“…Honeypots have been primarily used by academics and computer scientists to understand the technical practices of system intruders while interacting with an active computing environment (Riebach, Rathgeb, and Toedtmann, ; Spitzner, ). Criminologists have recently employed these resources to assess the somewhat hidden practices of active offenders and to engage in randomized experiments to affect intruder activities (Maimon, Alper, Sobesto, and Culkier, ; Maimon, Kamerdze, Cukier, and Sobesto, ; Maimon, Wilson, Ren, and Berenblum, ). In their studies, they have analyzed the network activities of intruders in a similar fashion to qualitative researchers who have interviewed offenders to identify the process of target selection and tactics of offending (Cherbonneau and Copes, ; Jacobs, ; Wright and Decker, 1994, ).…”