How to Become a Cybercriminal? An Explanation of Cybercrime Diffusion
نویسنده
چکیده
The main purpose of this chapter is to illustrate a landscape of current literature in cybercrime taking into consideration diffusion of innovation theories and economic theory of competition. In this chapter, a narrative review of the literature was carried out, facilitators leading to cybercrime were explored and explained the diffusion of Cybercriminals’ best practices. Cybercrime is compatible with young adults lifestyle (familiarity) and requires little knowledge. Moreover, barriers to entry related to costs (psychological, financial), risks and investments are low. This review provides a snapshot and reference base for academics and practitioners with an interest in cybercrime while contributing to a cumulative culture which is desired in the field. This chapter provides insights into barriers to entry into cybercrime and the facilitators of cybercrime.
منابع مشابه
A Network Identification Model on Open Social Network
Today the number of cybercrimes increases very rapidly, this cause large financial loss to many organizations. Existing cybersecurity technologies are not effective enough to protect organizations from this cyber attack; this is because existing cyber security solutions are weak in cybercrime forensic and predictions. This paper present development of a novel weakly supervised cybercriminal net...
متن کاملCybercrime and Punishment: An Analysis of the Deontological and Utilitarian Functions of Punishment in the Information Age
This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.
متن کاملTrust among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing
At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime (Mann and Sutton 1998; Brenner 2002). In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper ex...
متن کاملData mining technology for countering cybercrime A computational intelligence perspective
Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...
متن کامل