Podcast appearances and mentions of Thomas J Holt

  • 5PODCASTS
  • 6EPISODES
  • 35mAVG DURATION
  • ?INFREQUENT EPISODES
  • May 7, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Thomas J Holt

Latest podcast episodes about Thomas J Holt

Reed Morin Show
The Dark Web "The Internets Criminal Underworld" | Episode 14: Dr. Thomas Holt

Reed Morin Show

Play Episode Listen Later May 7, 2023 62:07


Thomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University. His research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work has been published in various journals including Crime and Delinquency, Deviant Behavior, the Journal of Criminal Justice, and Youth and Society.Support the show: https://www.patreon.com/TheAftermathDailyAftermath Daily Social Media: https://www.youtube.com/channel/UCJPpxQ0gV0jiO-IcObsv4CAhttps://www.instagram.com/theaftermathdaily/HIGHERORBITSupport the show

Lawyer 2 Lawyer -  Law News and Legal Topics
Ransomware Attacks & Cybersecurity

Lawyer 2 Lawyer - Law News and Legal Topics

Play Episode Listen Later Jun 18, 2021 23:22


We have all seen a wave of ransomware attacks in the news as of late. For those who are unfamiliar, ransomware is a type of malware that threatens to publish, destroy, or block access to the victim's personal data unless a ransom is paid. The ransom is usually paid to these attackers through cryptocurrencies like Bitcoin, impairing the ability to trace the transaction back to the perpetrator. Targets of all sizes, such as the Colonial Pipeline, McDonalds, the University of California, all the way down to dental practices, have fallen prey to these attacks. No one is immune. So could you be next? And what can we do to prevent these attacks from happening to us?  On Lawyer 2 Lawyer, host Craig Williams is joined by Thomas J. Holt, director and professor in the School of Criminal Justice at Michigan State University.

Legal Talk Network - Law News and Legal Topics
Lawyer 2 Lawyer : Ransomware Attacks & Cybersecurity

Legal Talk Network - Law News and Legal Topics

Play Episode Listen Later Jun 18, 2021 23:22


We have all seen a wave of ransomware attacks in the news as of late. For those who are unfamiliar, ransomware is a type of malware that threatens to publish, destroy, or block access to the victim's personal data unless a ransom is paid. The ransom is usually paid to these attackers through cryptocurrencies like Bitcoin, impairing the ability to trace the transaction back to the perpetrator. Targets of all sizes, such as the Colonial Pipeline, McDonalds, the University of California, all the way down to dental practices, have fallen prey to these attacks. No one is immune. So could you be next? And what can we do to prevent these attacks from happening to us? On Lawyer 2 Lawyer, host Craig Williams is joined by Thomas J. Holt, director and professor in the School of Criminal Justice at Michigan State University.

ABA Journal Podcasts - Legal Talk Network
Lawyer 2 Lawyer : Ransomware Attacks & Cybersecurity

ABA Journal Podcasts - Legal Talk Network

Play Episode Listen Later Jun 18, 2021 23:22


We have all seen a wave of ransomware attacks in the news as of late. For those who are unfamiliar, ransomware is a type of malware that threatens to publish, destroy, or block access to the victim's personal data unless a ransom is paid. The ransom is usually paid to these attackers through cryptocurrencies like Bitcoin, impairing the ability to trace the transaction back to the perpetrator. Targets of all sizes, such as the Colonial Pipeline, McDonalds, the University of California, all the way down to dental practices, have fallen prey to these attacks. No one is immune. So could you be next? And what can we do to prevent these attacks from happening to us? On Lawyer 2 Lawyer, host Craig Williams is joined by Thomas J. Holt, director and professor in the School of Criminal Justice at Michigan State University.

Cybercrimeology
Fraud Victims are no different to you.

Cybercrimeology

Play Episode Listen Later Mar 1, 2021 39:33


About Our Guest:https://staff.qut.edu.au/staff/ca.crossPapers Mentioned in the ShowCassandra Cross & Thomas J. Holt (2021) The Use of Military Profiles in Romance Fraud Schemes, Victims & Offenders, 16:3, 385-406, DOI: 10.1080/15564886.2020.1850582Cross, C. (2020). ‘Oh we can’t actually do anything about that’: The problematic nature of jurisdiction for online fraud victims. Criminology & Criminal Justice, 20(3), 358–375. https://doi.org/10.1177/1748895819835910Cross, C. (2019), "Who is to blame? Exploring accountability in fraud victimisation", Journal of Criminological Research, Policy and Practice, Vol. 6 No. 1, pp. 35-48. https://doi.org/10.1108/JCRPP-07-2019-0054Cassandra Cross, Molly Dragiewicz, Kelly Richards, Understanding Romance Fraud: Insights From Domestic Violence Research, The British Journal of Criminology, Volume 58, Issue 6, November 2018, Pages 1303–1322, https://doi.org/10.1093/bjc/azy005  Other:Introduction voices are from the Prelinger Archives at archive.org.  Bonus points are not redeemable for anything at all.  All the same, its still nice to get some points isn't it?    

Cybercrimeology
Social Learning Theory and Cybercrime: The impact of Family, Friends and Bronies

Cybercrimeology

Play Episode Listen Later Apr 14, 2020 42:08


More about the Guest :http://intra.cbcs.usf.edu/PersonTracker/common/cfm/Unsecured/criminology/bio.cfm?ID=659Papers Mentioned in this episode:Thomas J. Holt, George W. Burruss & Adam M. Bossler (2010) SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD, Journal of Crime and Justice, 33:2, 31-61, DOI: 10.1080/0735648X.2010.9721287Burruss, G. W., Bossler, A. M., & Holt, T. J. (2013). Assessing the Mediation of a Fuller Social Learning Model on Low Self-Control’s Influence on Software Piracy. Crime & Delinquency, 59(8), 1157–1184. https://doi.org/10.1177/0011128712437915 Burruss, G. W., Holt, T. J., & Bossler, A. (2019). Revisiting the Suppression Relationship Between Social Learning and Self-Control on Software Piracy. Social Science Computer Review, 37(2), 178–195. https://doi.org/10.1177/0894439317753820Other:It is important to note that criminological theories discuss 'deviance' using the term without a negative connotation.  It is used in the sense that a set of behaviours or attitudes diverge from the usual standards for a particular society.  In this sense there is little difference between gang members, drug users, monks or fans of the insane clown posse.  To make the idea of deviancy less alien, it helps to think of non-criminal groups that are different from the mainstream. In this case we discussed drug use and bronies as a way of placing hacking and digital piracy in a context of a different social group with associated definitions and values.  Neither of us has a problem with bronies. Personally, I think that they are an important group helping to expose and break down traditional and potentially toxic gender roles.  Also, they are a great example of the importance of art in both shaping and permitting wider societal expression.  If you don't know what a brony is there are plenty of documentaries, but this page is quite helpful : https://haenfler.sites.grinnell.edu/subcultures-and-scenes/bronies/