Toward a cybercrime classification ontology: A knowledge-based approach

Abstract In recent years there has been an increase in cybercrimes and its negative impacts on the lives of individuals, organizations, and governments. It has been argued that a better understanding of cybercrime is a necessary condition to develop appropriate legal and policy responses to cybercrime. While a universally agreed-upon classification scheme would facilitate the development of such understanding and also collaborations, current classification schemes are insufficient, fragmented and often incompatible since each focuses on different perspectives (e.g., role of the computer, attack, attacker's or defender's viewpoint), or uses varying terminologies to refer to the same thing, making consistent cybercrime classifications improbable. In this paper we present and illustrate a new cybercrime ontology that incorporates multiple perspectives and offers a more holistic viewpoint for cybercrime classification than prior works. It should therefore prove to be a more useful tool for cybercrime stakeholders.

[1]  Björn Niehaves,et al.  Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research , 2018, Eur. J. Inf. Syst..

[2]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[3]  Nicola Guarino,et al.  Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .

[4]  Lila Rao-Graham,et al.  Towards defining dimensions of knowledge systems quality , 2007, Expert Syst. Appl..

[5]  Richard Ford,et al.  On the definition and classification of cybercrime , 2006, Journal in Computer Virology.

[6]  George M. Mohay,et al.  Dealing with the Problem of Cybercrime , 2010, ICDF2C.

[7]  Maria Kjaerland,et al.  A taxonomy and comparison of computer security incidents from the commercial and government sectors , 2006, Comput. Secur..

[8]  M. B. Peterson,et al.  Law Enforcement Analytic Standards , 2012 .

[9]  Alan R. Hevner,et al.  POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .

[10]  Georgios Paliouras,et al.  Ontology Population and Enrichment: State of the Art , 2011, Knowledge-Driven Multimedia Information Extraction and Ontology Evolution.

[11]  José H. Canós,et al.  On the way to learning style models integration: a Learner's Characteristics Ontology , 2017, Comput. Hum. Behav..

[12]  Geert Poels,et al.  Evaluating Quality of Conceptual Models Based on User Perceptions , 2006, ER.

[13]  Thomas R. Gruber,et al.  Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..

[14]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[15]  cyberdetective Convention on Cybercrime , 2007 .

[16]  Andrew James Simmonds,et al.  An Ontology for Network Security Attacks , 2004, AACC.

[17]  Suliman Al-Hawamdeh,et al.  Knowledge management in the public sector: principles and practices in police work , 2001, J. Inf. Sci..

[18]  Danielle Boulanger,et al.  Managing the domain knowledge: application to cultural patrimony , 2012 .

[19]  Russell G. Smith,et al.  Cyber Criminals on Trial: List of figures and tables , 2004 .

[20]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[21]  Kweku-Muata Osei-Bryson,et al.  A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction , 2014, CONF-IRM.

[22]  Weiping Chang,et al.  Knowledge Management in Cybercrime Investigation - A Case Study of Identifying Cybercrime Investigation Knowledge in Taiwan , 2014, PAISI.

[23]  Jerry H. Ratcliffe,et al.  Knowledge Management Challenges in the Development of Intelligence‐Led Policing , 2008 .

[24]  Petter Gottschalk,et al.  Police officers’ professional knowledge , 2008 .

[25]  Fawn T. Ngo,et al.  Commemorating a Decade in Existence of the International Journal of Cyber Criminology: A Research Agenda to Advance the Scholarship on Cyber Crime , 2017 .

[26]  Faten Kharbat,et al.  Building Ontology from Knowledge Base Systems , 2008 .

[27]  Kim-Kwang Raymond Choo,et al.  The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..

[28]  Soumyo D. Moitra,et al.  Cybercrime: Towards an Assessment of its Nature and Impact , 2004 .

[29]  Rosa Gil,et al.  Emotions ontology for collaborative modelling and learning of emotional responses , 2015, Comput. Hum. Behav..

[30]  Richard Gil,et al.  SMOL: a systemic methodology for ontology learning from heterogeneous sources , 2014, Journal of Intelligent Information Systems.

[31]  David S. Wall,et al.  The Internet as a Conduit for Criminal Activity , 2015 .

[32]  Kenneth C. Laudon,et al.  Essentials of Management Information Systems , 2000 .

[33]  Jose Manuel Corera,et al.  Building and Reusing Ontologies for Electrical Network Applications , 1996, ECAI.

[34]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[35]  Angelos Stavrou,et al.  Towards a Cyber Conflict Taxonomy , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[36]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[37]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[38]  Simon Brown,et al.  The Case for a Consistent Cyberscam Classification Framework (CCCF) , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[39]  Pawel Garbacz,et al.  A formal ontology of knowing and knowledge , 2012 .

[40]  Demetrios G. Sampson,et al.  A SKOS-based framework for Subject Ontologies to improve learning experiences , 2016, Comput. Hum. Behav..

[41]  Hsinchun Chen,et al.  COPLINK Center: Information and Knowledge Management for Law Enforcement , 2004, DG.O.

[42]  Juana María Ruiz-Martínez,et al.  An ontological model for managing professional expertise , 2016 .

[43]  Yingwei Luo,et al.  The Study and Application of Crime Emergency Ontology Event Model , 2005, KES.

[44]  Balbir S. Barn,et al.  An Ontological Representation of a Taxonomy for Cybercrime , 2016, ECIS.

[45]  Dale Dzemydiene,et al.  Ontology-Based Decision Support System for Crime Investigation Processes , 2005 .

[46]  Lynne M. Coventry,et al.  Costly but effective: Comparing the factors that influence employee anti-malware behaviours , 2018, Comput. Hum. Behav..

[47]  Louise Leenen,et al.  A Computer Network Attack Taxonomy and Ontology , 2012, Int. J. Cyber Warf. Terror..