How to Become a Cybercriminal? An Explanation of Cybercrime Diffusion

نویسنده

  • Jean-Loup Richet
چکیده

The main purpose of this chapter is to illustrate a landscape of current literature in cybercrime taking into consideration diffusion of innovation theories and economic theory of competition. In this chapter, a narrative review of the literature was carried out, facilitators leading to cybercrime were explored and explained the diffusion of Cybercriminals’ best practices. Cybercrime is compatible with young adults lifestyle (familiarity) and requires little knowledge. Moreover, barriers to entry related to costs (psychological, financial), risks and investments are low. This review provides a snapshot and reference base for academics and practitioners with an interest in cybercrime while contributing to a cumulative culture which is desired in the field. This chapter provides insights into barriers to entry into cybercrime and the facilitators of cybercrime.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Network Identification Model on Open Social Network

Today the number of cybercrimes increases very rapidly, this cause large financial loss to many organizations. Existing cybersecurity technologies are not effective enough to protect organizations from this cyber attack; this is because existing cyber security solutions are weak in cybercrime forensic and predictions. This paper present development of a novel weakly supervised cybercriminal net...

متن کامل

Cybercrime and Punishment: An Analysis of the Deontological and Utilitarian Functions of Punishment in the Information Age

This conceptual piece analyzes the role of criminal punishment and the nature of cyber crime to investigate whether the current punishment schemes are appropriate given the deontological and utilitarian goals of punishment: retribution, deterrence, incapacitation, and rehabilitation. The research has implications for policymaking in cybercriminal law.

متن کامل

Trust among Cybercriminals? Carding Forums, Uncertainty and Implications for Policing

At the beginning of the 21 st Century, before the power of online social networking became apparent, several studies speculated about the likely structure of organised cybercrime (Mann and Sutton 1998; Brenner 2002). In the light of new data on cybercriminal organisations, this paper sets out to revisit their claims. In collaboration with the Serious Organised Crime Agency (SOCA), this paper ex...

متن کامل

Data mining technology for countering cybercrime A computational intelligence perspective

Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015