
Renushka MadarieAmsterdam University of Applied Science
Renushka Madarie
Master of Science
About
10
Publications
4,101
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
69
Citations
Introduction
Skills and Expertise
Publications
Publications (10)
Crime script analysis as a methodology to analyse criminal processes is underdeveloped. This is apparent from the various approaches in which scholars apply crime scripting and present their cybercrime scripts. The plethora of scripting methods raise significant concerns about the reliability and validity of these scripting studies. In this methodo...
https://www.nfir.nl/wp-content/uploads/2024/09/Whitepaper-Online-Inbrekers-bekeken-1.pdf?_gl=1*hoqiam*_up*MQ..*_ga*NjM3Mjc1ODQxLjE3MzY1MDIwODc.*_ga_G8P78BDY95*MTczNjUwMjA4Ni4xLjAuMTczNjUwMjA4Ni4wLjAuNDU1OTE1MjE
Introduction: Few studies have examined the sales of stolen account credentials
on darkweb markets. In this study, we tested how advertisement characteristics
affect the popularity of illicit online advertisements offering account credentials.
Unlike previous criminological research, we take a novel approach by assessing
the applicability of knowle...
The Netherlands functions as an important source and transit country for international organised drug trafficking. This is in part due to its large logistical nodes in the world economy, like the airport and the seaport. Although knowledge on organised crime offenders engaging in transit crime has accumulated recently, systematic analyses of offend...
Organized crime at logistical nodes in the Netherlands. Empirical results of the Dutch Organized Crime Monitor
The Netherlands functions as an important source and transit country for international organized drug trafficking. This is in part due to its large logistical nodes in the world economy, like the airport and the seaport. Based on in-depth...
Account hijacking, i.e. illegitimately accessing someone else’s personal online account, is on the rise and affects not only financial accounts, but the full spectrum of online accounts. To gain more insight in the illicit act of online dissemination of stolen account credentials, we systematically examined how such credentials were offered on thre...
Although much has been written on topic of hacker motivations, little empirical research has been conducted and even less research has attempted to quantify hackers' motivations. The present study analyses relationships between the frequency of several hacking behaviours and motivations to hack in a sample of male hackers and potential hackers. Mot...