Loading…

Cybercrime and Cybercriminals: A Comprehensive Study

The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents...

Full description

Saved in:
Bibliographic Details
Published in:International Journal of Computer Networks and Communications Security 2016-06, Vol.4 (6), p.165
Main Authors: Sabillon, Regner, Cano, Jeimy, Cavaller, Victor, Serra, Jordi
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 6
container_start_page 165
container_title International Journal of Computer Networks and Communications Security
container_volume 4
creator Sabillon, Regner
Cano, Jeimy
Cavaller, Victor
Serra, Jordi
description The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.
format article
fullrecord <record><control><sourceid>proquest_csuc_</sourceid><recordid>TN_cdi_csuc_recercat_oai_recercat_cat_2072_319136</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4317446791</sourcerecordid><originalsourceid>FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423</originalsourceid><addsrcrecordid>eNpFj0trwzAQhEVpoSHNfzD0bNiHZEu9BdMXBHpo7kaW19ShsVMpLuTf1yGlPSzfDsMsO1dqQQw2d5bhet41Qg7GmVu1SmkHAOQKbVgvlK5OjcQQ-71kfmizP9kP_jM9ZOusGveHKB8ypP5bsvfj1J7u1E03u7L65VJtnx631Uu-eXt-rdabPJSAOYnrHBFgp5msEx_IzrRMjp00FgmcaU2LJkCpg20QGuvQl0ECgSZeKrycDWkKdZQwf-aP9ej7f3EegpJqRodczJn7S-YQx69J0rHejVM8d6nRlhrYYoH8A-eLUYk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1874038161</pqid></control><display><type>article</type><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><source>Publicly Available Content (ProQuest)</source><creator>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</creator><creatorcontrib>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</creatorcontrib><description>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</description><identifier>ISSN: 2410-0595</identifier><identifier>EISSN: 2308-9830</identifier><language>eng</language><publisher>Dubai: Dorma Trading, Est. Publishing Manager</publisher><subject>abuse and crime involving computers ; abuso y crimen con ordenadores ; abús i delicte amb ordinadors ; Computer crimes ; Cybercrime ; cybercrime taxonomy ; delicte informàtic ; Delictes informàtics ; delito informático ; Delitos informáticos ; network-level security and protection ; security and privacy protection ; seguretat i protecció a nivell de xarxa ; seguretat i protecció de la privacitat ; seguridad y protección a nivel de red ; seguridad y protección de la privacidad ; taxonomia del delicte informàtic ; taxonomía del delito informático</subject><ispartof>International Journal of Computer Networks and Communications Security, 2016-06, Vol.4 (6), p.165</ispartof><rights>Copyright Dorma Trading, Est. Publishing Manager Jun 2016</rights><rights>CC BY info:eu-repo/semantics/openAccess &lt;a href="http://creativecommons.org/licenses/by/3.0/es/"&gt;http://creativecommons.org/licenses/by/3.0/es/&lt;/a&gt;</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/1874038161?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,776,780,881,25732,36991,44569</link.rule.ids></links><search><creatorcontrib>Sabillon, Regner</creatorcontrib><creatorcontrib>Cano, Jeimy</creatorcontrib><creatorcontrib>Cavaller, Victor</creatorcontrib><creatorcontrib>Serra, Jordi</creatorcontrib><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><title>International Journal of Computer Networks and Communications Security</title><description>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</description><subject>abuse and crime involving computers</subject><subject>abuso y crimen con ordenadores</subject><subject>abús i delicte amb ordinadors</subject><subject>Computer crimes</subject><subject>Cybercrime</subject><subject>cybercrime taxonomy</subject><subject>delicte informàtic</subject><subject>Delictes informàtics</subject><subject>delito informático</subject><subject>Delitos informáticos</subject><subject>network-level security and protection</subject><subject>security and privacy protection</subject><subject>seguretat i protecció a nivell de xarxa</subject><subject>seguretat i protecció de la privacitat</subject><subject>seguridad y protección a nivel de red</subject><subject>seguridad y protección de la privacidad</subject><subject>taxonomia del delicte informàtic</subject><subject>taxonomía del delito informático</subject><issn>2410-0595</issn><issn>2308-9830</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNpFj0trwzAQhEVpoSHNfzD0bNiHZEu9BdMXBHpo7kaW19ShsVMpLuTf1yGlPSzfDsMsO1dqQQw2d5bhet41Qg7GmVu1SmkHAOQKbVgvlK5OjcQQ-71kfmizP9kP_jM9ZOusGveHKB8ypP5bsvfj1J7u1E03u7L65VJtnx631Uu-eXt-rdabPJSAOYnrHBFgp5msEx_IzrRMjp00FgmcaU2LJkCpg20QGuvQl0ECgSZeKrycDWkKdZQwf-aP9ej7f3EegpJqRodczJn7S-YQx69J0rHejVM8d6nRlhrYYoH8A-eLUYk</recordid><startdate>20160601</startdate><enddate>20160601</enddate><creator>Sabillon, Regner</creator><creator>Cano, Jeimy</creator><creator>Cavaller, Victor</creator><creator>Serra, Jordi</creator><general>Dorma Trading, Est. Publishing Manager</general><general>International Journal of Computer Networks and Communications Security</general><scope>3V.</scope><scope>7XB</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>XX2</scope></search><sort><creationdate>20160601</creationdate><title>Cybercrime and Cybercriminals: A Comprehensive Study</title><author>Sabillon, Regner ; Cano, Jeimy ; Cavaller, Victor ; Serra, Jordi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>abuse and crime involving computers</topic><topic>abuso y crimen con ordenadores</topic><topic>abús i delicte amb ordinadors</topic><topic>Computer crimes</topic><topic>Cybercrime</topic><topic>cybercrime taxonomy</topic><topic>delicte informàtic</topic><topic>Delictes informàtics</topic><topic>delito informático</topic><topic>Delitos informáticos</topic><topic>network-level security and protection</topic><topic>security and privacy protection</topic><topic>seguretat i protecció a nivell de xarxa</topic><topic>seguretat i protecció de la privacitat</topic><topic>seguridad y protección a nivel de red</topic><topic>seguridad y protección de la privacidad</topic><topic>taxonomia del delicte informàtic</topic><topic>taxonomía del delito informático</topic><toplevel>online_resources</toplevel><creatorcontrib>Sabillon, Regner</creatorcontrib><creatorcontrib>Cano, Jeimy</creatorcontrib><creatorcontrib>Cavaller, Victor</creatorcontrib><creatorcontrib>Serra, Jordi</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>Recercat</collection><jtitle>International Journal of Computer Networks and Communications Security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sabillon, Regner</au><au>Cano, Jeimy</au><au>Cavaller, Victor</au><au>Serra, Jordi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cybercrime and Cybercriminals: A Comprehensive Study</atitle><jtitle>International Journal of Computer Networks and Communications Security</jtitle><date>2016-06-01</date><risdate>2016</risdate><volume>4</volume><issue>6</issue><spage>165</spage><pages>165-</pages><issn>2410-0595</issn><eissn>2308-9830</eissn><abstract>The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets.</abstract><cop>Dubai</cop><pub>Dorma Trading, Est. Publishing Manager</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2410-0595
ispartof International Journal of Computer Networks and Communications Security, 2016-06, Vol.4 (6), p.165
issn 2410-0595
2308-9830
language eng
recordid cdi_csuc_recercat_oai_recercat_cat_2072_319136
source Publicly Available Content (ProQuest)
subjects abuse and crime involving computers
abuso y crimen con ordenadores
abús i delicte amb ordinadors
Computer crimes
Cybercrime
cybercrime taxonomy
delicte informàtic
Delictes informàtics
delito informático
Delitos informáticos
network-level security and protection
security and privacy protection
seguretat i protecció a nivell de xarxa
seguretat i protecció de la privacitat
seguridad y protección a nivel de red
seguridad y protección de la privacidad
taxonomia del delicte informàtic
taxonomía del delito informático
title Cybercrime and Cybercriminals: A Comprehensive Study
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T05%3A25%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_csuc_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cybercrime%20and%20Cybercriminals:%20A%20Comprehensive%20Study&rft.jtitle=International%20Journal%20of%20Computer%20Networks%20and%20Communications%20Security&rft.au=Sabillon,%20Regner&rft.date=2016-06-01&rft.volume=4&rft.issue=6&rft.spage=165&rft.pages=165-&rft.issn=2410-0595&rft.eissn=2308-9830&rft_id=info:doi/&rft_dat=%3Cproquest_csuc_%3E4317446791%3C/proquest_csuc_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c701-2e9f92201f43289eac28289832939eb812095d5d15c074c8b10b891a7cec20423%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1874038161&rft_id=info:pmid/&rfr_iscdi=true