Profiling the Cybercriminal: A Systematic Review of Research
暂无分享,去创建一个
[1] H. Raghav Rao,et al. Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests , 2017, Information Systems Frontiers.
[2] T. Holt,et al. Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap , 2019 .
[3] Catherine D. Marcum,et al. Incarceration or community placement: examining the sentences of cybercriminals , 2012 .
[4] Steven Furnell,et al. Cybercrime: Vandalizing the Information Society , 2003, ICWE.
[5] D. Tennenbaum. Personality and criminality a summary and implications of the literature , 1977 .
[6] Adedayo M. Balogun,et al. Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution , 2018, 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC).
[7] E. R. Leukfeldt,et al. Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness , 2019, Trends in Organized Crime.
[8] George E. Higgins,et al. Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .
[9] N. Shadbolt,et al. Trust among cybercriminals? Carding forums, uncertainty and implications for policing , 2013 .
[10] D. May,et al. America’s most wanted criminals: comparing cybercriminals and traditional criminals , 2018, Criminal Justice Studies.
[11] Eoghan Casey,et al. Cyberpatterns: Criminal Behavior on the Internet , 2012 .
[12] Steve Gold,et al. Understanding the hacker psyche , 2011, Netw. Secur..
[13] Paul M. Salmon,et al. It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums , 2015, HCI.
[14] D. Moher,et al. Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. , 2010, International journal of surgery.
[15] Jason R. C. Nurse. Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit , 2018, The Oxford Handbook of Cyberpsychology.
[16] J. Lickiewicz. Cyber CrIme psyChology – proposal of an offender psyChologICal profIle , 2011 .
[17] E. Rutger Leukfeldt,et al. A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists , 2017 .
[18] O. B. Longe,et al. Journal of Internet Banking and Commerce Action Speaks Louder than Words -understanding Cyber Criminal Behavior Using Criminological Theories , 2022 .
[19] Jason R. C. Nurse,et al. Behind the Mask: A Computational Study of Anonymous' Presence on Twitter , 2020, ICWSM.
[20] K. P. Chow,et al. An Exploratory Profiling Study of Online Auction Fraudsters , 2014, IFIP Int. Conf. Digital Forensics.
[21] Paul T. Costa,et al. Personality in Adulthood: A Five-Factor Theory Perspective , 2005 .
[22] E. Rutger Leukfeldt,et al. Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .
[23] David S. Wall,et al. The Devil Drives a Lada: The Social Construction of Hackers as the Cybercriminal , 2012 .
[24] Ryan Francis O. Cayubit,et al. A Cyber Phenomenon: A Q-Analysis on the Motivation of Computer Hackers , 2017 .
[25] Tranos Zuva,et al. Open issues in cybercriminal profiling , 2017, 2017 1st International Conference on Next Generation Computing Applications (NextComp).
[26] Eugen Kahn,et al. Crime and Personality * , 1934, The Yale journal of biology and medicine.
[27] Suleman Lazarus,et al. The Bifurcation of Nigerian Cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) Agents , 2019, Telematics Informatics.
[28] M. Brosnan,et al. Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? , 2019, Journal of Autism and Developmental Disorders.
[29] Michele Maasberg,et al. The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits , 2015, 2015 48th Hawaii International Conference on System Sciences.
[30] Sinchul Back,et al. Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[31] Ganna Pogrebna,et al. A Sneak Peek into the Motivation of a Cybercriminal , 2019, Navigating New Cyber Risks.
[32] E. R. Leukfeldt,et al. Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime , 2017 .
[33] H. Jahankhani,et al. Cybercrime Profiling and Trend Analysis , 2011 .
[34] Steve Warren,et al. How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? , 2017, HCI.
[35] Stilianos Vidalis,et al. Who are you Today? Profiling the ID Theft Fraudster , 2012 .
[36] W. Bernasco,et al. Cyber-Offending and Traditional Offending over the Life-Course: an Empirical Comparison , 2018, Journal of developmental and life-course criminology.
[37] Alice Hutchings,et al. Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission , 2014, Crime, Law and Social Change.
[38] Sasa Mrdovic,et al. Geographic profiling for serial cybercrime investigation , 2019, Digit. Investig..
[39] Ian Thornton-Trump. Malicious Attacks and Actors: An Examination of the Modern Cyber Criminal , 2018 .
[40] Kim-Kwang Raymond Choo. Organised crime groups in cyberspace: a typology , 2008 .
[41] Peter Grabosky,et al. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .
[42] Paul Benjamin Lowry,et al. Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes , 2019, Information Systems Frontiers.
[43] Eric D. Shaw,et al. The role of behavioral research and profiling in malicious cyber insider investigations , 2006, Digit. Investig..
[44] Pradeep Kumar Ray,et al. Towards a Methodology for Profiling Cyber Criminals , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[45] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[46] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[47] cyberdetective. Convention on Cybercrime , 2007 .
[48] Arun Warikoo,et al. Proposed Methodology for Cyber Criminal Profiling , 2014, Inf. Secur. J. A Glob. Perspect..
[49] Lucas Donato,et al. An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations , 2009, J. Digit. Forensic Pract..
[50] Marcus K. Rogers. Psychological profiling as an investigative tool for digital forensics , 2016 .