Loading…
Cybercrime and Cybercriminals: A Comprehensive Study
The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents...
Saved in:
Published in: | International Journal of Computer Networks and Communications Security 2016-06, Vol.4 (6), p.165 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 6 |
container_start_page | 165 |
container_title | International Journal of Computer Networks and Communications Security |
container_volume | 4 |
creator | Sabillon, Regner Cano, Jeimy Cavaller, Victor Serra, Jordi |
description | The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets. |
format | article |
fullrecord | <record><control><sourceid>proquest_csuc_</sourceid><recordid>TN_cdi_csuc_recercat_oai_recercat_cat_2072_319136</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4317446791</sourcerecordid><originalsourceid>FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423</originalsourceid><addsrcrecordid>eNpFj0trwzAQhEVpoSHNfzD0bNiHZEu9BdMXBHpo7kaW19ShsVMpLuTf1yGlPSzfDsMsO1dqQQw2d5bhet41Qg7GmVu1SmkHAOQKbVgvlK5OjcQQ-71kfmizP9kP_jM9ZOusGveHKB8ypP5bsvfj1J7u1E03u7L65VJtnx631Uu-eXt-rdabPJSAOYnrHBFgp5msEx_IzrRMjp00FgmcaU2LJkCpg20QGuvQl0ECgSZeKrycDWkKdZQwf-aP9ej7f3EegpJqRodczJn7S-YQx69J0rHejVM8d6nRlhrYYoH8A-eLUYk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1874038161</pqid></control><display><type>article</type><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><source>Publicly Available Content (ProQuest)</source><creator>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</creator><creatorcontrib>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</creatorcontrib><description>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</description><identifier>ISSN: 2410-0595</identifier><identifier>EISSN: 2308-9830</identifier><language>eng</language><publisher>Dubai: Dorma Trading, Est. Publishing Manager</publisher><subject>abuse and crime involving computers ; abuso y crimen con ordenadores ; abús i delicte amb ordinadors ; Computer crimes ; Cybercrime ; cybercrime taxonomy ; delicte informàtic ; Delictes informàtics ; delito informático ; Delitos informáticos ; network-level security and protection ; security and privacy protection ; seguretat i protecció a nivell de xarxa ; seguretat i protecció de la privacitat ; seguridad y protección a nivel de red ; seguridad y protección de la privacidad ; taxonomia del delicte informàtic ; taxonomía del delito informático</subject><ispartof>International Journal of Computer Networks and Communications Security, 2016-06, Vol.4 (6), p.165</ispartof><rights>Copyright Dorma Trading, Est. Publishing Manager Jun 2016</rights><rights>CC BY info:eu-repo/semantics/openAccess <a href="http://creativecommons.org/licenses/by/3.0/es/">http://creativecommons.org/licenses/by/3.0/es/</a></rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1874038161?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25732,36991,44569</link.rule.ids></links><search><creatorcontrib>Sabillon, Regner</creatorcontrib><creatorcontrib>Cano, Jeimy</creatorcontrib><creatorcontrib>Cavaller, Victor</creatorcontrib><creatorcontrib>Serra, Jordi</creatorcontrib><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><title>International Journal of Computer Networks and Communications Security</title><description>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</description><subject>abuse and crime involving computers</subject><subject>abuso y crimen con ordenadores</subject><subject>abús i delicte amb ordinadors</subject><subject>Computer crimes</subject><subject>Cybercrime</subject><subject>cybercrime taxonomy</subject><subject>delicte informàtic</subject><subject>Delictes informàtics</subject><subject>delito informático</subject><subject>Delitos informáticos</subject><subject>network-level security and protection</subject><subject>security and privacy protection</subject><subject>seguretat i protecció a nivell de xarxa</subject><subject>seguretat i protecció de la privacitat</subject><subject>seguridad y protección a nivel de red</subject><subject>seguridad y protección de la privacidad</subject><subject>taxonomia del delicte informàtic</subject><subject>taxonomía del delito informático</subject><issn>2410-0595</issn><issn>2308-9830</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNpFj0trwzAQhEVpoSHNfzD0bNiHZEu9BdMXBHpo7kaW19ShsVMpLuTf1yGlPSzfDsMsO1dqQQw2d5bhet41Qg7GmVu1SmkHAOQKbVgvlK5OjcQQ-71kfmizP9kP_jM9ZOusGveHKB8ypP5bsvfj1J7u1E03u7L65VJtnx631Uu-eXt-rdabPJSAOYnrHBFgp5msEx_IzrRMjp00FgmcaU2LJkCpg20QGuvQl0ECgSZeKrycDWkKdZQwf-aP9ej7f3EegpJqRodczJn7S-YQx69J0rHejVM8d6nRlhrYYoH8A-eLUYk</recordid><startdate>20160601</startdate><enddate>20160601</enddate><creator>Sabillon, Regner</creator><creator>Cano, Jeimy</creator><creator>Cavaller, Victor</creator><creator>Serra, Jordi</creator><general>Dorma Trading, Est. Publishing Manager</general><general>International Journal of Computer Networks and Communications Security</general><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>XX2</scope></search><sort><creationdate>20160601</creationdate><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><author>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>abuse and crime involving computers</topic><topic>abuso y crimen con ordenadores</topic><topic>abús i delicte amb ordinadors</topic><topic>Computer crimes</topic><topic>Cybercrime</topic><topic>cybercrime taxonomy</topic><topic>delicte informàtic</topic><topic>Delictes informàtics</topic><topic>delito informático</topic><topic>Delitos informáticos</topic><topic>network-level security and protection</topic><topic>security and privacy protection</topic><topic>seguretat i protecció a nivell de xarxa</topic><topic>seguretat i protecció de la privacitat</topic><topic>seguridad y protección a nivel de red</topic><topic>seguridad y protección de la privacidad</topic><topic>taxonomia del delicte informàtic</topic><topic>taxonomía del delito informático</topic><toplevel>online_resources</toplevel><creatorcontrib>Sabillon, Regner</creatorcontrib><creatorcontrib>Cano, Jeimy</creatorcontrib><creatorcontrib>Cavaller, Victor</creatorcontrib><creatorcontrib>Serra, Jordi</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>Recercat</collection><jtitle>International Journal of Computer Networks and Communications Security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sabillon, Regner</au><au>Cano, Jeimy</au><au>Cavaller, Victor</au><au>Serra, Jordi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cybercrime and Cybercriminals: A Comprehensive Study</atitle><jtitle>International Journal of Computer Networks and Communications Security</jtitle><date>2016-06-01</date><risdate>2016</risdate><volume>4</volume><issue>6</issue><spage>165</spage><pages>165-</pages><issn>2410-0595</issn><eissn>2308-9830</eissn><abstract>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</abstract><cop>Dubai</cop><pub>Dorma Trading, Est. Publishing Manager</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2410-0595 |
ispartof | International Journal of Computer Networks and Communications Security, 2016-06, Vol.4 (6), p.165 |
issn | 2410-0595 2308-9830 |
language | eng |
recordid | cdi_csuc_recercat_oai_recercat_cat_2072_319136 |
source | Publicly Available Content (ProQuest) |
subjects | abuse and crime involving computers abuso y crimen con ordenadores abús i delicte amb ordinadors Computer crimes Cybercrime cybercrime taxonomy delicte informàtic Delictes informàtics delito informático Delitos informáticos network-level security and protection security and privacy protection seguretat i protecció a nivell de xarxa seguretat i protecció de la privacitat seguridad y protección a nivel de red seguridad y protección de la privacidad taxonomia del delicte informàtic taxonomía del delito informático |
title | Cybercrime and Cybercriminals: A Comprehensive Study |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T05%3A25%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_csuc_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cybercrime%20and%20Cybercriminals:%20A%20Comprehensive%20Study&rft.jtitle=International%20Journal%20of%20Computer%20Networks%20and%20Communications%20Security&rft.au=Sabillon,%20Regner&rft.date=2016-06-01&rft.volume=4&rft.issue=6&rft.spage=165&rft.pages=165-&rft.issn=2410-0595&rft.eissn=2308-9830&rft_id=info:doi/&rft_dat=%3Cproquest_csuc_%3E4317446791%3C/proquest_csuc_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1874038161&rft_id=info:pmid/&rfr_iscdi=true |