Posts

News Posts Non classé

Call for papers – Special issue of Social Science Computer Review on the Human Factor in Cybercrime

As technology access and use evolves across demographic groups and regions of the world, the threat posed by its misuse will continue to grow. Research examining the phenomena of cybercrime, or the misuse of technology in order to offend, is vital to increase our understanding of the nature of offender behavior, correlates of victimization, and […] Read more

News Posts Publications

Nouvelle publication: “The cyber-resilience of financial institutions: significance and applicability”

B. Dupont (2019), The cyber-resilience of financial institutions: significance and applicability, Journal of Cybersecurity, 5 (1), 1-17. Abstract: The growing sophistication, frequency and severity of cyberattacks targeting financial sector institutions highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive complementary alternative to […] Read more

News Posts Publications

Nouvelle publication: “Exploring the factors associated with rejection from a closed cybercrime community”

T. Holt, and B. Dupont (2018), Exploring the factors associated with rejection from a closed cybercrime community, International Journal of Offender Therapy and Comparative Criminology, DOI: 10.1177/0306624X18811101. Abstract: Research examining the illicit online market for cybercrime services operating via web forums, such as malicious software, personal information, and hacking tools, has greatly improved our understanding of the practices of […] Read more

News Posts Publications

Nouvelle publication: “Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire”

M. Bérubé, and B. Dupont (2018), Mujahideen mobilization: Examining the evolution of the global jihadist movement’s communicative action repertoire, Studies in Conflict & Terrorism, DOI: 10.1080/1057610X.2018.1513689. Abstract: Drawing on Tilly’s notion of “repertoire of action,” this article shows how the evolution of the global jihadist movement’s communicative action repertoire has increased the potential resonance of its discourse. It foresees the construction […] Read more

News Posts Publications

Nouvelle publication: “From online to offline sexual offending: Episodes and obstacles”

F. Fortin, S. Paquette, and B. Dupont (2018), From online to offline sexual offending: Episodes and obstacles, Aggression and Violent Behavior, 39, 33-41. Abstract: Script theory explains how different types of crime may be committed in a particular sequence. While researchers have traditionally been interested in crimes against property and crimes against persons, this study analyzes a new […] Read more

News Posts Publications

Nouvelle publication: “Internet et propagande jihadiste : la régulation polycentrique du cyberespace”

V. Crosset et B. Dupont (2018), Internet et propagande jihadiste: la régulation polycentrique du cyberespace, Critique Internationale, (78), 107-125. Abstract: In recent years, governments and civil society groups have blamed the Internet for spreading jihadist content. States, technology companies and civil society groups have established monitoring practices and solutions to address these concerns, which have assumed an international […] Read more

News Posts Publications

New publication: "La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale"

B. Dupont, (2016), La gouvernance polycentrique du cybercrime: Les réseaux fragmentés de la coopération internationale, Cultures et Conflits, (102), 95-120. Abstract: One of the main features of digital crime is its transnational character, which seems to pose a major challenge to the harmonization and coordination of police resources, which are by definition local. However, an empirical analysis of the […] Read more

News Posts

Conférence au Coeur des sciences de l’UQAM (23 février 2017) – La cybersécurité est-elle possible?

This content is not available in the selected language. Avec plus de 230 000 attaques par jour contre des états, des entreprises ou des individus, serons-nous un jour capable d’assurer notre cybersécurité? Quelles sont les contraintes techniques, légales, diplomatiques, économiques et politiques à surmonter? À quels différents types d’attaques et d’attaquants faisons-nous face? Revient-il aux militaires, […] Read more

News Posts Publications

New publication: "Les liens faibles du crime en ligne: écologie de la méfiance au sein de deux communautés de hackers malveillants"

B. Dupont, (2016), Les liens faibles du crime en ligne: écologie de la méfiance au sein de deux communautés de hackers malveillants, Réseaux, (197-198), 109-136. Abstract: The trust dilemma that online offenders face is often underestimated in studies on the transformations of criminality that the digital revolution triggered. However, in a context where various forms of technical and […] Read more