Skip to main content

Programming the Criminologist: Developing Cyber Skills to Investigate Cybercrime

  • Chapter
  • First Online:
Researching Cybercrimes

Abstract

The expansion of the internet from the late 1990s with advancements in speed, capacity, and availability has revolutionized the lives of many people throughout the world. However, this same technology is also exploited as a ubiquitous crime site by cybercriminals. A consequence of this has been the emergence of a new investigative resource for criminological researchers to examine cybercrime. Just as criminals have developed their technical expertise, it is important that criminological researchers develop new digital skills and methodological approaches to better understand criminal behavior in cyberspace and implement evidence-based prevention measures. There are many open-source programming languages, libraries, and tools to help the modern criminologist process large volumes of data efficiently, accurately, and repeatably. This chapter will discuss how using techniques exploited in other fields, such as software engineering and data science, digital criminologists can quickly test ideas, process large data sets, and share ideas, techniques, and data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alnabulsi, H., & Islam, R. (2018). Identification of illegal forum activities inside the Dark Net (pp. 22–29). International Conference on Machine Learning and Data Engineering (iCMLDE), Sydney, Australia.

    Google Scholar 

  • Baravalle, A., Sanchez Lopez, M., & Wee Lee, S. (2017). Mining the Dark Web: Drugs and fake ids. 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW) Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/ICDMW.2016.0056.

  • Beaulieu, A. (2020). Learning SQL: Generate, manipulate, and retrieve data(3rd ed.). O’Reilly Media.

    Google Scholar 

  • Beighley, L. (2007). Head first SQL: Your brain on SQL.A Learner’s Guide. O’Reilly Media.

    Google Scholar 

  • Chan, J., & Bennet Moses, L. (2017). Is Big Data challenging Criminology? Theoretical Criminology,20(1), 21–39.

    Article  Google Scholar 

  • Cubitt, T. I. C., Wooden, K. R., & Roberts, K. A. (2020). A machine learning analysis of serious misconduct among Australian police. Crime Science,9(22), 1–13.

    Google Scholar 

  • Freeman, E., & Robson, E. (2020). Head first design patterns: A brain-friendly guide: Building extensible and maintainable object-oriented software(2nd ed.). O’Reilly Media.

    Google Scholar 

  • Geron, A. (2019). Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and techniques to build intelligent systems(2nd ed.). O’Reilly Media.

    Google Scholar 

  • Godsey, B. (2017). Think like a data scientist: Tackle the data science process step-by-step. Manning Publications.

    Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior,28(2), 171–198.

    Article  Google Scholar 

  • Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review,31(2), 165–177.

    Article  Google Scholar 

  • Internet World Stats. (2020). IWS usage and population statistics. Available at: https://www.internetworldstats.com/.

  • Kleck, G., Tark, J., & Bellows, J. J. (2006). What methods are most frequently used in research in criminology and criminal justice? Journal of Criminal Justice,34(2), 147–152.

    Article  Google Scholar 

  • Lavorgna, A., Middleton, S., Pickering, B., & Neumann, G. (2020). FloraGuard: Tackling the online illegal trade in endangered plants through a cross-cutting disciplinary ICT-enabled methodology. Journal of Contemporary Criminal Justice,36(3), 1–23.

    Article  Google Scholar 

  • Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (2009). A brief history of the Internet. ACM SIGCOMM Computer Communication Review,39(5), 22–31.

    Article  Google Scholar 

  • Martin, J. (2014). Lost on Silk Road. Online drug distribution and the “cryptomarket”. Criminology and Criminal Justice, 14(3), 363–388.

    Google Scholar 

  • Matthes, E. (2019). Python crash course: A hands-on, project-based introduction to programming paperback (2nd ed.). No Starch Press.

    Google Scholar 

  • McAlister, R., & Monaghan, R. (2020). Animal rights extremism and the internet. In M. Littler & B. Lee (Eds.), Digital extremisms: Readings in violence, radicalisation and extremism in the online space. MacMillan.

    Google Scholar 

  • McCallum, Q. E. (2012). Bad data handbook: Cleaning up the data so you can get back to work. O’Reilly Media.

    Google Scholar 

  • Motoyama, M., Mccoy, D. Levchenko, K., Savage, S., & Voelker, G. (2012). An analysis of underground forums. https://doi.org/10.1145/2068816.2068824.

  • Pastrana S., Hutchings A., Caines A., & Buttery P. (2018). Characterizing eve: Analysing cybercrime actors in a large underground forum. In M. Bailey, T. Holz, M. Stamatogiannakis, & S. Ioannidis (Eds.), Research in attacks, intrusions, and defenses. RAID 2018. Lecture Notes in Computer Science, Vol 11050. Springer, Cham. https://doi.org/10.1007/978-3-030-00470-5_1.

  • Pete, I., Hughes, J. Chua Y. T. & Bada, M. (2020). A social network analysis and comparison of six dark web forums (pp. 484–493). 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy. https://doi.org/10.1109/EuroSPW51379.2020.0007.

  • Python Software Foundation. (2020). Beginners guide. Available at: https://wiki.python.org/moin/BeginnersGuide.

  • Ramalho, L. (2015). Fluent Python: Clear concise, and effective programming. O’Reilly Media.

    Google Scholar 

  • Shaw, Z. (2017). Learn Python 3 the hard way (4th ed.). Addison-Wesley Professional.

    Google Scholar 

  • Stratton, G., Powell, A., & Cameron, R. (2017). Crime and justice in a digital Society. Towards a digital Criminology? International Journal for Crime Justice and Social Democracy, 6(2), 17–33.

    Google Scholar 

  • Tavabi, N., Bartley, N. Abeliuk, A., Sandeep, S., Ferrara, E. & Lerman, K. (2019). Characterizing activity on the deep and dark web. Companion Proceedings of the 2019 World Wide Web Conference, 206–213. https://doi.org/10.1145/3308560.3316502.

  • van Gelder, J., & Van Daele, S. (2014). Innovative data collection methods in criminological research: Editorial introduction. Crime Science,3, 6.

    Article  Google Scholar 

  • Weimann, G. (2016). Going dark: Terrorism on the dark web. Studies in Conflict and Terrorism,39(3), 195–207.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruth McAlister .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

McAlister, R., Campbell-West, F. (2021). Programming the Criminologist: Developing Cyber Skills to Investigate Cybercrime. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74837-1_3

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-74836-4

  • Online ISBN: 978-3-030-74837-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics