016). Sanction threat and friendly persua-
sion effects on system trespassers’ behaviors during a system trespassing event.
In T. Holt (Ed.), Cybercrime through an interdisciplinary lens (pp. 150–166).
London, UK: Routledge. https://doi.org/10.4324/9781315618456.
Kambow, N., & Passi, L. K. (2014). Honeypots: The need of network security.
International Journal of Computer Science and Information Technologies, 5(5),
6098–6101.
Korman, M., Välja, M., Björkman, G., Ekstedt, M., Vernotte, A., & Lagerström,
R. (2017). Analyzing the effectiveness of attack countermeasures in a SCADA
system. In Proceedings of the 2nd Workshop on Cyber-Physical Security and
Resilience in Smart Grids (pp. 73–78). New York, NY: ACM. https://doi.
org/10.1145/3055386.3055393.
Lévesque, F. L., & Fernandez, J. M. (2014, August). Computer security clinical
trials: Lessons learned from a 4-month pilot study. Paper presented at CSET ’14
7th Workshop on Cyber Security Exoerueetation and Test, San Diego, CA.
Lévesque, F. L., Fernandez, J. M., & Batchelder, D., & Young, G. (2016). Are
they real? Real-life comparative tests of antivirus products. In Virus Bulletin
Conference (pp. 1–11).
Lévesque, F., Nsiempba, J., Fernandez, J. M., Chiasson, S., & Somayaji,
A. (2013). A clinical study of risk factors related to malware infections.
In Proceedings of the 2013 ACM SIGSAC Conference on Computer &
Communications Security (pp. 97–108). New York, NY: ACM. https://doi.
org/10.1145/2508859.2516747.
Lyu, M. R., & Lau, L. K. (2000). Firewall security: Policies, testing and per-
formance evaluation. In Proceedings 24th Annual International Computer
Software and Applications Conference (COMPSAC 2000) (pp. 116–121).
IEEE.
32 R. BREWER ET AL.
Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent
effect of a warning banner in an attacked computer system. Criminology, 52,
33–59. https://doi.org/10.1111/1745-9125.12028.
Moore, A. D. (2000). Employee monitoring and computer technology:
Evaluative surveillance v. privacy. Business Ethics Quarterly, 10(3), 697–709.
https://doi.org/10.2307/3857899.
Nayak, K., Marino, D., Efstathopoulos, P., & Dumitraş, T. (2014). Some
vulnerabilities are different than others. In A. Stavrou, H. Bos, &
C. Portokalidis (Eds.), Research in Attacks, Intrusions and Defences
(RAID 2014) (LNCS, Vol. 8688, pp. 426–446). Springer. https://doi.
org/10.1007/978-3-319-11379-1_21.
PC Security Labs. (2013). Security solution review on Windows 8 platform.
Technical report. PC Security Labs.
Rama, P., & Kulmala, R. (2000). Effects of variable message signs for slippery
road conditions on driving speed and headways. Transportation Research, 3,
85–94. https://doi.org/10.1016/S1369-8478(00)00018-8.
Ramsbrock, D., Berthier, R., & Cukier, M. (2007, June 25–28). Profiling
attacker behavior following SSH compromises. In 37th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN’07)
(pp. 119–124). IEEE. https://doi.org/10.1109/DSN.2007.76.
Scott, L., Crow, W. J., & Erickson, R. (1985). Robbery as robbers see it. Dallas,
TX: Southland Corporation.
Seeberg, V. E., & Petrovic, S. (2007). A new classification scheme for
anonymization of real data used in IDS benchmarking. In The Second
International Conference on Availability, Reliability and Security (ARES
2007) (pp. 385–390). IEEE. https://doi.org/10.1109/ARES.2007.9.
Siponen, M., & Willison, R. (2009). Information security management stand-
ards: Problems and solutions. Information & Management, 46(5), 267–270.
https://doi.org/10.1016/j.im.2008.12.007.
Sloan-Howitt, M., & Kelling, G. (1990). Subway graffiti in New York City:
‘Getting up’ vs. ‘meaning’ it and ‘cleaning’ it. Security Journal, 1(3), 131–136.
Stockman, M., Heile, R., & Rein, A. (2015). An open-source honeynet system
to study system banner message effects on hackers. In Proceedings of the 4th
Annual ACM Conference on Research in Information Technology (pp. 19–22).
New York, NY: ACM. https://doi.org/10.1145/2808062.2808069.
Sukwong, O., Kim, H. S., & Hoe, J. C. (2011). Commercial antivirus soft-
ware effectiveness: An empirical study. Computer, 44(3), 63–70. https://doi.
org/10.1109/MC.2010.187.
Surisetty, S., & Kumar, S. (2010). Is McAfee securitycenter/firewall software
providing complete security for your computer? In 2010 Fourth International
Conference on Digital Society (pp. 178–181). IEEE.
2 SITUATIONAL CRIME PREVENTION 33
Testa, A., Maimon, D., Sobesto, B., & Cukier, M. (2017). Illegal roaming and
file manipulation on target computers: Assessing the effect of sanction threats
on system trespassers’ online behaviors. Criminology and Public Policy, 16(3),
689–726. https://doi.org/10.1111/1745-9133.12312.
Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing
information systems security: Critical success factors and indicators to meas-
ure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis
(Eds.), Information security: ISC 2006 (Lecture Notes in Computer
Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://doi.
org/10.1007/11836810_38.
Welsh, B. C., & Farrington, D. P. (2008a). Effects of closed circuit television
surveillance on crime. Campbell Systematic Reviews, 17, 2–73. https://doi.
org/10.4073/csr.2008.17.
Welsh, B. C., & Farrington, D. P. (2008b). Effects of improved street lighting
on crime. Campbell Systematic Reviews, 13, 1–51. https://doi.org/10.4073/
csr.2008.13.
Welsh, B. C., & Farrington, D. P. (2009). Making public places safer: Surveillance
and crime prevention. New York, NY: Oxford University Press. https://doi.
org/10.1093/acprof:oso/9780195326215.001.0001.
Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of
a surveillance banner in an attacked computer system: Additional evi-
dence for the relevance of restrictive deterrence in cyberspace. Journal
of Research in Crime and Delinquency, 52(6), 829–855. https://doi.
org/10.1177/0022427815587761.
Wogalter, M. (2006). Purposes and scope of warnings. In M. Wogalter (Ed.),
Handbook of warnings (pp. 3–10). Boca Raton: CRC Press.
CHAPTER 3
Introduction
This chapter examines universal communication strategies, which aim
to influence the offender calculus of the risks and rewards of criminal
activity. Universal communications are mass media messages primarily
Current Applications
Broadly speaking, universal communications aim to reach as large a
proportion of the population as possible, in order to deter individuals
before they engage in criminal behaviour. Universal communication
strategies are most relevant to individuals without a strong history of
engaging in negative behaviours that compete with the desired behav-
iour change; heavily reinforced behaviours are most difficult to shift.
Moreover, once an individual is already entrenched in a criminal life-
style, a host of additional factors is likely to be maintaining the behaviour
38 R. BREWER ET AL.
McGrath and Thompson 2012; Simourd and Andrews 1994). Thus, the
more one is surrounded by criminal peers who model criminal behaviour,
provide rewards for criminal behaviour, and inflict punishment for failing
to engage in criminal behaviour (i.e. social rejection), the less influential
external threats of punishment will be (Matthews and Agnew 2008).
If crime prevention agencies do not understand their target audience,
they have little chance at designing an effective educational strategy.
Researchers in the health field (where communication strategies have a
long history) have emphasised that media campaigns must use researched
and tailored messaging that is appropriate to the audience (Brinn et al.
2010). Importantly, universal communications have been most effec-
tive when health campaigns understand their target audience—their
motivations for engaging in the negative behaviour and the elements
most likely to persuade that audience—and provide useful concrete solu-
tions and information about how to overcome barriers to desired behav-
iour (see systematic reviews by Everett et al. 2011; Grilli et al. 2002;
Noar et al. 2009; Vidanapathirana et al. 2005). Young people in par-
ticular might respond well to messages high in sensation value and when
they come from credible spokespeople (Derzon and Lipsey 2002).
Due to some of the problems in influencing offenders’ behaviour
directly, a number of communication strategies have instead chosen to
appeal to third parties. The most notable example of this is the Crime
Stoppers program, which airs details of a crime on television (often
accompanied by video footage of the suspect) and asks members of the
public to come forward with information. Evaluations have concluded
that Crime Stoppers schemes in general are effective in the detection
and prosecution of crime, though these evaluations did not use com-
parison groups or other quality evaluation methodologies (Gresham
et al. 2001; Rosenbaum et al. 1989). While it is difficult to know
whether such crimes would have been otherwise solved, some com-
mentators are confident that these appeals can be useful (Challinger
2004). However, note that Riley and Mayhew’s (1980) more robust
study of the anti-vandalism campaign discussed above, in which par-
ents were alerted to the possibility that their children were committing
vandalism, did not increase parental supervision or reduce crime rates.
Third party intervention strategies rely on two conditions: that third
parties are aware of the crime and the identity of the criminal (difficult
for more covert criminal activities); and that third parties are willing
and able to intervene in an effective manner. In the above case, parents
3 UNIVERSAL COMMUNICATION STRATEGIES 43
References
Adermon, A., & Liang, C.-Y. (2014). Piracy and music sales: The effects of an
anti-piracy law. Journal of Economic Behavior & Organization, 105, 90–106.
https://doi.org/10.1016/j.jebo.2014.04.026.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior
and Human Decision Processes, 50, 179–211. https://doi.org/10.1016/
0749-5978(91)90020-T.
Akers, R. L. (1990). Rational choice, deterrence, and social learning the-
ory in criminology: The path not taken. The Journal of Criminal Law and
Criminology, 81, 653–676.
Bandura, A. (1971). Social learning theory. New York, NY: General Learning.
Beccaria, C. (2009). On crimes and punishments (G. R. Newman & P. Marongiu,
Trans.). New Brunswick, NJ: Transaction Publishers (Original work published
1764).
Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact
of legal threats on online music sharing activity: An analysis of music indus-
try legal actions. The Journal of Law and Economics, 49, 91–114. https://doi.
org/10.1086/501085.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and com-
puter hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.),
Corporate hacking and technology-driven crime: Social dynamics and impli-
cations (pp. 38–67). Hershey, PA: IGI Global. https://doi.org/10.4018/
9781616928056.ch003.
3 UNIVERSAL COMMUNICATION STRATEGIES 45
German youth correctional facility inmates. Criminal Justice and Behavior, 41,
613–634. https://doi.org/10.1177/0093854813511432.
Grilli, R., Ramsay, C., & Minozzi, S. (2002). Mass media interventions: Effects
on health services utilisation. Cochrane Database of Systematic Reviews, 1.
https://doi.org/10.1002/14651858.CD000389.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant
peer associations, and juvenile cyberdeviance. American Journal of Criminal
Justice, 37, 378–395. https://doi.org/10.1007/s12103-011-9117-3.
Homel, R. (1990). Random breath testing and random stopping programs
in Australia. In R. J. Wilson & R. E. Mann (Eds.), Drinking and driving:
Advances in research and prevention (pp. 159–202). New York, NY: Guilford.
Hong, S.-M., Giannakopoulos, E., Laing, D., & Williams, N. A. (1994).
Psychological reactance: Effects of age and gender. The Journal of Social
Psychology, 134, 223–228. https://doi.org/10.1080/00224545.1994.9711385.
Kelly-Weeder, S., Phillips, K., & Rounseville, S. (2011). Effectiveness of public
health programs for decreasing alcohol consumption. Patient Intelligence, 3,
29–38. https://doi.org/10.2147/PI.S12431.
Ladegaard, I. (2018). We know where you are, what you are doing and we will
catch you: Testing deterrence theory in digital drug markets. The British Journal
of Criminology, 58(2), 414–433. https://doi.org/10.1093/bjc/azx021.
Laub, J. H., & Sampson, R. J. (2001). Understanding desistance from crime.
Crime and Justice, 28, 1–69. https://doi.org/10.1086/652208.
Lipsey, M. W., & Derzon, J. H. (1998). Predictors of violent or serious delin-
quency in adolescence and early adulthood: A synthesis of longitudinal
research. In R. Loeber & D. P. Farrington (Eds.), Serious and violent offend-
ers: Risk factors and successful interventions (pp. 86–105). Thousand Oaks,
CA: Sage. https://doi.org/10.4135/9781452243740.n6.
Matthews, S. K., & Agnew, R. (2008). Extending deterrence theory: Do delin-
quent peers condition the relationship between perceptions of getting caught
and offending? Journal of Research in Crime and Delinquency, 45, 91–118.
https://doi.org/10.1177/0022427807313702.
McGrath, A., & Thompson, A. P. (2012). The relative predictive validity of
the static and dynamic domain scores in risk-need assessment of juvenile
offenders. Criminal Justice and Behavior, 39, 250–263. https://doi.org/10.
1177/0093854811431917.
Nagin, D. S. (2013). Deterrence: A review of the evidence by a criminolo-
gist for economists. Annual Review of Economics, 5, 83–105. https://doi.
org/10.1146/annurev/economics-072412-131310.
Nagin, D. S., & Pogarsky, G. (2001). Integrating celerity, impulsivity, and
extralegal sanction threats into a model of general deterrence: Theory and
evidence. Criminology, 39, 865–892. https://doi.org/10.1111/j.1745-
9125.2001.tb00943.x.
3 UNIVERSAL COMMUNICATION STRATEGIES 47
Noar, S. M., Palmgreen, P., Chabot, M., Dobransky, N., & Zimmerman, R. S.
(2009). A 10-year systematic review of HIV/AIDS mass communication
campaigns: Have we made progress? Journal of Health Communication, 14,
15–42. https://doi.org/10.1080/10810730802592239.
Petty, R. E., & Wegener, D. T. (1998). Attitude change: Multiple roles for per-
suasion variables. In D. T. Gilbert, S. T. Fiske, & G. Lindzey (Eds.), The
handbook of social psychology (pp. 323–390). Boston, MA: McGraw-Hill.
Pratt, T. C., Cullen, F. T., Blevins, K. R., Daigle, L. E., & Madensen, T. D.
(2008). The empirical status of deterrence theory: A meta-analysis. In
F. T. Cullen, J. P. Wright, & K. R. Blevins (Eds.), Taking stock: The sta-
tus of criminological theory (pp. 367–396). New Brunswick, NJ: Transaction
Publishers. https://doi.org/10.4324/9781315130620-14.
Riley, D., & Mayhew, P. (1980). Crime prevention publicity. London, UK: Home
Office.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and atti-
tude change. Journal of Psychology, 91, 93–114. https://doi.org/10.1080/00
223980.1975.9915803.
Rosenbaum, D. P., Lurigio, A. J., & Lavrakas, P. J. (1989). Enhancing citizen-
ship participation and solving serious crime: A national evaluation of Crime
Stoppers programs. Crime and Deliquency, 35, 401–420. https://doi.org/10
.1177/0011128789035003006.
Rosser, B. S. (1992). The effects of using fear in public AIDS education on the
behaviour of homosexually active men. Journal of Psychology and Human
Sexuality, 4, 123–134. https://doi.org/10.1300/J056v04n03_09.
Scheier, L. M., & Grenard, J. L. (2010). Influence of a nationwide social market-
ing campaign on adolescent drug use. Journal of Health Communication, 15,
240–271. https://doi.org/10.1080/10810731003686580.
Simourd, L., & Andrews, D. A. (1994). Correlates of delinquency: A look at
gender differences. Forum on Corrections Research, 6, 26–31.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of com-
puter crime among college students. Journal of Research in Crime and
Delinquency, 34, 495–518. https://doi.org/10.1177/0022427897034004005.
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2004). Risk as
analysis and risk as feelings: Some thoughts about affect, reason, risk, and
rationality. Risk Analysis, 24(2), 311–322. https://doi.org/10.1111/j.
0272-4332.2004.00433.x.
Tay, R. (2005). Mass media campaigns reduce the incidence of drinking and
driving. Evidence-Based Healthcare and Public Health, 9, 26–29. https://doi.
org/10.1016/j.ehbc.2004.11.013.
Vidanapathirana, J., Abramson, M. J., Forbes, A., & Fairley, C. (2005). Mass
media interventions for promoting HIV testing. Cochrane Database of
Systematic Reviews, 3. https://doi.org/10.1002/14651858.CD004775.pub2.
48 R. BREWER ET AL.
Wakefield, M. A., Loken, B., & Hornik, R. C. (2010). Use of mass media cam-
paigns to change health behaviour. The Lancet, 376(9748), 1261–1271.
https://doi.org/10.1016/S0140-6736(10)60809-4.
Warr, M. (2002). Companions in crime: The social aspects of criminal conduct.
New York, NY: Cambridge University Press. https://doi.org/10.1017/
cbo9780511803956.
Werb, D., Mills, E. J., DeBeck, K., Kerr, T., Montaner, J. S., & Wood, E. (2011).
The effectiveness of anti-illicit-drug public-service announcements: A system-
atic review and meta-analysis. Journal of Epidemiology and Community Health,
65, 834–840. https://doi.org/10.1136/jech.2010.125195.
Witte, K., & Allen, M. (2000). A meta-analysis of fear appeals: Implications for
effective public health campaigns. Health Education and Behavior, 27, 591–
615. https://doi.org/10.1177/109019810002700506.
PART II
Educational Workshops
Introduction
This chapter explores the use of educational workshops in prevent-
ing online and offline crimes. This intervention brings together groups
of (potential) offenders in single or multiple sessions for the purposes
of educating them about the nature of crime, and reinforcing prosocial
values and behaviours. Typically, programs are deployed within school
curricula, or may selectively target at-risk adolescents. Workshops can be
didactic (i.e. a presentation of information), but as will be argued, the
active ingredient in workshop effectiveness is the inclusion of interactive
elements, such as discussion, role-play, and providing practical strategies
to combat antisocial behaviour. Specialised programming using trained
professionals has also been used to reduce problematic behaviour, but
this tends to be high cost (requiring clinicians to work directly with fam-
ilies and/or schools, as well as individuals) and intensive (e.g. Hay et al.
2015; Goorden et al. 2016). In this chapter, we instead examine generic
workshops that can be easily and broadly implemented.
This chapter first outlines the theoretical underpinnings for this type
of intervention, describing the various features of workshops that are
thought to reduce crime. We then summarise the evidence for this type
of intervention in the offline context, as well as potential pitfalls. We con-
clude that workshops can be an effective way to reduce crime, but this
depends greatly on the content and style of workshop deployed. Finally,
we discuss the applicability of workshops to prevent cybercrime, explicat-
ing the features that would likely increase the success of this intervention
in the online space.
Current Applications
The majority of programming is aimed at young adults, with some
targeting youth under the age of 10 years. The bulk is focused at youth
in primary or secondary schools to affect early onset offending behav-
iours. Others more explicitly target groups or individuals deemed to be
at risk of offending, for example workshops for pre-delinquents (those
attracting disciplinary action at school but not yet committing seri-
ous offences). As a result, it can be argued that workshops are meant
to affect youth during the onset or potential acceleration phase of
offending, constituting both primary and secondary modes of crime
prevention.
We were able to identify only a few instances of workshops that specif-
ically target cybercrime. For example, the UK’s National Crime Agency,
in partnership with the Cyber Security Challenge UK, released a les-
son plan for teachers to educate pupils about the nature and effects of
cybercrime. Workshops identified through published research articles,
however, tended to focus on protecting victims from possible harm
(rather than targeting potential offenders). In contrast, workshops have
been—and are—widely deployed in the offline context, most commonly
to target illicit drug use, involvement in gangs, and general delinquency,
as well as broader health behaviours.
the knowledge they receive and share with their peers. Chibnall et al.
(2006) conducted a quasi-experimental evaluation of i-SAFE across 18
schools in the USA for children aged 9–14 years old. Results showed
that over a nine-month period, the program had some success in chang-
ing attitudes and knowledge behaviour (e.g. knowledge of intellectual
property and piracy), but it had minimal impact on changing offender
behaviours (e.g. spending time on inappropriate websites). Though
the authors speculated that this failure was due to low baseline rates
of the behaviours studied, other reasons may also be offered. The pro-
gram was delivered offline, and while it had an active learning approach
(asking students to think about their own behaviour and talk with
each other to develop perspectives and solutions), in practice teachers
reported that ‘time constraints forced them to use lecture rather than
activities to teach the curriculum (Chibnall et al. 2006, p. 36). Thus,
the learning was in fact rather abstract and didactic, and there were
few opportunities to practice or reinforce actual positive online behav-
iours within the workshop sessions. Without experiential and interac-
tive activities, workshops are likely to be very limited in their effects on
behaviour change (Botvin and Griffin 2004; Soole et al. 2008; Tobler
and Stratton 1997).
Studies on cyberbullying are also potentially informative here, as the
phenomenon operates under similar dynamics to cybercrime, includ-
ing a lack of supervision, high accessibility of opportunities for negative
behaviours in the online environment, and perceived social anonymity.
Best practice for targeting cyberbullying tends to use comprehensive,
whole-of-school interventions (e.g. Pearce et al. 2011), but we located
two studies that examined the effectiveness of discrete workshop-based
programs in preventing the perpetration of cyberbullying. Both studies
showed favourable results for the intervention.
The first: the Arizona Attorney General’s Social Networking Safety
Promotion and Cyberbullying Prevention (SNSPCP) presentation, is
a school-based, single-session workshop for middle school (10–15-year
old) students. The presentation works on three levels, attempting to:
(a) change students’ attitudes, intentions, and behaviours, (b) convince
students that personally relevant and serious threats exist, and (c) pro-
vide students with effective techniques to reduce the threats that they
are able to perform. The presentation was evaluated using a trial with
random allocation to treatment (presentation) or control (no presenta-
tion). Despite its short exposure—a single session—there were significant
4 EDUCATIONAL WORKSHOPS 55
the USA, designed to reduce drug and alcohol use as well as general
delinquent behaviour. LST is an intensive program that involves 30 ses-
sions taught over a three year period (15 sessions in the first year, 10
in the second year, and five in the third year) with additional modules
for violence prevention in each year. Training is typically delivered in
class by regular teachers and is designed to enhance personal self-man-
agement skills, as well as social skills to overcome feelings of shyness,
engage with peers in effective ways, and respond to social challenges
using verbal and non-verbal skills. The program also emphasises the
development of resistance skills to combat peer pressure. The program
has been found to be successful in the reduction of juvenile drug and
alcohol use (Botvin and Griffin 2004). The studies are robust, using
random assignment to the experimental and control groups, and diverse
sample populations.
An additional model of note is the recent Promoting School-
University Partnerships to Enhance Resilience (PROSPER) intervention
(Osgood et al. 2013). It is not a program proper, but a delivery system
focused on implementing treatment programs efficiently and effectively
through university, school, and community partnerships. It also eval-
uates their outcomes. An example of this strategy in action was imple-
mented to affect negative peer influence through a reduction in the
individual network centrality of antisocial students in broader social net-
works (Osgood et al. 2013). It focused on the implementation of exist-
ing substance use programming—including the Strengthening Families
Program, Life Skills Training Program, All Stars Program, and Project
Alert—tracking the network centrality and influence of prosocial stu-
dents relative to antisocial students in school communities. Using 28
rural and semi-rural school districts in Iowa (n = 14) and Pennsylvania
(n = 14) based on matched characteristics, a sample of students in grade
six were targeted through a family-focused intervention followed by a
school-based intervention during seventh grade (Osgood et al. 2013).
The students were then followed through grade nine to assess the util-
ity of the treatment. The findings demonstrated that the treatment
reduced the influence of antisocial youth in friendship networks relative
to control (e.g. Osgood et al. 2013, 2015). Evidence also suggests that
the program is associated with reduced illicit substance use and conduct
problems (Spoth et al. 2011).
Other popular programs have limited evidence of effective-
ness. Programming like the G.R.E.A.T. program (developed by law
4 EDUCATIONAL WORKSHOPS 57
References
Agabio, R., Trincas, G., Floris, F., Mura, G., Sancassiani, F., & Angermeyer, M. C.
(2015). A systematic review of school-based alcohol and other drug prevention
programs. Clinical Practice and Epidemiology in Mental Health, 11, 102–112.
https://doi.org/10.1111/j.1465-3362.2012.00517.x.
Ajzen, I. (1991). The theory of planned behavior. Organizational
Behavior and Human Decision Processes, 50, 179–211. https://doi.
org/10.1016/0749-5978(91)90020-T.
Akers, R. L. (1990). Rational choice, deterrence, and social learning theory in crim-
inology: The path not taken. The Journal of Criminal Law and Criminology, 81,
653–676.
Bandura, A. (1971). Social learning theory. New York, NY: General Learning.
Bonta, J., & Andrews, D. A. (2017). The psychology of criminal conduct (6th ed.).
New York, NY: Routledge.
Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and
computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell
(Eds.), Corporate hacking and technology-driven crime: Social dynam-
ics and implications (pp. 38–67). Hershey, PA: IGI Global. https://doi.
org/10.4018/9781616928056.ch003.
Botvin, G. J., & Griffin, K. W. (2004). Life skills training: Empirical findings
and future directions. The Journal of Primary Prevention, 25(2), 211–232.
https://doi.org/10.1023/B:JOPP.0000042391.58573.5b.
Chibnall, S., Wallace, M., Leicht, C., & Lunghofer, L. (2006). I-SAFE evalua-
tion: Final report. Fairfax, VA: Caliber.
Cho, H., Hallfors, D., & Sanchez, V. (2005). Evaluation of a high school peer
group intervention for at risk youth. Journal of Abnormal Child Psychology,
33, 363–374. https://doi.org/10.1007/s10802-005-3574-4.
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination for the techniques
of neutralization to account for hacking behaviors. Victims and Offenders, 11,
534–555. https://doi.org/10.1080/15564886.2015.1121944.
Dishion, T. J., McCord, J., & Poulin, F. (1999). When interventions harm: Peer
groups and problem behavior. American Psychologist, 54, 755–764. https://doi.
org/10.1037/0003-066X.54.9.755.
60 R. BREWER ET AL.
Esbensen, F. A., & Osgood, D. W. (1999). Gang resistance education and train-
ing (GREAT): Results from a national evaluation. Journal of Research in
Crime and Delinquency, 36, 194–225. https://doi.org/10.1177/00224278
99036002004.
Esbensen, F. A., Osgood, D. W., Peterson, D., Taylor, T. J., & Carson, D. C.
(2013). Short- and long-term outcome results from a multisite evaluation
of the G.R.E.A.T. Program. Criminology and Public Policy, 12, 375–411.
https://doi.org/10.1111/1745-9133.12048.
Gneezy, U., Meier, S., & Rey-Biel, P. (2011). When and why incentives (don’t)
work to modify behavior. The Journal of Economic Perspectives, 25, 191–209.
https://doi.org/10.1257/jep.25.4.191.
Goorden, M., van der Schee, E., Hendricks, V. M., & Hakkaart-van Roijen, L.
(2016). Cost-effectiveness of multidimensional family therapy compared to
cognitive behavioural therapy for adolescents with a cannabis use disorder:
Data from a randomized controlled trial. Drug and Alcohol Dependence, 162,
154–161. https://doi.org/10.1016/j.drugalcdep.2016.03.004.
Hay, C., Wang, X., Ciaravolo, E., & Meldrum, R. C. (2015). Inside the black
box: Identifying the variables that mediate the effects of an experimental
intervention for adolescents. Crime and Delinquency, 61, 243–270. https://
doi.org/10.1177/0011128711398030.
Hektner, J. M., Brennan, A. L., & August, G. J. (2017). Incorporating well-ad-
justed peers in a conduct problems prevention program: Evaluation of
acceptability, fidelity, and safety of implementation. School Mental Health, 9,
66–77. https://doi.org/10.1007/s12310-016-9199-7.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant
peer associations, and juvenile cyberdeviance. American Journal of Criminal
Justice, 37, 378–395. https://doi.org/10.1007/s12103-011-9117-3.
Kirby, D. B., Laris, B., & Rolleri, L. A. (2007). Sex and HIV education pro-
grams: Their impact on sexual behaviors of young people through-
out the world. Journal of Adolescent Health, 403, 206–217. https://doi.
org/10.1016/j.jadohealth.2006.11.143.
Mishna, F., Cook, C., Saini, M., Wu, M.-J., & MacFadden, R. (2009).
Interventions for children, youth, and parents to prevent and reduce cyber
abuse. Campbell Systematic Reviews, 2. https://doi.org/10.4073/csr.2009.2.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization:
An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hack-
ing and technology-driven crime: Social dynamics and implications (pp. 1–17).
Hershey, PA: IGI Global. https://doi.org/10.4018/9781616928056.ch001.
Osgood, D. W., Feinberg, M. E., Gest, S. D., Moody, J., Ragan, D. T.,
Spoth, R., et al. (2013). Effects of PROSPER on the influence poten-
tial of prosocial versus antisocial youth in adolescent friendship networks.
4 EDUCATIONAL WORKSHOPS 61
Mentoring Programs
Introduction
This chapter examines the utility and efficacy of mentoring programs
as an intervention, which broadly defined, involve the ‘commitment of
time and specific efforts by a more experienced person to the develop-
ment of mutually beneficial, supportive and nurturing relationship with
a less experienced person’ (Moodie and Fisher 2009, p. 1). Programs
incorporating such supportive relationships are regarded as having util-
ity as a corrective experience and intervention for at-risk youth who have
experienced poor relations with parents or other caregivers (Grossman
et al. 2012) and are designed to enhance the personal development of
affected young people (Ainsworth 1989; Rhodes 2005). More precise
definitions as to what mentoring interventions entail vary across contexts
and with respect to outcomes (e.g. reducing forms of delinquency and/
or aggression, promoting scholastic achievement and/or better health
outcomes, etc.).
To begin, this chapter probes the theoretical footings on which
assumptions about the utility of mentoring are based. It then chroni-
cles the popularity of this intervention as being one of the most com-
monly deployed to prevent youth delinquency across traditional crime
prevention contexts, while at the same time drawing together a robust
evaluative research literature that reveals only a modest-moderate effect
associated with the intervention for those at risk of, or already engaged
in, delinquency. Although to date no research has examined either
the utility or efficacy of mentoring as an intervention to target young
people involved in cybercrime, we nevertheless argue that key lessons
can be drawn from the extant research literature about future pros-
pects in digital contexts. In making these arguments, we tease out the
various factors associated with successful mentoring interventions
and create a blueprint for the future design and deployment of such
interventions.
and Stattin 2006; Scales et al. 2006). More specifically, Rhodes (2002,
2005) argues that establishing and promoting such positive interpersonal
foundations serve to mobilise interacting developmental processes across
three areas. The first involves social-emotional development, whereby the
provision and modelling of supportive and caring relationships can serve
to challenge negative views held by young people of themselves, peers,
and other adults (Hayes et al. 1996). Moreover, the act of both listen-
ing to and modelling effective mature communication strategies can play
a role in helping young people better understand, regulate, cope with,
and express their emotions (McDowell et al. 2002). Second, support-
ive interpersonal relationships can also serve as a vehicle through which
learning can occur socially and promote cognitive development. Research
has found that young people can, through collaborative learning expe-
riences, develop new lateral thinking skills, and appreciation for proso-
cial values, norms, and perspectives (Radziszewska and Rogoff 1991;
Vygotsky 1978). Third, mentoring relationships can also play a role in
shifting youth perceptions of their current and future selves and thereby
promote identity development (DuBois et al. 2011). Such development
can inform choices made about how to behave. Indeed, Darling et al.
(2002) argue that substantial interpersonal relationships with mentors
have scope to introduce young people to new activities and resources,
as well as educational and vocational opportunities, which they can draw
upon to develop their identities over time.
In order to attain these developmental objectives, mentoring interven-
tions seek to support close positive relationships between young people
and (typically) adult volunteers. Mentoring interventions are increasingly
commonplace and take shape through various community-based and
school or site-based programs. The scope of these programs is broad and
encompasses a diverse range of outcomes that focus on an assortment of
not only delinquent behaviours (including drug and alcohol use, among
other antisocial activities), but scholastic (e.g. academic performance,
drop-outs) and health-related (e.g. obesity) issues as well. Given the wide
applicability of potential mentoring interventions to areas tangential to
crime prevention, only specifically stated delinquency-related outcomes
(e.g. reported offending by self or others, as well as arrest and juvenile
court records) are considered in this chapter. However, we acknowledge
the important links between low educational performance, certain physi-
ological conditions, poor health, and delinquency.
66 R. BREWER ET AL.
Current Applications
The targets for relevant mentoring interventions generally include those
young people who either exhibit a previous or current history of delin-
quent behaviour or exhibit certain characteristics that are assessed as
at risk for juvenile delinquency. The precise definition of what charac-
teristics are captured by the ‘at risk’ label in this context can vary from
intervention to intervention. They tend to correspond to a host of indi-
vidual and environmental risk factors that have been shown to increase
the likelihood of delinquency in later adolescence and adulthood (Tolan
2002; Tolan et al. 2013). Individual risk factors include evidence of ele-
vated levels of aggression, conduct disorders, and poor academic perfor-
mance, as well as antisocial attitudes, beliefs, and values. Environmental
risk factors, on the other hand, include social and familial factors, such as
place of residence; socio-economic status; family and parental influences
(particularly the conviction/incarceration of family members); exposure
to violence, abuse, and gangs; and negative peer relations and influences
(Matz 2014; Tolan and Gorman-Smith 2003).
Although there is scant reference to the use of mentoring interven-
tions in digital contexts, such interventions targeting at-risk populations
have been deployed across numerous offline contexts at various stages of
the offending life cycle. Interventions targeting at-risk youth are abun-
dant and oriented towards prevention, with a focus on reducing the
likelihood of the onset of offending. Interventions targeting juvenile
offenders are also commonplace—with their focus being either diversion-
ary or treatment oriented—addressing the acceleration phase of offend-
ing or promoting desistance.
Mentoring interventions represent one of the most commonly
deployed interventions with respect to the prevention, diversion, and
remediation of youth involved in, or at risk of, delinquent behaviour
(Tolan et al. 2013). Within offline contexts, the popularity of such inter-
ventions has seen considerable investment in, and deployment across,
the world. Such deployment has principally been through the use of an
extensive variety of community-based programs, as well as school or site-
based programs. Some programs are highly localised in nature (confined
to a particular school, community or district), while other larger initi-
atives operate at state, national, and in some cases—including the oft-
cited and researched Big Brothers Big Sisters program—operate on a
global scale.
5 MENTORING PROGRAMS 67
The remit for these programs is broad and tends to involve young
people who are referred as a preventative measure and as a consequence
of presenting as being at-risk. Moreover, mentoring interventions have
also been applied in a treatment capacity in cases where young people
have a demonstrated history of prior offending behaviour. However, in
such cases, there is considerable variation as to the inclusion or intake
criteria of specific mentoring programs. These range from including only
young people with limited exposure to formal criminal proceedings (i.e.
police cautions, but no formal charges brought), to involving those with
more robust histories that include prior convictions for a wide variety of
offences, such as substance use (drugs and alcohol), motor vehicle theft,
burglary, criminal mischief, disorderly conduct and assault (Blechman
et al. 2000; Fo and O’Donnell 1975; Hanlon et al. 2002).
specifically parses out evaluations that list delinquency and drug use as
outcomes and observe a modest positive effect of mentoring interven-
tions. In drawing such conclusions, the reviewers note factors impacting
positive outcomes:
Similar conclusions were also drawn by those specific studies that both
supported and contested the efficacy of mentoring with respect to delin-
quent outcomes:
It is also worth noting that numerous studies cite the positive benefits
associated with the total length of the intervention. However, there lacks
universal agreement as to its effect. For example, Jolliffe and Farrington
(2007) found that longer mentoring programs did not present as being
70 R. BREWER ET AL.
more effective than shorter interventions (also see Keating et al. 2002;
Royse 1998). They believe that this was most likely associated with the
difficulty in recruiting high-quality mentors over long periods of time.
However, as Chan et al. (2013, pp. 130–131) found, ‘mentees who
experienced longer relationships and relationships of higher quality …
derived more benefits than those in shorter or lower quality relation-
ships’ (see also Herrera et al. 2007; Tierney et al. 1995). This point is
further supported by Ware (2013) who argues that long-term mentoring
relationships of at least 12–18-month duration, that are based on com-
mon interests, mutual respect, genuine friendship, and a fun, non-judge-
mental approach, have a positive effect on delinquency outcomes.
When all this evidence is considered together, the take-home mes-
sage about mentoring as an intervention is positive (even from studies
that question its impact on delinquency). For example, Blechman et al.
(2000, pp. 153–154) suggest that ‘when mentoring happens in a nat-
ural, uncontrived fashion, and when mentoring involves a one-on-one
relationship with a protégé, there is good reason to believe that the men-
tor-protege relationship serves as a pivotal turning point in the life of a
high-risk youth’. Moreover, despite its relatively small effect size, schol-
ars acknowledge that the explosive growth of mentoring interventions,
and thus the high volume of youths mentored through such programs,
can ultimately produce beneficial and cost-effective outcomes for a large
number of young people (Rhodes 2008).
One important caveat stressed by Tolan et al. (2013), as well as oth-
ers (i.e. DuBois et al. 2011; Rhodes 2008), about the meta-reviews and
individual studies canvassed, is that most of the evaluative data availa-
ble for comparison offers incomplete information with respect to other
moderating factors of mentoring intervention effects. For example, most
of the studies fail to provide clarity around whether or not mentoring
is the sole intervention or if it is used in concert with other preventive
or intervention strategies. Many also fail to report the frequency of con-
tact between mentor and mentee, the nature of activities undertaken,
as well as the total duration of those relationships. Further informa-
tion pertaining to mentee characteristics were often omitted, including
details of their interpersonal histories and social competencies (DuBois
et al. 2002, 2011). Additionally, little information was also made avail-
able with respect to the level of training provided to mentors, as well as
their assessment and evaluation. Without this knowledge, it is difficult to
ascertain whether the positive outcomes reported were as a direct result
of the mentoring intervention applied.
5 MENTORING PROGRAMS 71
References
Ainsworth, M. D. S. (1989). Attachments beyond infancy. American Psychologist,
44, 709–716. https://doi.org/10.1037/0003-066X.44.4.709.
Bachmann, M. (2010). The risk propensity and rationality of computer hackers.
The International Journal of Cyber Criminology, 4, 643–656.
5 MENTORING PROGRAMS 73
Moodie, M. J., & Fisher, J. (2009). Are youth mentoring programs good value-
for-money? An evaluation of the Big Brothers Big Sisters Melbourne Program.
BMC Public Health, 9, 1–9. https://doi.org/10.1186/1471-2458-9-41.
Pawson, R. (2004). Mentoring relationships: An explanatory review (Working
Paper 21). London, UK: ESRC UK Centre for Evidence Based Policy and
Practice.
Radziszewska, B., & Rogoff, B. (1991). Children’s guided participation in plan-
ning imaginary errands with skilled adult or peer partners. Developmental
Psychology, 27, 381–389. https://doi.org/10.1037/0012-1649.27.3.381.
Rhodes, J. E. (2002). Stand by me: The risks and rewards of mentoring today’s
youth. Cambridge, MA: Harvard University Press.
Rhodes, J. E. (2005). A model of youth mentoring. In D. L. DuBois & M. J.
Karcher (Eds.), Handbook of youth mentoring (pp. 30–43). Thousand Oaks,
CA: Sage. https://doi.org/10.4135/9781412976664.n3.
Rhodes, J. (2008). Improving youth mentoring interventions through research-
based practice. American Journal of Community Psychology, 41, 35–42.
https://doi.org/10.1007/s10464-007-9153-9.
Royse, D. (1998). Mentoring high-risk minority youth: Evaluation of the
Brothers project. Adolescence, 33, 145–158.
Scales, P. C., Benson, P. L., & Mannes, M. (2006). The contribution to adolescent
well-being made by nonfamily adults: An examination of developmental assets as
contexts and processes. Journal of Community Psychology, 34, 401–413. https://
doi.org/10.1002/jcop.20106.
Schell, B. H., & Dodge, J. L. (2002). The hacking of America: Who’s doing it,
why, and how. Westport, CT: Quorum.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of com-
puter crime among college students. Journal of Research in Crime and
Delinquency, 34, 495–518. https://doi.org/10.1177/0022427897034004005.
Smith, R. E., & Smoll, F. L. (2002). Youth sports as a behaviour setting for psy-
chological interventions. In J. L. Van Raalte & B. W. Brewer (Eds.) Exploring
sport and exercise psychology (pp 341–371). Washington, DC: American
Psychological Association. https://doi.org/10.1037/10465-017.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British
Journal of Criminology, 55, 125–145. https://doi.org/10.1093/bjc/azu061.
Tierney, J. P., Grossman, J. B., & Resch, N. L. (1995). Making a difference:
An impact study of Big Brothers Big Sisters. Philadelphia, PA: Public/Private
Ventures.
Tolan, P. H. (2002). Crime prevention: Focus on youth. In J. Q. Wilson & J.
Petersilia (Eds.), Crime (pp. 109–128). Oakland, CA: Institute for Contemporary
Studies Press.
Tolan, P. H., & Gorman-Smith, D. (2003). What violence prevention can tell us
about developmental psychopathology. Development and Psychopathology, 14,
713–729. https://doi.org/10.1017/S0954579402004042.
76 R. BREWER ET AL.
Tolan, P. H., Henry, D., Schoeny, M., Bass, A. Lovegrove, P., & Nichols, E.
(2013). Mentoring interventions to affect juvenile delinquency and associated
problems: A systematic review. Campbell Systematic Reviews, 10. https://doi.
org/10.4073/csr.2013.10.
Vygotsky, L. S. (1978). Mind in society: The development of higher psychological
processes. Cambridge, MA: Harvard University Press.
Ware, V. (2013). Mentoring programs for Indigenous youth at-risk (Resource Sheet
No. 22). Canberra, Australia: Australian Institute of Health and Welfare.
Weulen Kranenbarg, M., Holt, T. J., & Van Gelder, J.-L. (2019). Offending and
victimization in the digital age: Comparing correlates of cybercrime and tra-
ditional offending-only, victimization-only and the victimization-offending
overlap. Deviant Behavior, 40(1), 40–55. https://doi.org/10.1080/016396
25.2017.1411030.
CHAPTER 6
Introduction
Targeted warnings and cautions are used by police to warn poten-
tial offenders with the aim of deterring them from future offending.
Though definitions of what constitutes such messaging can be broad,
Current Applications
Targeted warnings and cautions are examples of secondary crime pre-
vention approaches, which intervene at the early stages of offending in
order to avoid someone committing a crime or one that is more seri-
ous (Brantingham and Faust 1976). As such, they have traditionally been
80 R. BREWER ET AL.
For example, it would not have been a crime to create an account with
the LizardStresser service or even to use it to test one’s own systems.
However, using it against another target without permission would be
considered a criminal offence in many jurisdictions. Therefore, regis-
tering with the website may be considered a warning sign of awareness
of such criminal services and contemplation of their use. Consequently,
in these cases, the targeted warnings aimed to reduce the frequency or
severity of offending, if not to stop it altogether.
Chapman et al. (1994) also used random allocation into control and
experimental conditions to evaluate the effects of warning letters on the
illegal sale of tobacco products to underage children by retail outlets.
Undercover buying operations were conducted three months apart, with
half of the shops that sold to minors on the first occasion receiving a
warning letter. The letter stated that they had been recorded as having
sold cigarettes to children and that at an unspecified date in the future,
children would again be sent unannounced into their shop to attempt to
purchase cigarettes. The letter warned that if they were identified selling
tobacco to those underage on a second occasion, they could be prose-
cuted. Shops which sold on the first occasion and received warning let-
ters reduced selling by 69%, although the control group also had a 40%
reduction.
Mazerolle et al. (1998) differed from the other studies considered
here, as they used place as the unit of analysis, rather than individuals.
Specifically, they researched the effectiveness of civil remedies for proper-
ties in Oakland, California, that were reported as having drug crime and
disorder problems. The experimental condition included warning letters,
along with inspections, evictions, and property clean-ups, while those
randomly allocated to the control condition faced traditional police tac-
tics, including surveillance, arrests, and field interrogations. The research
team observed each site twice before the intervention, and twice after,
to measure changes in street behaviour. They found that the locations
assigned to the treatment condition had less observed drug dealing and
fewer signs of disorder after the intervention, compared to the control
group.
In the Milwaukee Domestic Violence Experiment (Sherman et al.
1992a), police dispatchers randomly allocated eligible cases of domestic
violence into one of three groups: (1) full arrest, in which the suspect
was eligible for release on $250 bail; (2) short arrest, in which sus-
pects were released as soon as possible and preferably within two hours;
and (3) warning, in which the suspect was not arrested, but was read
a standard warning indicating they would be arrested if the police had
to return that evening. Sherman et al. (1992a) found that there was an
initial deterrent effect, in which both short and full arrest groups had
fewer instances of repeated violence, compared to the warning group.
However, in the long term, arrest had an escalating effect, with arrest
increasing the risk of violence compared to warnings. Therefore, warn-
ings seemed to be more effective than arrests.
6 TARGETED WARNINGS AND POLICE CAUTIONS 83
References
Allard, T., Stewart, A., Chrzanowski, A., Ogilvie, J., Birks, D., & Little, S.
(2010). Police diversion of young offenders and Indigenous over-representa-
tion (Trends and Issues in Crime and Criminal Justice, No. 390). Canberra,
Australia: Australian Institute of Criminology.
Baker, J., & Goh, D. (2004). Cannabis Cautioning Scheme three years on: An
implementation & outcome evaluation. Sydney, Australia: New South Wales
Bureau of Crime Statistics and Research.
Bazemore, G., Stinchcomb, J. B., & Leip, L. A. (2004). Scared smart or
bored straight? Testing deterrence logic in an evaluation of police-led
truancy intervention. Justice Quarterly, 21(2), 269–299. https://doi.
org/10.1080/07418820400095811.
BBC News. (2015). Police target UK’s young cybercriminals. Available at http://
www.bbc.co.uk/news/technology-35028690. Accessed 1 Oct 2018.
Beccaria, C. (2009). On crimes and punishments (G. R. Newman & P. Marongiu,
Trans.). New Brunswick, NJ: Transaction Publishers. (Original work pub-
lished 1764.)
Becker, H. S. (1963). Outsiders. New York, NY: The Free Press.
Bernburg, J. G., Krohn, M. D., & Rivera, C. J. (2006). Official labeling, criminal
embeddedness, and subsequent delinquency: A longitudinal test of labeling
theory. Journal of Research in Crime and Delinquency, 43, 67–88. https://
doi.org/10.1177/0022427805280068.
Braithwaite, J. (1989). Crime, shame and reintegration. Cambridge, UK:
Cambridge University Press. https://doi.org/10.1017/cbo9780511804618.
Brantingham, P. J., & Faust, F. L. (1976). A conceptual model of crime
prevention. Crime and Delinquency, 22(3), 284–296. https://doi.
org/10.1177/001112877602200302.
Chambliss, W. J. (1967). Types of deviance and the effectiveness of legal sanc-
tions. Wisconsin Law Review, 1967(3), 703–719.
Chapman, S., King, M., Andrews, B., McKay, E., Markham, P., & Woodward,
S. (1994). Effects of publicity and a warning letter on illegal cigarette sales to
minors. Australian and New Zealand Journal of Public Health, 18(1), 39–42.
https://doi.org/10.1111/j.1753-6405.1994.tb00192.x.
Decker, S. H. (1985). A systematic analysis of diversion: Net widening
and beyond. Journal of Criminal Justice, 13(3), 207–216. https://doi.
org/10.1016/0047-2352(85)90099-6.
Dennison, S., Stewart, A., & Hurren, E. (2006). Police cautioning in
Queensland: The impact on juvenile offending pathways (Trends and Issues
in Crime and Criminal Justice, No. 306). Canberra, Australia: Australian
Institute of Criminology.
88 R. BREWER ET AL.
Positive Diversions
Introduction
This chapter examines the programs and strategies associated with posi-
tive diversions. Diversions are strategies that redirect a person away from
traditional criminal justice procedures and sanctions. More specifically,
Current Applications
Diversions, in general, have traditionally been used for young people and
first-time offenders (Smith 2014), targeting individuals deemed to be at
risk of offending before their behaviour escalates into serious criminal
behaviour (i.e. it is a secondary prevention measure). For example, pro-
grams may target troubled youth who have shown antisocial behaviour
or have had some contact with the police but not yet committed seri-
ous offences. The logic for this targeting is as follows: if contact with the
criminal justice system is criminogenic, it is more efficacious to divert a
person from first contact with the criminal justice system rather than later
down the track when a person has already had extensive exposure to the
criminal justice system. Thus, the aim of diversion is to reduce the num-
ber of first-time entrants to the criminal justice system (Smith 2014).
In practice, diversions may be a substitute for criminal sanctions or
court proceedings or be an accompaniment to such processes. Note,
however, that to minimise criminogenic effects, in line with the the-
ory underpinning the intervention, diversion should avoid contact
with the criminal justice system as much possible in order to minimise
96 R. BREWER ET AL.
a notable status culture—that is, they are rewarded by peers in their own
communities based on the skills/talent they use to offend (for graffiti
culture see Halsey and Young 2002). Thus, it is possible that cyber-
offenders would benefit from diversion into cybersecurity programs or
training, where their skills can be recognised and rewarded. There is,
however, little empirical evidence that such diversion is common, or out-
lining what factors enable such a transition. Since there is no empirical
evidence conclusively proving the effectiveness of such positive diver-
sions, they may be worth trialling and evaluating. However, from a prac-
tical perspective, it might be difficult to obtain support from industry for
such schemes, given the security risks presented (e.g. providing opportu-
nities to offend, contagion of prosocial peers).
In addition, resistance training would be needed to encourage the
ability to overtly reject peer pressure to engage in delinquency or crime
as with traditional interventions. This could include messaging models
for individuals to apply in their own lives or adapt to specific situations
when appropriate. There are various ways this could be achieved offline.
Linking security professionals and others who engage in hacking as a
legitimate career could serve as a vital source of imitation and messaging
to shape attitudes towards the negative outcomes associated with crim-
inal applications of hacking and promote the benefits and importance
of prosocial hacking. Such programs could be implemented via hacker/
security conferences locally and nationally, as well as through ‘maker-
spaces’ and ‘hackerspaces’ where individuals are encouraged to engage in
experiential learning with others in socially inviting situations (e.g. Holt
and Kilger 2012; Kinkade et al. 2013; Steinmetz 2015). Connecting
individuals to prosocial peers through mentoring (see Chapter 5) could
provide another source of messaging.
A programmatic threat lies in the fact that it is extremely difficult to
identify all the various forums, websites, social networking sites, and
communities where individuals may go for information related to mali-
cious hacking. Additionally, it is difficult to ascertain the extent to which
individuals espouse criminal values privately but display knowledgeable
prosocial values in open spaces. Thus, interventions may benefit from
partnering with prosocial cyber-offender (especially malicious hacker)
websites and forums to encourage legitimate applications of hacking,
downplay criminality, and promote prosocial values. Such partnerships,
operating in conjunction with real-world programming, may be able to
104 R. BREWER ET AL.
influence the formation of bonds with ethical hackers and minimise con-
nections to antisocial or criminal communities.
The challenge of any such program lies in the fact that positive diver-
sions provide ways to keep individuals engaged in prosocial activities and
separate them from deviant peer networks. Research suggests cyber-of-
fender online social networks are as influential as those in the real world,
if not more so, due to the smaller proportion of the population who take
an interest in computers and technology (e.g. Holt 2009; Leukfeldt et al.
2017; Marcum et al. 2014). In this sense, gains in programs will only be
sustained if individuals continue to participate in the activity past a one-
off program. Since the Internet is always ‘open’, it would prove difficult
to keep offenders from connecting with delinquent peers online and
diverted from offending behaviours at all times.
Similarly, addressing criminogenic needs is likely key to the success of
positive diversions. For example, challenging the justifications espoused
by cyber-offenders through moral reasoning and cognitive restructuring
might be particularly useful for this population (Chua and Holt 2016;
Morris 2011; Turgeman-Goldschmidt 2008). Yet there is little research
as to the criminogenic family and personal circumstances that may affect
an individual’s engagement in cybercrime (but see Weulen Kranenbarg
et al. 2018, 2019). More research on cyber-offenders’ criminogenic
needs is required if programs are to be appropriately targeted.
References
Andrews, D. A., Bonta, J., & Hoge, R. D. (1990a). Classification for effective
rehabilitation: Rediscovering psychology. Criminal Justice and Behavior, 17,
19–52. https://doi.org/10.1177/0093854890017001004.
Andrews, D. A., Zinger, I., Hoge, R. D., Bonta, J., Gendreau, P., & Cullen, F.
T. (1990b). Does correctional treatment work? A clinically relevant and psy-
chologically informed meta-analysis. Criminology, 28, 369–404. https://doi.
org/10.1111/j.1745-9125.1990.tb01330.x.
Bandura, A. (1971). Social learning theory. New York, NY: General Learning.
Bernburg, J. G., Krohn, M. D., & Rivera, C. J. (2006). Official labeling, criminal
embeddedness, and subsequent delinquency: A longitudinal test of labeling
theory. Journal of Research in Crime and Delinquency, 43, 67–88. https://
doi.org/10.1177/0022427805280068.
Bolger, R. (2015, October 5). Tasmanian youth rehabilitation program to tar-
get criminal thinking. ABC News. Retrieved from http://www.abc.net.au/
news/2015-10-05/youth-rehabilitation-program-targets-criminal-think-
ing/6827754. Accessed 28 May 2019.
7 POSITIVE DIVERSIONS 105
Boxer, P., Guerra, N. G., Huesmann, L. R., & Morales, J. (2005). Proximal
peer-level effects of a small-group selected prevention on aggression in ele-
mentary school children: An investigation of the peer contagion hypoth-
esis. Journal of Abnormal Child Psychology, 33, 325–388. https://doi.
org/10.1007/s10802-005-3568-2.
Braga, A. A. (2016). The continued importance of measuring potentially harmful
impacts of crime prevention programs: The academy of experimental crimi-
nology 2014 Joan McCord lecture. Journal of Experimental Criminology, 12,
1–20. https://doi.org/10.1007/s11292-016-9252-4.
Cécile, M., & Born, M. (2009). Intervention in juvenile delinquency: Danger
of iatrogenic effects? Children and Youth Services Review, 31, 1217–1221.
https://doi.org/10.1016/j.childyouth.2009.05.015.
Chandler, M. J. (1973). Egocentrism and antisocial behavior: The assessment
and training of social perspective-taking skills. Developmental Psychology, 9,
326–332. https://doi.org/10.1037/h0034974.
Cho, H., Hallfors, D., & Sanchez, V. (2005). Evaluation of a high school peer
group intervention for at risk youth. Journal of Abnormal Child Psychology,
33, 363–374. https://doi.org/10.1007/s10802-005-3574-4.
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination for the techniques
of neutralization to account for hacking behaviors. Victims and Offenders, 11,
534–555. https://doi.org/10.1080/15564886.2015.1121944.
Coalter, F. (2013). Sport for development: What game are we playing? London,
UK: Routledge. https://doi.org/10.4324/9780203861257.
Dishion, T. J., McCord, J., & Poulin, F. (1999). When interventions harm: Peer
groups and problem behavior. American Psychologist, 54, 755–764. https://
doi.org/10.1037//0003-066x.54.9.755.
Drake, E. K., Aos, S., & Miller, M. G. (2009). Evidence-based public pol-
icy options to reduce crime and criminal justice costs: Implications in
Washington State. Victims and Offenders, 4, 170–196. https://doi.
org/10.1080/15564880802612615.
Felson, R. B., & Staff, J. (2006). Explaining the academic performance-
delinquency relationship. Criminology, 44, 299–320. https://doi.org/10.1111/
j.1745-9125.2006.00050.x.
Gatti, U., Tremblay, R. E., & Vitaro, F. (2009). Iatrogenic effect of juvenile jus-
tice. Journal of Child Psychology and Psychiatry, 50, 991–998. https://doi.
org/10.1111/j.1469-7610.2008.02057.x.
Gavazzi, S. M., Yarcheck, C. M., Sullivan, J. M., Jones, S. C., & Khurana, A.
(2008). Global risk factors and the prediction of recidivism rates in a sam-
ple of first-time misdemeanant offenders. International Journal of Offender
Therapy and Comparative Criminology, 52, 330–345. https://doi.org/10.11
77/0306624x07305481.
Grieger, L., & Hosser, D. (2014). Which risk factors are really predictive? An
analysis of Andrews and Bonta’s “Central Eight” risk factors for recidivism in
106 R. BREWER ET AL.
German youth correctional facility inmates. Criminal Justice and Behavior, 41,
613–634. https://doi.org/10.1177/0093854813511432.
Haines, K., & Case, S. (2015). Positive youth justice: Children first, offenders sec-
ond. Bristol, UK: Policy Press. https://doi.org/10.2307/j.ctt1t899qx.
Haines, A., Goldson, B., Haycox, A., Houten, R., Lane, S., McGuire, J., et al.
(2012). Evaluation of the Youth Justice Liaison and Diversion (YJLD) pilot
scheme final report. Liverpool, UK: University of Liverpool.
Halsey, M., & Pederick, B. (2005). City of Melbourne draft graffiti management
strategy, 2005: Graffiti writers’ perspectives.
Halsey, M., & Young, A. (2002). Graffiti culture research report.
Hirschi, T. (1969). Causes of delinquency. Berkeley: University of California Press.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organiza-
tion of computer hackers. In F. Schmalleger & M. Pittaro (Eds.), Crimes of
the Internet (pp. 336–355). Upper Saddle River, NJ: Pearson Prentice Hall.
Holt, T. J., & Kilger, M. (2012). Know Your Enemy: The social dynamics of
hacking. The Honeypot Project. Retrieved from https://www.honeynet.org/
papers/socialdynamics. Accessed 28 May 2019.
Kellow, A., Julian, R., & Alessandrini, M. (2005). Young recidivist car theft
offender program (U-Turn). Local evaluation—Tasmania: Final report.
Hobart, Australia: Tasmanian Institute of Law Enforcement Studies.
Kinkade, P. T., Bachmann, M., & Bachmann, B. S. (2013). Hacker Woodstock:
Observations on an off-line cyber culture at the chaos communication camp
2011. In T. J. Holt (Ed.), Crime on-line: Correlates, causes, and context (2nd
ed., pp. 19–60). Raleigh, NC: Carolina Academic Press.
Koehler, J. A., Lösel, F., Akoensi, T. D., & Humphreys, D. K. (2013). A sys-
tematic review and meta-analysis on the effects of young offender treatment
programs in Europe. Journal of Experimental Criminology, 9, 19–43. https://
doi.org/10.1007/s11292-012-9159-7.
Leukfeldt, R., Kleemans, E. R., & Stol, W. (2017). Origin, growth, and criminal capa-
bilities of cybercriminal networks: An international empirical analysis. Crime, Law
and Social Change, 67, 39–53. https://doi.org/10.1007/s10611-016-9663-1.
Lipsey, M. W. (2009). The primary factors that characterize effective interven-
tions with juvenile offenders: A meta-analytic overview. Victims and Offenders,
4, 124–147. https://doi.org/10.1080/15564880802612573.
Lipsey, M. W., & Derzon, J. H. (1998). Predictors of serious delinquency in
adolescence and early adulthood: A synthesis of longitudinal research. In R.
Loeber & D. P. Farrington (Eds.), Serious and violent offenders: Risk fac-
tors and successful interventions (pp. 86–105). Thousand Oaks, CA: Sage.
https://doi.org/10.4135/9781452243740.n6.
Macdonnell, J. (2015). An evaluation of its Street Art and associated graffiti pre-
vention programs for Marrickville Council. Sydney, Australia: Anzarts Institute.
Maguin, E., & Loeber, R. (1996). Academic performance and delinquency.
Crime and Justice, 20, 145–264. https://doi.org/10.1086/449243.
7 POSITIVE DIVERSIONS 107
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking
in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35,
581–591. https://doi.org/10.1080/01639625.2013.867721.
McGrath, A., & Thompson, A. P. (2012). The relative predictive validity
of the static and dynamic domain scores in risk-need assessment of juve-
nile offenders. Criminal Justice and Behavior, 39, 250–263. https://doi.
org/10.1177/0093854811431917.
Meade, B., & Steiner, B. (2010). The total effects of boot camps that house
juveniles: A systematic review of the evidence. Journal of Criminal Justice, 38,
841–853. https://doi.org/10.1016/j.jcrimjus.2010.06.007.
Mitnick, K. D., & Simon, W. L. (2011). Ghost in the wires: My adventures as the
world’s most wanted hacker. New York, NY: Little, Brown.
Morris, R. G. (2011). Computer hacking and the techniques of neutralization:
An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hack-
ing and technology-driven crime: Social dynamics and implications (pp. 1–17).
Hershey, PA: IGI Global. https://doi.org/10.4018/9781616928056.ch001.
Morris, L., Sallybanks, J., & Willis, K. (2003). Sport, physical activity and antiso-
cial behaviour in youth (Research and Public Policy Series No. 49). Canberra,
Australia: Australian Institute of Criminology.
Opie, R. (2019, May 27). Adelaide teen hacked into Apple twice hoping the tech
giant would offer him a job. ABC News. Retrieved from https://www.abc.
net.au/news/2019-05-27/adelaide-teenager-hacked-into-apple-twice-in-
two-years/11152492. Accessed 6 June 2019.
Petrosino, A., Turpin-Petrosino, C., & Guckenburg, S. (2010). Formal system
processing of juveniles: Effects on delinquency. Campbell Systematic Reviews,
1. https://doi.org/10.4073/csr.2010.1.
Rapp-Paglicci, L. A., Ersing, R., & Rowe, W. (2006). The effects of cultural arts pro-
grams on at-risk youth: Are there more than anecdotes and promises? Journal of
Social Service Research, 33, 51–56. https://doi.org/10.1300/J079v33n02_05.
Rhule, D. M. (2005). Take care to do no harm: Harmful interventions for youth
problem behavior. Professional Psychology: Research and Practice, 36, 618–625.
https://doi.org/10.1037/0735-7028.36.6.618.
Rorie, M., Gottfredson, D. C., Cross, A., Wilson, D., & Connell, N. M. (2011).
Structure and deviancy training in after-school programs. Journal of Adolescence,
34, 105–117. https://doi.org/10.1016/j.adolescence.2010.01.007.
Schwalbe, C. S., Gearing, R. E., MacKenzie, M. J., Brewer, K. B., & Ibrahim,
R. (2012). A meta-analysis of experimental studies of diversion programs
for juvenile offenders. Clinical Psychology Review, 32, 26–33. https://doi.
org/10.1016/j.cpr.2011.10.002.
Seroczynski, A. D., Evans, W. N., Jobst, A. D., Horvath, L., & Carozza, G.
(2016). Reading for Life and adolescent re-arrest: Evaluating a unique juve-
nile diversion program. Journal of Policy Analysis and Management, 35, 662–
682. https://doi.org/10.1002/pam.21916.
108 R. BREWER ET AL.
Restorative Justice
Introduction
In this chapter, we consider the scope for the application of restora-
tive justice practices to cases of cybercrime. Restorative justice has been
defined as a ‘voluntary, community-based response to criminal behaviour
that attempts to bring together the victim, the offender, and the com-
munity, in an effort to address the harm caused by the criminal behav-
iour’ (Latimer et al. 2005, p. 131). Its focus, simply put, is restoration
rather than punishment. In most understandings of restorative justice,
restoration refers to assisting offenders as well as victims. This is one rea-
son why it has had extensive application to younger offenders and mainly
in relation to less serious forms of crime (Sherman and Strang 2007): in
contrast to formal criminal court processes, restorative justice generally
has a stronger victim orientation.
We begin this chapter by exploring the theoretical background and
rationale for restorative justice practices, before examining their effec-
tiveness in preventing criminal activity. As we will demonstrate, there
is very little empirical evidence to date of restorative justice for cyber-
crimes, although some anecdotal evidence of its trial use can be found.
Thus, we shall examine the evidence of restorative justice’s efficacy for
offline crimes, focusing on differences between crime types as well as
qualitative differences in the way restorative justice conferences are con-
ducted. Given the key findings in the broader literature, we then discuss
the applicability of restorative justice to the online context, accompa-
nied by recommendations on best practice for the deployment of such
interventions.
Current Applications
Restorative justice interventions most frequently take the form of confer-
ences and have been most commonly applied to young people, although
they have also been deployed with adults. While mainly targeted at crim-
inal offending, restorative justice has also been used to address student
behaviour management issues in schools (Morrison 2007; Fronius et al.
2016) and workplace bullying (Braithwaite 2013). Much of the focus
of restorative justice has been upon younger offenders as a diversion
from formal processing, though it can also be used as a supplement to
8 RESTORATIVE JUSTICE 113
Their findings suggest support for a more selective and targeted applica-
tion of restorative justice than is customary.
One of the possible impacts upon restorative justice’s effectiveness,
especially among young people, is its perceived lack of legitimacy (see
Tyler et al. 2007). Sherman and Strang (2007) observed a strong nega-
tive reactivity towards restorative justice in their Australian study involv-
ing Indigenous youth shoplifters. They speculate that this reaction may
only arise in relation to property offences because ‘it is arguable …
that a victim of property crime can be seen as part of an unfair system’
(Sherman and Strang 2007, p. 75). It may be, as Sherman and Strang
suggest, ‘that some people who are told they have behaved immor-
ally by other people they neither trust nor like will become more crim-
inal in future, rather than less’ (Sherman and Strang 2007, p. 75). As
Braithwaite (2018, p. 85) recently put it, ‘people who are well liked
but not loved are not potent at inducing remorse. Nor are the police’.
Perceptions of unfairness and injustice, it has been suggested, threaten
to undermine the legitimacy of formal procedures in dealing with cyber-
crime, as well as other kinds of offending (Holt et al. 2018). We will
return to this point further below.
Under these conditions, securing the participation of offenders in
restorative justice can be challenging, especially with younger offenders.
Their participation includes acknowledgement of the harm they have
caused. Without this, there is little prospect of ‘eliciting remorse for
the offender and allowing the victim to articulate harm’ (Rossner and
Bruce 2016, p. 116). Some offenders might not see their activities as
harmful, or if they do, they see their actions as justified. Others, often
younger offenders, lack the linguistic competence needed to communi-
cate an apology. Some young offenders also tend to view restorative jus-
tice in instrumental terms, seeing it as a ‘softer option’. In this context,
an effective apology or show of contrition will be unlikely (Sherman and
Strang 2007; Hayes and Daly 2003). Remorse appears as an important
component of desistance from crime (Hayes and Daly 2003; Piquero
2017; Tangney et al. 2011).
Addressing perceptions of fairness and justice is, therefore, important
in improving the potential efficacy of restorative justice. Hayes and Daly
(2004), in their study of 200 case histories of young offenders, exam-
ined the issue of variability within conferences. They concluded that
reoffending is less likely among young offenders involved in restorative
justice if they express remorse and where the agreements were the result
8 RESTORATIVE JUSTICE 117
of genuine consensus rather than being imposed upon the offender (see
also McGarrell and Hipple 2007; Maxwell and Morris 2001). Shapland
et al. (2008) found some significant relationships between adult offender
assessments of restorative justice and a number of measures of reoffend-
ing. These included ‘the extent to which the offenders felt the confer-
ence had made them realise the harm done’ (Shapland et al. 2008, p. iv).
Increasingly, it is seen as unrealistic to evaluate restorative justice out-
comes in the way other therapeutically intended interventions might be
evaluated. One reason is the short duration of a typical restorative jus-
tice conference. Second, as Weatherburn and Macadam (2013, p. 14)
have pointed out, restorative justice ‘was never designed to reduce the
risk factors known to be associated with involvement in crime’. Instead,
restorative justice might be better viewed as a ‘way of delivering multi-
ple strategies’ (Braithwaite 2018, p. 87) or, similarly put but in the lan-
guage of desistance, an opportunity to ‘facilitate a desire, or consolidate
a decision [by an offender] to desist’ (Robinson and Shapland 2008, p.
352). Hence, it has been suggested, restorative justice might be com-
bined ‘with correctional measures that have been shown to be effective
in reducing re-offending’ (Weatherburn and Macadam 2013, p. 14,
emphasis in original), such as family therapy programs (Schwalbe et al.
2012, p. 30). Latimer et al. (2005) undertook a meta-analysis of 35 pro-
grams, 26 of which were youth focused. While restorative justice could
be said to have delivered a statistically significant reduction in recidivism,
it was clear that generally speaking, psychologically informed treatments
yield much stronger impacts on reoffending (Latimer et al. 2005, p.
140). Linking restorative justice more effectively to programs of proven
efficacy, therefore, makes a lot of sense.
References
Bergseth, K., & Bouffard, J. (2013). Examining the effectiveness of a restorative
justice program for various types of juvenile offenders. International Journal
of Offender Therapy and Comparative Criminology, 57, 1054–1075. https://
doi.org/10.1177/0306624X12453551.
Braithwaite, J. (1989). Crime, shame and reintegration. Cambridge, UK:
Cambridge University Press. https://doi.org/10.1017/cbo9780511804618.
Braithwaite, V. (2013). A multipronged approach to the regulation of workplace
bullying (Regulatory Institutions Network, RegNet Occasional Paper 20).
Canberra, Australia: Australian National University.
Braithwaite, J. (2018). Minimally sufficient deterrence. In M. Tonry (Ed.),
Crime and justice: A review of research (Vol. 47, pp. 69–118). Chicago, IL:
The University of Chicago Press.
Brewer, R., Fox, S., & Miller, C. (2019). Applying the techniques of neutraliza-
tion to the study of cybercrime. In T. Holt & A. Bossler (Eds.), The Palgrave
handbook of international cybercrime and cyberdeviance. Palgrave. https://doi.
org/10.1007/978-3-319-90307-1_22-1.
Button, M., McNaughton, N., Kerr, J., & Owen, R. (2015). Online fraud vic-
tims in England and Wales: Victims’ views on sentencing and the opportu-
nity for restorative justice? The Howard Journal, 54, 193–211. https://doi.
org/10.1111/hojo.12123.
Claes, B., & Shapland, J. (2016). Desistance from crime and restorative justice.
Restorative Justice, 4, 302–322. https://doi.org/10.1080/20504721.2016.1
245912.
Freitas, P., & Palermo, P. (2016). Restorative justice and technology. In P.
Novais (Ed.), Interdisciplinary perspectives on contemporary conflict resolu-
tion (pp. 80–94). Hershey, PA: Information Science Reference. https://doi.
org/10.4018/978-1-5225-0245-6.
Fronius, T., Persson, H., Guckenberg, S., Hurley, N., & Petrosino, A. (2016).
Restorative justice in US schools: A research review. San Francisco, CA: WestEd.
Hayes, H., & Daly, K. (2003). Youth justice conferencing and reof-
fending. Justice Quarterly, 20, 725–764. https://doi.org/10.1080/
07418820300095681.
8 RESTORATIVE JUSTICE 121
Hayes, H., & Daly, K. (2004). Conferencing and re-offending in Queensland. ANZ
Journal of Criminology, 37, 167–191. https://doi.org/10.1375/acri.37.2.167.
Holt, T. J., Brewer, R., & Goldsmith, A. (2018). Digital drift and the “sense
of injustice”: Counter-productive policing of youth cybercrime. Deviant
Behaviour, 1–13. https://doi.org/10.1080/01639625.2018.1472927.
Latimer, J., Dowden, C., & Muise, D. (2005). The effectiveness of restorative
justice practices: A meta-analysis. The Prison Journal, 85, 127–144. https://
doi.org/10.1177/0032885505276969.
Lauwaert, K., & Aertsen, I. (Eds.). (2015). Desistance and restorative justice:
Mechanisms for desisting from crime within restorative justice practices. Leuven,
Belgium: European Forum for Restorative Justice.
Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2015). The impli-
cations of economic cybercrime for policing. London, UK: City of London
Corporation.
Livingstone, N., Macdonald, G., & Carr, N. (2013). Restorative justice confer-
encing for reducing recidivism in young offenders (aged 7 to 21). Cochrane
Database of Systematic Reviews, 2. https://doi.org/10.1002/14651858.
CD008898.pub2.
Maxwell, G., & Morris, A. (2001). Family group conferences and reoffend-
ing. In A. Morris & G. Maxwell (Eds.), Restorative justice for juveniles:
Conferencing, mediation and circles (pp. 243–263). Oxford, UK: Hart.
https://doi.org/10.5040/9781472559111.ch-013.
McGarrell, E. F., & Hipple, N. (2007). Family group conferencing and re-of-
fending among first time juvenile offenders: The Indianapolis experiment.
Justice Quarterly, 24, 1–26. https://doi.org/10.1080/07418820701294789.
Morrison, B. (2007). Restoring safe school communities: A whole school response to
bullying, violence and alienation. Sydney, Australia: The Federation Press.
Piquero, A. (2017). ‘No remorse, no repent’: Linking lack of remorse to criminal
offending in a sample of serious adolescent offenders. Justice Quarterly, 34,
350–376. https://doi.org/10.1080/07418825.2016.1185530.
Robinson, G., & Shapland, J. (2008). Reducing recidivism: A task for restora-
tive justice? British Journal of Criminology, 48(3), 337–358. https://doi.
org/10.1093/bjc/azn002.
Rossner, M., & Bruce, J. (2016). Community participation in restorative justice:
Rituals, reintegration, and quasi-professionalization. Victims and Offenders,
11, 107–125. https://doi.org/10.1080/15564886.2015.1125980.
Schwalbe, C. S., Gearing, R. E., MacKenzie, M. J., Brewer, K. B., & Ibrahim,
R. (2012). A meta-analysis of experimental studies of diversion programs
for juvenile offenders. Clinical Psychology Review, 32, 26–33. https://doi.
org/10.1016/j.cpr.2011.10.002.
Shapland, J., Atkinson, A., Atkinson, H., Dignan, J., Edwards, L., Hibbert, J.,
et al. (2008). Does restorative justice affect reconviction? The fourth report from
the evaluation of three schemes. London, UK: Ministry of Justice.
122 R. BREWER ET AL.
Sherman, L. W., & Strang, H. (2007). Restorative justice: The evidence. London,
UK: The Smith Institute.
Sherman, L. W., Strang, H., Barnes, G., Woods, D. J., Bennett, S., Inkpen,
N., et al. (2015). Twelve experiments in restorative justice: The Jerry Lee
program of randomized trials of restorative justice conferences. Journal
of Experimental Criminology, 11, 501–540. https://doi.org/10.1007/
s11292-015-9247-6.
Sherman, L. W., Strang, H., & Woods, D. J. (2000). Recidivism patterns in the
Canberra Reintegrative Shaming Experiments (RISE). Canberra, Australia:
Australian National University.
Strang, H., Sherman, L. W., Mayo-Wilson, E., Woods, D., & Ariel, B. (2013).
Restorative Justice Conferencing (RJC) using face-to-face meetings of offend-
ers and victims: Effects on offender recidivism and victim satisfaction: A sys-
tematic review. Campbell Systematic Reviews, 12. https://doi.org/10.4073/
csr.2013.12.
Tangney, J. P., Stuewig, J., & Hafez, L. (2011). Shame, guilt, and remorse:
Implications for offender populations. Journal of Forensic Psychiatry and
Psychology, 22(5), 706–723. https://doi.org/10.1080/14789949.2011.617541.
Tyler, T. R. (1990). Why people obey the law. New Haven, CT: Yale University
Press.
Tyler, T. R., Sherman, L., Strang, H., Barnes, G. C., & Woods, D. (2007).
Reintegrative shaming, procedural justice and recidivism: The engage-
ment of offenders’ psychological mechanisms in the Canberra RISE drink-
ing-and-driving experiment. Law and Society Review, 41, 553–586. https://
doi.org/10.1111/j.1540-5893.2007.00314.x.
Walters, M. (2015). ‘I thought “He’s a monster”… [But] he was just… nor-
mal’: Examining the therapeutic benefits of restorative justice for homicide.
British Journal of Criminology, 55, 1207–1225. https://doi.org/10.1093/
bjc/azv026.
Weatherburn, D. & Macadam, J. (2013). A review of restorative justice responses
to offending. Evidence Base, 1. https://doi.org/10.4225/50/5581143377
30E.
Wilson, D. B., Olaghere, A., & Kimbrell, C. S. (2017). Effectiveness of restorative
justice principles in juvenile justice: A meta-analysis. Fairfax, VA, USA: George
Mason University.
Wong, J., Bouchard, J., Gravel, J., Bouchard, M., & Morselli, C. (2016). Can
at-risk youth be diverted from crime? A meta-analysis of restorative diver-
sion programs. Criminal Justice and Behavior, 43, 1310–1329. https://doi.
org/10.1177/0093854816640835.
Zehr, H. (2002). The little book of restorative justice. Intercourse, PA: Good Books.
PART IV
New Directions
CHAPTER 9
As demonstrated across this book, to date there has been very little
to no research evaluating the effects of crime prevention initiatives on
cybercrime. Chapter 2 demonstrated that situational crime prevention
(SCP) was by far the most commonly deployed cybercrime interven-
tion, with some robust evidence (i.e. experimental and quasi-experimen-
tal studies) indicating that particular forms of SCP have showed some
1 We acknowledge that elsewhere, less methodologically robust studies have also exam-
ined the merits of other SCP approaches within cybercrime contexts, including the use of
firewalls and passwords, vulnerability patching, police crackdowns, intrusion detection and
prevention systems, honeypots, audit trails, website takedowns, fraud detection systems,
and spam filtering (see further Chapter 2).
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 127
are frequently mischievous (Hutchings and Holt 2018). If they are aware
that different interventions are being applied, along with requests to
speak to a researcher, they could potentially conspire together when pro-
viding responses to influence the results of an experimental design.
Finally, to draw robust conclusions, any evaluation, be it experimen-
tal, quasi-experimental or otherwise, needs adequate statistical power.
This is a large subject in and of itself, and while some researchers have
sought to set guidelines on such (e.g. Welsh and Farrington [2001] pro-
pose that for experimental designs, there should be a minimum of 50
units in each category in order to balance the treatment and compari-
son groups on extraneous variables), the reality is far more complex than
this. Statistical power is a function of several factors, including the effect
size of the intervention—that is, how much the intervention reduces the
outcome variable (crime). The smaller the expected effect size, the larger
the sample must be to detect a statistically significant effect, holding
everything else constant. Underpowered studies are also more likely to
produce false positive results, that is, effects that are not real (Ioannidis
2005). Furthermore, if the experiment aims to identify if there are differ-
ential (interaction) effects, such as whether the intervention works dif-
ferently for some populations than others, larger sample sizes are usually
needed (Sherman 1984). Required sample size can thus be calculated by
determining the anticipated size of the effect (Cohen 1992), or alterna-
tively, the smallest effect size of interest—that is, the minimum reduction
in crime as a result of the intervention that may be considered practi-
cally meaningful or important (see King 2001). For researchers and pol-
icymakers concerned with cost-effectiveness, for example, knowing the
absolute number of cybercrimes averted by a particular intervention
would be a key consideration to build into evaluation design. Yet, finding
enough participants (that is, cyber-offenders) to conduct a high-powered
evaluation that can answer such questions is likely to be challenging.
a 25% response rate with their survey of booter service providers, but
they sent up to four invitations to each subject. They also compared
invitations to participate in an online survey versus an interactive online
interview and found the former to elicit more responses (although those
who took part in an interview answered more questions). In addition,
the potential for attrition during follow-up periods should be considered
(Farrington and Welsh 2005). For example, some individuals may not
participate in self-report surveys during follow-up periods. Others may
opt to have their data removed from the analysis, their whereabouts may
not be ascertained, or they may have died.
Another important source of data is official records/reports. This
involves examination of records held by government sources, such as
through the criminal justice system, including police arrest records,
offender databases, court, and other records (e.g. data collected from
schools, corrections, social services, etc.). Such data have been used by
criminologists for over a century for the analysis of crime and criminal
justice trends. Criminal justice data can yield unique and potentially
detailed insights into offending and offender characteristics that can be
particularly useful in evaluating interventions. For example, such data
can provide essential information about crime events, as well as offenders
and their offending. It can contain information on all reported crimes,
arrests, and convictions.
Many scholars have noted, however, that conducting research using
criminal justice data presents numerous challenges. Gaining access
to quality, usable data is arguably one of the greatest challenges facing
researchers seeking to evaluate interventions. Such research requires the
assistance of the relevant agency or body that maintains official records
of contact (with the criminal justice system or otherwise). Data access
would need to be negotiated and is by no means assured. Such access
procedures may be labour-intensive, time-consuming and also poten-
tially come at a financial cost. In addition, much official data have origi-
nally been collected for other purposes and must, therefore, be prepared
for evaluation research. As such, any data extracted and used by the
researcher would also first need to be searched, matched, and provided
in a de-identified format suitable for analysis.
Researchers have also long understood that such data are both incom-
plete and limited (Becker 1963), which therefore frames the ways in
which it should be understood, as well as limits analysis and interpre-
tation. Notably, such data include only a sample of criminal events and
136 R. BREWER ET AL.
offenders, including only those who have come to the attention of law
enforcement. This makes the true extent of crime difficult to measure,
particularly crimes that are less likely to be reported or are more cov-
ert in nature. Cybercrime is often a particularly hidden crime, and many
offenders never come to the attention of law enforcement. Cyber-
offenders may also be particularly likely to ‘drift’ into and out of offend-
ing (Goldsmith and Brewer 2015), and there may be significant gaps
in time involved. Online offenders often believe that they will never be
detected (Hutchings 2016), and in many cases, they will be right. This
point is demonstrated using data collected by Hutchings (2019): those
arrested, charged, and prosecuted for online offences were offending
for an average of 1.7 years, and in some cases as many as 8 years, before
being detected. This can be particularly problematic for research evaluat-
ing a cybercrime intervention, as failure to detect offending will have an
adverse effect on the accuracy of the results of the evaluation.
Relatedly, when analysing official data, it is important to recognise
that even if crime is reported, there can be many delays in the system
that can impact the quality of the data. For example, Kleinman and
Lukoff (1981) reviewed the criminal records of heroin addicts shortly
after the end of their methadone treatment, and again two years later.
They found that there could be a ‘noticeable lag’ in time between
a crime and its entry into the official records. In a more recent exam-
ple, Ringland (2013) compared estimates of reoffending obtained from
police and court data. They found that the median time between reof-
fending and police commencing court proceedings was one day, while
the time until finalisation in court was 86 days.
Measurements using official data do not suffer from the same par-
ticipation biases as self-reported offending. However, researchers using
official data must be aware of other biases. First, the data made available
to researchers are unlikely to offer a complete picture of offending, but
may instead be shaped by the assumptions, methods and priorities of the
original custodians of the data (Faust and Tita 2019). Put another way,
these custodians may have introduced their own biases into the data.
For example, arrest data will be reflective of who is actually detected by
law enforcement—which in turn may be influenced by choices made
by police about which cybercrimes, individuals or online spaces (e.g.
particular web forums or illicit markets) to target; what investigative
techniques, capabilities, and resources are available; and staffing require-
ments. Cybercrime investigations and prosecutions can be long, costly,
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 137
What the actual f*ck! Got a letter from the NCA to my NEW address
regarding the use of BlackShades… I never f*cking bought BlackShades nor
did I ever use it due to hearing about it’s … backdoor. This is f*cking horse
sh*t - luckily no arrest made but they’ve asked me to destroy it if I still have
possession.. I never had f*cking possession.. I never touched that f*cking
sh*t.. I’m not sure if others in the UK got this but this is bullsh*t. It’s dated
the 1st of July; it took 23 days to deliver this sh*t.. (Fun fact; I’m about
200 meters from a police station).. Yeah I blanked my first name; plenty of
people know it; I know. I never touched BlackShades so I don’t give a f*ck
- I’m more bothered about how my name and stuff got in their database -
they clearly got my new address due to me registering to vote ect. Plus I got
nothing to hide so I didn’t exactly hide it.
138 R. BREWER ET AL.
This post resulted in robust discussion and debate among forum users
regarding both the merits of intervention, as well as speculation sur-
rounding the processes by which the National Crime Authority (NCA)
may have compiled its dataset. On this latter point, one commenter
within the same thread suggested that someone else could have used the
recipient’s email address, which might explain why they had received the
letter without having purchased Blackshades. Another provided an alter-
nate explanation:
Probably they busted the guy who made the blackshades and contacted
paypal for the names of all the people who purchased it; then send the let-
ter to all the names; hoping to scare them and make them delete it. Your
name was going in the list probably because you purchased something
rat-related (crypters).
As the result of such discussions, users who were not given the inter-
vention might be deterred indirectly (no longer acting as an appropriate
control condition), or users could displace to a different service that is
not being monitored (e.g. another web forum or illicit market). In addi-
tion, it is entirely possible that police or investigative agencies endowed
with this type of access may elect to use it for covert monitoring or
high-profile arrests rather than for research purposes such as evaluating
interventions.
It is also possible that the user above was in fact telling the truth.
Sometimes those that are targeted for intervention may not necessar-
ily be connected to any actual cybercrime activities. Evaluations relying
upon observations or monitoring of cybercrime must, therefore, con-
sider available data with caution, as the attribution of cybercrimes can
be difficult to accurately discern. While there can be indicators as to
who was involved in an incident, these can often be faked, particularly
by more skilled offenders. For example, the mapping of IP addresses
to subscriber information, which is often used for attribution, is not
always perfect. Offenders can use VPNs, proxy servers, anonymity net-
works, or unsecured Wi-Fi connections. Attribution can also fail due to
human error, such as incorrectly recording the IP address (Champion
2017). Most consumer IP addresses now change over time, so attribu-
tion depends on accurate reading and recording of time zones (Clayton
2005). Furthermore, account takeovers can be targeted in order to ‘set
up’ a rival or take advantage of their status and reputation. There can
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 139
only does this serve as a burden to participants, but there are also impli-
cations for data quality if it results in a higher refusal rate (i.e. a less rep-
resentative sample) (see further Clark 2008).
In this final section, we draw together the key challenges identified in the
above discussion and offer a number of recommendations for research-
ers and practitioners seeking to undertake evaluations of cybercrime
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 141
References
Bachman, R. D., & Schutt, R. K. (2016). The practice of research in criminology
and criminal justice (6th ed.). Los Angeles, CA: Sage.
Ball, M., Broadhurst, R., Niven, A., & Trivedi, H. (2019). Data cap-
ture and analysis of darknet markets. Retrieved from https://ssrn.com/
abstract=3344936; http://dx.doi.org/10.2139/ssrn.3344936.
Baruch, Y., & Holtom, B. C. (2008). Survey response rate levels and trends in
organizational research. Human Relations, 61(8), 1139–1160. https://doi.
org/10.1177/0018726708094863.
Becker, H. (1963). Outsiders. New York, NY: Free Press.
Bleakley, P. (2018). Watching the watchers: Taskforce Argos and the evidentiary
issues involved with infiltrating Dark Web child exploitation networks. The
Police Journal: Theory, Practice and Principles, 1–16. https://doi.org/10.11
77/0032258X18801409.
Champion, M. (2017, May 13). This is what it’s like to be wrongly accused of
being a paedophile because of a typo by police. BuzzFeed News. Retrieved from
https://www.buzzfeed.com/matthewchampion/this-mans-life-was-de-
stroyed-by-a-police-typo. Accessed 20 July 2019.
Christin, N. (2013, May 13–17). Traveling the Silk Road: A measurement anal-
ysis of a large anonymous online marketplace. In WWW ’13 Proceedings of the
22nd International Conference on World Wide Web. New York, NY: ACM.
https://doi.org/10.1145/2488388.2488408.
Clark, T. (2008). ‘We’re over-researched here!’: Exploring accounts of research
fatigue within qualitative research engagements. Sociology, 42(5), 953–970.
https://doi.org/10.1177/0038038508094573.
Clayton, R. (2005). Anonymity and traceability in cyberspace (Technical Report
No. 653). Cambridge, UK: University of Cambridge, Computer Laboratory.
Cohen, J. (1992). A power primer. Quantitative Methods in Psychology, 112(1),
155–159. https://doi.org/10.1037/0033-2909.112.1.155.
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 143
Holt, T. J., Brewer, R., & Goldsmith, A. (2018). Digital drift and the “sense
of injustice”: Counter-productive policing of youth cybercrime. Deviant
Behavior, 1–13. https://doi.org/10.1080/01639625.2018.1472927.
Hutchings, A. (2016). Cybercrime trajectories: An integrated theory of ini-
tiation, maintenance, and desistance. In T. J. Holt (Ed.), Crime online:
Correlates, causes, and context (pp. 117–140). Durham, UK: Caroline
Academic Press.
Hutchings, A. (2019). Cambridge Computer Crime Database. Retrieved from
http://www.cl.cam.ac.uk/~ah793/cccd.html. Accessed 2 January 2018.
Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter
services. Deviant Behavior, 37(10), 1163–1178. https://doi.org/10.1080/0
1639625.2016.1169829.
Hutchings, A., Clayton, R., & Anderson, R. (2016, June 1–3). Taking down
websites to prevent crime. In 2016 APWG Symposium on Electronic Crime
Research (eCrime). IEE. https://doi.org/10.1109/eCRIME.2016.7487947.
Hutchings, A., & Holt, T. J. (2017). The online stolen data market: Disruption
and intervention approaches. Global Crime, 18(1), 11–30. https://doi.org/1
0.1080/17440572.2016.1197123.
Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders. Journal
of Qualitative Criminal Justice & Criminology, 7(1), 75–94.
Ioannidis, J. P. (2005). Why most published research findings are false. PLoS
Med. 2, e124. https://doi.org/10.1371/journal.pmed.0020124.
King, M. (2001). A point of minimal important difference (MID): A critique of
terminology and methods. Expert Review of Pharmacoeconomics and Outcomes
Research, 11(2), 171–184. https://doi.org/10.1586/erp.11.9.
Kleinman, P. H., & Lukoff, I. F. (1981). Official crime data. Criminology, 19(3),
449–454. https://doi.org/10.1111/j.1745-9125.1981.tb00429.x.
Mazerolle, L. G., Roehl, J., & Kadleck, C. (1998). Controlling social disorder
using civil remedies: Results from a randomized field experiment in Oakland,
California. Crime Prevention Studies, 9, 141–159.
McCord, J. (2003). Cures that harm: Unanticipated outcomes of crime preven-
tion programs. The ANNALS of the American Academy of Political and Social
Science, 587(1), 16–30. https://doi.org/10.1177/0002716202250781.
Moore, T., & Clayton, R. (2011). Ethical dilemmas in take-down research. In G.
Danezis, S. Dietrich, & K. Sako (Eds.), Financial cryptography and data security
workshop. FC 2011 (Lecture Notes in Computer Science, Vol. 7126, pp. 154–168).
Berlin, Germany: Springer. https://doi.org/10.1007/978-3-642-29889-9_14.
Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018, April 23–27).
CrimeBB: Enabling cybercrime research on underground forums at scale. In
WWW ’13 Proceedings of the 2018 World Wide Web Conference (pp. 1845–
1854). ACM. https://doi.org/10.1145/3178876.3186178.
9 DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS … 145
Ringland, C. (2013). Measuring recidivism: Police versus court data. Crime and
Justice Bulletin, 175, 1–12.
Schell, B. H., & Melnychuk, J. (2011). Female and male hacker conferences
attendees: Their autism-spectrum quotient (AQ) scores and self-reported
adulthood experiences. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking
and technology-driven crime: Social dynamics and implications (pp. 144–169).
Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61692-805-6.
ch008.
Shaw, I., Greene, J., & Mark, M. (Eds.). (2006). The Sage handbook of evalua-
tion. London, UK: Sage. https://doi.org/10.4135/9781848608078.n11.
Sherman, L. W. (1984). Experiments in police discretion: Scientific boon or dan-
gerous knowledge? Law and Contemporary Problems, 47(4), 61–81.
Sherman, L. W. (1993). Defiance, deterrence, and irrelevance: A theory of the
criminal sanction. Journal of Research in Crime and Delinquency, 30(4), 445–
473. https://doi.org/10.1177/0022427893030004006.
Sherman, L. W., Gottfredson, D. C., MacKenzie, D. L., Eck, J., Reuter, P., &
Bushway, S. D. (1998). Preventing crime: What works, what doesn’t, what’s
promising. In National Institute of Justice: Research in brief. Washington, DC:
U.S. Department of Justice.
Sherman, L. W., Schmidt, J. D., Rogan, D. P., Smith, D. A., Gartin, P. R., Cohn,
E. G., et al. (1992). The variable effects of arrest on criminal careers: The
Milwaukee domestic violence experiment. The Journal of Criminal Law and
Criminology, 83, 137–169. https://doi.org/10.2307/1143827.
Simons, H. (2006). Ethics in evaluation. In I. Shaw, J. Greene, & M. Mark
(Eds.), The Sage handbook of evaluation (pp. 243–265). London, UK: Sage.
https://doi.org/10.4135/9781848608078.n11.
Smith, R. G., Grabosky, P., & Urbas, G. (2004). Cyber criminals on trial.
Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/
cbo9780511481604.
Snowball, L. (2008). Diversion of Indigenous juvenile offenders. Trends
and Issues in Crime and Criminal Justice (No. 355). Canberra, Australia:
Australian Institute of Criminology.
Soska, K., & Christin, N. (2015, August 12–14). Measuring the longitudinal evo-
lution of the online anonymous marketplace ecosystem. In Proceedings of the
24th USENIX Security Symposium, Washington, D.C. (pp. 33–48). USENIX.
Torres, J. M., Sarriegi, J. M., Santos, J., & Serrano, N. (2006). Managing
information systems security: Critical success factors and indicators to meas-
ure effectiveness. In S. K. Katsikas, J. López, M. Backes, & S. Gritzalis
(Eds.), Information security. ISC 2006 (Lecture Notes in Computer
Science, Vol. 4176, pp. 530–545). Berlin, Germany: Springer. https://doi.
org/10.1007/11836810_38.
146 R. BREWER ET AL.
A C
academic programs, 99, 100 Canberra Re-Integrative Shaming
account takeover, 138. See also Experiments (RISE). See
cyber-dependent crime, definition Re-Integrative Shaming
adaptation, creative, 86 Experiments (RISE)
advertising, 40. See also mass media cautions, police, 7, 67, 77, 79, 126
campaigns cease-and-desist-messaging, 8–10, 78
All Stars Program, 56 chilling effects, 86
antivirus software, 21–23, 126 computer monitoring, 25, 126
definition, 21, 126 computer security employment. See
evaluation of, 21 Cybersecurity employment
audit trails, 20, 126 computer surveillance, 18, 20, 25, 26,
126. See also warning messages
crackdowns, police, 20
B Crime Stoppers, 42
Big Brothers Big Sisters, 66, 67 criminal behaviour, risk factors for, 4
Blackshades, 80, 130, 137, 138, 140 cryptomarket trade, 38
boot camps, 97 cultural arts programs, 98
Brothers Project, 68 cyberbullying, 54, 55, 58
Cyberchoices, 38