David Maimon

Cyber Criminologist

scheduled and past talks

 

"Cybercrime: Why Should I Care if I Neither Prosecute Nor Defend Hackers?" Dallas Bar Association, Texas, September 2016

 

“Evidence Based Cyber Security : Suggestions and Recommendations for Building Cyber Resiliency against System Trespassing Events.” NSA SoS Quarterly Lablet Meeting, University of Illinois at Urbana-Champaign,  July 2016 

 

"An Evidence-Based Human Focused Approach for Protecting Bazaar Computing Environment: Findings from a Series of Field Experiments."  The Fruanhofer Center for Experimental Software Engineering, July 2016 

 

“System Trespassing to Computer Environments: Findings from a Series of Field Experiments.” University of Haifa, Israel, June 2016.   

 

“ System Trespassing to Computer Environments: Findings from a Series of Field Experiments.” Babes-Bolai University, Romania, May 2016.   

 

"Predictably Deterrable? On the Relevance of "Soft Science" Models in the Exploration of System Trespassers' Online Behaviors." Netherlands Institute for the Study of Crime and Law Enforcement, Netherlands, March 2016

 

“Surveillance Banners and their Influence on Risk-Averse and Risk-SeekingHackers' Behaviors During the Progression of System Trespassing Incidents.” Michigan State University Interdisciplinary Conference on Cybercrime, March 2015

 

“Escaping Criminological Involution: Applying an Interdisciplinary Approach in the Study of Cybercrime.” University of South Florida, Department of Criminology, January 2015

 

“Cyber Criminology? : On the Relevance of Criminological Theories and Research Methods in the Exploration of Computer Focused Crimes.” MC2 Third Annual Symposium , University of Maryland, June2014

 

“Cyber Criminology? : On the Relevance of Criminological Theories and Research Methods in the Exploration of Computer Focused Crimes.” Johns Hopkins University Information Security Institute, April 2014

 

“Rethinking Cybercrime Research; Foundations for the Development of Human Focused Research on System Trespassing Events.” Nanjing Normal University, China, March 2014

 

“Rethinking Cybercrime Research; Foundations for the Development of Human Focused Research on System Trespassing Events.” Jiangsu Police Institute, China, March 2014

 

“Rethinking Cybercrime Research; Foundations for the Development of Human Focused Research on System Trespassing Events.” Nanjing Forest Police College, China, March 2014

 

 “30 Days “Free” Honey: Empirical Evidence for the Relevance of Restrictive Deterrence in the Study of System Trespassing.” Michigan State University Interdisciplinary Conference on Cybercrime, March 2014

 

 “Hacking Tactics and Methods.” Center for the Study and Prevention of Crime, Miguel Hernandez University, Spain,  October 2013

 

“30 Days “Free” Honey: Empirical Evidence for the Relevance of Behavioral and Cognitive Models in the Study of Computer Focused Crimes.” Indiana University Center for Applied Cybersecurity Research, September 2013

 

 “Hacking Tactics.” Nanjing Normal University Law School, China, March 2013

 

“Situational Deterrent Effects of Warning Banners in Information Systems.” Messaging, Malware, Mobile and Anti-Abuse Working Group (M3AAWG), October 2012

 

 “Hacking Tactics.” Minster of defense in Bosnia and Herzegovina and American University in Bosnia and Herzegovina, Bosnia and Herzegovina, September 2012

 

“Daily Trends and Origin of Computer-Focused Crimes against a Large University Computer Network: An Application of the Routine Activities and Lifestyle Perspective.”  AT&T Security Research Center, August 2012

 

 “Cybercrime: Unraveling the Human Component.” Criminology Institute, Hebrew University, Israel, June 2012.

 

“Cybercrime: Unraveling the Human Component.” Computer Science Department, Zhejiang Gongshang University, China March 2012.

 

 “Cybercrime: Unraveling the Human Component.” Maryland Cyber Challenge and Conference (MDC3), Baltimore, 2011.