Dienst van SURF
© 2025 SURF
Objectives: Aiming to reduce distributed denial-of-service (DDoS) attacks by alerting the consciences of Internet users, this paper evaluates the effectiveness of four warning banners displayed as online ads (deterrent—control, social, informative, and reorienting) and the contents of their two linked landing pages. Methods: We implement a 4 x 2 quasi-experimental design on a self-selected sample of Internet users to measure the engagement generated by the ads and the pages. Engagement is measured on the ads as the ratio of clicks to impressions, and on the pages as percentage of page scrolled, average session duration, video interaction rate, and URLs click rate. Results: Social ads generate significantly more engagement than the rest with low to medium effect sizes. Data reveal no differences in engagement between both landing page designs. Conclusions: Social messages may be a better alternative for engaging with potential cyber offenders than the traditional deterrent messages. Correspondence: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), De Boelelaan 1077, 1081 HV, Amsterdam, The Netherlands. Email: AMoneva@nscr.n This is a post-peer-review, pre-copyedit version of an article published in Journal of Experimental Criminology. The final authenticated version is available online at: https://link.springer.com/article/10.1007/s11292-022-09504-2
MULTIFILE
While traditional crime rates are decreasing, cybercrime is on the rise. As a result, the criminal justice system is increasingly dealing with criminals committing cyber-dependent crimes. However, to date there are no effective interventions to prevent recidivism in this type of offenders. Dutch authorities have developed an intervention program, called Hack_Right. Hack_Right is an alternative criminal justice program for young first-offenders of cyber-dependent crimes. In order to prevent recidivism, this program places participants in organizations where they are taught about ethical hacking, complete (technical) assignments and reflect on their offense. In this study, we have evaluated the Hack_Right program and the pilot interventions carried out thus far. By examining the program theory (program evaluation) and implementation of the intervention (process evaluation), the study adds to the scarce literature about cybercrime interventions. During the study, two qualitative research methods have been applied: 1) document analysis and 2) interviews with intervention developers, imposers, implementers and participants. In addition to the observation that the scientific basis for linking specific criminogenic factors to cybercriminals is still fragile, the article concludes that the theoretical base and program integrity of Hack_Right need to be further developed in order to adhere to principles of effective interventions.