Building a Taxonomy for Cybercrimes
نویسندگان
چکیده
Cybercrime incurs an estimate of $110 billion per annum globally (Norton Cybercrime Report 2012). This excludes the non-financial impact. The combined impact presents an enormous problem worldwide, from the point of view of overall management (detection, monitoring and prevention). While there are lists/categories of cybercrimes published in books, government websites, security and crime-related websites, these categories were constructed for different purposes. Moreover, they are not comprehensive, nor are they rigorously developed using empirical data. Their similarities and differences have not been elucidated, accounted for, and reconciled, and we are not confident that all cybercrimes can be classified using existing taxonomies. Creating a single comprehensive taxonomy on cybercrimes has a number of benefits. This paper first summarises the background on “taxonomies”, existing taxonomies that have been constructed in Information Systems, and potential benefits of such a taxonomy. It then proposes a methodology for developing and validating a cybercrime taxonomy, and discusses the next steps for this project.
منابع مشابه
A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction
Cybercrimes over the years have become both increasingly numerous and sophisticated. This paper presents a taxonomy for cybercrimes that can be used for the analysis and categorization of such crimes, as well as providing consistency in language when describing cybercrimes. This taxonomy is designed to be useful to information bodies such as the Jamaican Cybercrime Unit, who have to handle and ...
متن کاملOn Different Categories of Cybercrime in China
Cybercrimes have become an eye-catching social problem in not only China but also other countries of the world. Cybercrimes can be divided into two categories and different kinds of cybercrimes shall be treated differently. In this article, some typical cybercrimes are introduced in detail in order to set forth the characteristics of those cybercrimes. However, to defeat cybercrimes, joint effo...
متن کاملTaxonomy of Digital Forensics: Investigation Tools and Challenges
In today’s world of computers, any kind of information can be made available within few clicks for different endeavours. The information may be tampered by changing the statistical properties and can be further used for criminal activities. These days, Cybercrimes are happening at a very large scale, and possess big threats to the security of an individual, firm, industry and even to developed ...
متن کاملAn Overview of Cybercrime in Iraq
This paper investigates the growing number of cybercrimes in Iraq and considers the demographic properties of individuals in charge for such activity. The paper relies on information taken from the Iraqi Department of Cybercrimes Records for the years 2006-2011. This paper describes cybercrime types and their properties. The results illustrate that among all types of cybercrimes committed durin...
متن کاملData Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations
Instant messaging is a form of computer-mediated communication (CMC) with unique characteristics that reflect a realistic presentation of an author’s online stylistic characteristics. Instant messaging communications use virtual identities, which hinder social accountability and facilitate IM-related cybercrimes. Criminals often use virtual identities to hide their true identity and may also su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013