Abstract
The expansion of the internet from the late 1990s with advancements in speed, capacity, and availability has revolutionized the lives of many people throughout the world. However, this same technology is also exploited as a ubiquitous crime site by cybercriminals. A consequence of this has been the emergence of a new investigative resource for criminological researchers to examine cybercrime. Just as criminals have developed their technical expertise, it is important that criminological researchers develop new digital skills and methodological approaches to better understand criminal behavior in cyberspace and implement evidence-based prevention measures. There are many open-source programming languages, libraries, and tools to help the modern criminologist process large volumes of data efficiently, accurately, and repeatably. This chapter will discuss how using techniques exploited in other fields, such as software engineering and data science, digital criminologists can quickly test ideas, process large data sets, and share ideas, techniques, and data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alnabulsi, H., & Islam, R. (2018). Identification of illegal forum activities inside the Dark Net (pp. 22–29). International Conference on Machine Learning and Data Engineering (iCMLDE), Sydney, Australia.
Baravalle, A., Sanchez Lopez, M., & Wee Lee, S. (2017). Mining the Dark Web: Drugs and fake ids. 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW) Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ICDMW.2016.0056.
Beaulieu, A. (2020). Learning SQL: Generate, manipulate, and retrieve data(3rd ed.). O’Reilly Media.
Beighley, L. (2007). Head first SQL: Your brain on SQL.A Learner’s Guide. O’Reilly Media.
Chan, J., & Bennet Moses, L. (2017). Is Big Data challenging Criminology? Theoretical Criminology,20(1), 21–39.
Cubitt, T. I. C., Wooden, K. R., & Roberts, K. A. (2020). A machine learning analysis of serious misconduct among Australian police. Crime Science,9(22), 1–13.
Freeman, E., & Robson, E. (2020). Head first design patterns: A brain-friendly guide: Building extensible and maintainable object-oriented software(2nd ed.). O’Reilly Media.
Geron, A. (2019). Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and techniques to build intelligent systems(2nd ed.). O’Reilly Media.
Godsey, B. (2017). Think like a data scientist: Tackle the data science process step-by-step. Manning Publications.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior,28(2), 171–198.
Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review,31(2), 165–177.
Internet World Stats. (2020). IWS usage and population statistics. Available at: https://www.internetworldstats.com/.
Kleck, G., Tark, J., & Bellows, J. J. (2006). What methods are most frequently used in research in criminology and criminal justice? Journal of Criminal Justice,34(2), 147–152.
Lavorgna, A., Middleton, S., Pickering, B., & Neumann, G. (2020). FloraGuard: Tackling the online illegal trade in endangered plants through a cross-cutting disciplinary ICT-enabled methodology. Journal of Contemporary Criminal Justice,36(3), 1–23.
Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (2009). A brief history of the Internet. ACM SIGCOMM Computer Communication Review,39(5), 22–31.
Martin, J. (2014). Lost on Silk Road. Online drug distribution and the “cryptomarket”. Criminology and Criminal Justice, 14(3), 363–388.
Matthes, E. (2019). Python crash course: A hands-on, project-based introduction to programming paperback (2nd ed.). No Starch Press.
McAlister, R., & Monaghan, R. (2020). Animal rights extremism and the internet. In M. Littler & B. Lee (Eds.), Digital extremisms: Readings in violence, radicalisation and extremism in the online space. MacMillan.
McCallum, Q. E. (2012). Bad data handbook: Cleaning up the data so you can get back to work. O’Reilly Media.
Motoyama, M., Mccoy, D. Levchenko, K., Savage, S., & Voelker, G. (2012). An analysis of underground forums. https://doi.org/10.1145/2068816.2068824.
Pastrana S., Hutchings A., Caines A., & Buttery P. (2018). Characterizing eve: Analysing cybercrime actors in a large underground forum. In M. Bailey, T. Holz, M. Stamatogiannakis, & S. Ioannidis (Eds.), Research in attacks, intrusions, and defenses. RAID 2018. Lecture Notes in Computer Science, Vol 11050. Springer, Cham. https://doi.org/10.1007/978-3-030-00470-5_1.
Pete, I., Hughes, J. Chua Y. T. & Bada, M. (2020). A social network analysis and comparison of six dark web forums (pp. 484–493). 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy. https://doi.org/10.1109/EuroSPW51379.2020.0007.
Python Software Foundation. (2020). Beginners guide. Available at: https://wiki.python.org/moin/BeginnersGuide.
Ramalho, L. (2015). Fluent Python: Clear concise, and effective programming. O’Reilly Media.
Shaw, Z. (2017). Learn Python 3 the hard way (4th ed.). Addison-Wesley Professional.
Stratton, G., Powell, A., & Cameron, R. (2017). Crime and justice in a digital Society. Towards a digital Criminology? International Journal for Crime Justice and Social Democracy, 6(2), 17–33.
Tavabi, N., Bartley, N. Abeliuk, A., Sandeep, S., Ferrara, E. & Lerman, K. (2019). Characterizing activity on the deep and dark web. Companion Proceedings of the 2019 World Wide Web Conference, 206–213. https://doi.org/10.1145/3308560.3316502.
van Gelder, J., & Van Daele, S. (2014). Innovative data collection methods in criminological research: Editorial introduction. Crime Science,3, 6.
Weimann, G. (2016). Going dark: Terrorism on the dark web. Studies in Conflict and Terrorism,39(3), 195–207.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
McAlister, R., Campbell-West, F. (2021). Programming the Criminologist: Developing Cyber Skills to Investigate Cybercrime. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-74837-1_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-74836-4
Online ISBN: 978-3-030-74837-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)