About the Guest:
https://aysps.gsu.edu/profile/david-maimon-2/
The Evidence-Based Cybersecurity Research Group
Papers mentioned in this episode:
MAIMON, D., ALPER, M., SOBESTO, B. and CUKIER, M. (2014), RESTRICTIVE DETERRENT EFFECTS OF A WARNING BANNER IN AN ATTACKED COMPUTER SYSTEM. Criminology, 52: 33-59. doi:10.1111/1745-9125.12028
Testa, A., Maimon, D., Sobesto, B. and Cukier, M. (2017), Illegal Roaming and File Manipulation on Target Computers. Criminology & Public Policy, 16: 689-726. doi:10.1111/1745-9133.12312
David Maimon, Theodore Wilson, Wuling Ren, Tamar Berenblum, On the Relevance of Spatial and Temporal Dimensions in Assessing Computer Susceptibility to System Trespassing Incidents, The British Journal of Criminology, Volume 55, Issue 3, May 2015, Pages 615–634, https://doi.org/10.1093/bjc/azu104
Other:
Not mentioned at all but this series of white papers compiling evidence for particular defensive tools or strategies is very handy.
https://scholarworks.gsu.edu/ebcs_tools/