Sex, Lies and Cyber-crime Survey
نویسندگان
چکیده
Much of the information we have on cyber-crime losses is derived from surveys. We examine some of the difficulties of forming an accurate estimate by survey. First, losses are extremely concentrated, so that representative sampling of the population does not give representative sampling of the losses. Second, losses are based on unverified self-reported numbers. Not only is it possible for a single outlier to distort the result, we find evidence that most surveys are dominated by a minority of responses in the upper tail (i.e., a majority of the estimate is coming from as few as one or two responses). Finally, the fact that losses are confined to a small segment of the population magnifies the difficulties of refusal rate and small sample sizes. Far from being broadly-based estimates of losses across the population, the cyber-crime estimates that we have appear to be largely the answers of a handful of people extrapolated to the whole population. A single individual who claims $50,000 losses, in an N = 1000 person survey, is all it takes to generate a $10 billion loss over the population. One unverified claim of $7,500 in phishing losses translates into $1.5 billion.
منابع مشابه
Sex, Lies and Cyber-crime Surveys
Much of the information we have on cyber-crime losses is derived from surveys. We examine some of the difficulties of forming an accurate estimate by survey. First, losses are extremely concentrated, so that representative sampling of the population does not give representative sampling of the losses. Second, losses are based on unverified self-reported numbers. Not only is it possible for a si...
متن کاملSingle and Double Power Laws for Cyber-Crimes
Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The finding...
متن کاملRelationship between Social Capital and Crime (Case study: Prisoners of Tehran Prisons)
Social capital, due to its content lies in the social damage's realm. Considering the mutual effects therein, the objective here is to assess the correlation between social capital with identifying the correlation between social capital and crimes among convicted young prisoners in Greater Tehran prison. The method adopted in this study is of survey type by applying a random sample of 190 priso...
متن کاملMinimize Cyber Losses in Cyber World through the Optimization Technique
In the modern era, internet plays crucial role in the human life. Now that time it is a backbone of human life. In Twentyfirst century criminals increasingly rely on these technologies and these advance technologies are also increase day by day criminals and their criminals operations. These criminals can easily lift to Internet to carry out such type of traditional crime such as sex traffickin...
متن کاملCyber Forensics Ontology for Cyber Criminal Investigation
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011