{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fcybercrimeology.com%2Fepisodes%2Fgetting-started-with-cybercrime-theory-Q_rcRq2T","width":444,"version":"1.0","type":"rich","title":"Getting started with Cybercrime Theory","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/f061526e-3a1c-4d34-9a28-039e12fec8db/2d4b299c-7693-4af3-bdb9-69ebd13d1725/80-epidodes-cover.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/67fe021c-01f5-4805-988a-d439171931e3\" height=\"200\" width=\"100%\" title=\"Getting started with Cybercrime Theory\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"This episode is a lighting overview of some of the more prominent theories applied in cybercrime research. Dr. Tom Holt helps us skip across a variety of theories including Routine Activities, Deterrence, Social Learning, Drift, Actor-Network, Sub-Cultures and more.  If you need a leg up into knowing about cybercrime theory, this is the episode for you.  The next episodes will dive deeper into individual theories.    "}