Profiling the Cybercriminal: A Systematic Review of Research

As cybercrime becomes one of the most significant threats facing society today, it is of utmost importance to better understand the perpetrators behind such attacks. In this article, we seek to advance research and practitioner understanding of the cybercriminal (cyber-offender) profiling domain by conducting a rigorous systematic review. This work investigates the afore-mentioned domain to answer the question: what is the state-of-the-art in the academic field of understanding, characterising and profiling cybercriminals. Through the application of the PRISMA systematic literature review technique, we identify 39 works from the last 14 years (2006-2020). Our findings demonstrate that overall, there is lack of a common definition of profiling for cyber-offenders. The review found that one of the primary types of cybercriminals that studies have focused on is hackers and the majority of papers used the deductive approach as a preferred one. This article produces an up-to-date characterisation of the field and also defines open issues deserving of further attention such as the role of security professionals and law enforcement in supporting such research, as well as factors including personality traits which must be further researched whilst exploring online criminal behaviour. By understanding online offenders and their pathways towards malevolent behaviours, we can better identify steps that need to be taken to prevent such criminal activities.

[1]  H. Raghav Rao,et al.  Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests , 2017, Information Systems Frontiers.

[2]  T. Holt,et al.  Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap , 2019 .

[3]  Catherine D. Marcum,et al.  Incarceration or community placement: examining the sentences of cybercriminals , 2012 .

[4]  Steven Furnell,et al.  Cybercrime: Vandalizing the Information Society , 2003, ICWE.

[5]  D. Tennenbaum Personality and criminality a summary and implications of the literature , 1977 .

[6]  Adedayo M. Balogun,et al.  Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution , 2018, 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC).

[7]  E. R. Leukfeldt,et al.  Criminal networks in a digitised world: on the nexus of borderless opportunities and local embeddedness , 2019, Trends in Organized Crime.

[8]  George E. Higgins,et al.  Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .

[9]  N. Shadbolt,et al.  Trust among cybercriminals? Carding forums, uncertainty and implications for policing , 2013 .

[10]  D. May,et al.  America’s most wanted criminals: comparing cybercriminals and traditional criminals , 2018, Criminal Justice Studies.

[11]  Eoghan Casey,et al.  Cyberpatterns: Criminal Behavior on the Internet , 2012 .

[12]  Steve Gold,et al.  Understanding the hacker psyche , 2011, Netw. Secur..

[13]  Paul M. Salmon,et al.  It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums , 2015, HCI.

[14]  D. Moher,et al.  Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. , 2010, International journal of surgery.

[15]  Jason R. C. Nurse Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit , 2018, The Oxford Handbook of Cyberpsychology.

[16]  J. Lickiewicz Cyber CrIme psyChology – proposal of an offender psyChologICal profIle , 2011 .

[17]  E. Rutger Leukfeldt,et al.  A typology of cybercriminal networks: from low-tech all-rounders to high-tech specialists , 2017 .

[18]  O. B. Longe,et al.  Journal of Internet Banking and Commerce Action Speaks Louder than Words -understanding Cyber Criminal Behavior Using Criminological Theories , 2022 .

[19]  Jason R. C. Nurse,et al.  Behind the Mask: A Computational Study of Anonymous' Presence on Twitter , 2020, ICWSM.

[20]  K. P. Chow,et al.  An Exploratory Profiling Study of Online Auction Fraudsters , 2014, IFIP Int. Conf. Digital Forensics.

[21]  Paul T. Costa,et al.  Personality in Adulthood: A Five-Factor Theory Perspective , 2005 .

[22]  E. Rutger Leukfeldt,et al.  Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis , 2017 .

[23]  David S. Wall,et al.  The Devil Drives a Lada: The Social Construction of Hackers as the Cybercriminal , 2012 .

[24]  Ryan Francis O. Cayubit,et al.  A Cyber Phenomenon: A Q-Analysis on the Motivation of Computer Hackers , 2017 .

[25]  Tranos Zuva,et al.  Open issues in cybercriminal profiling , 2017, 2017 1st International Conference on Next Generation Computing Applications (NextComp).

[26]  Eugen Kahn,et al.  Crime and Personality * , 1934, The Yale journal of biology and medicine.

[27]  Suleman Lazarus,et al.  The Bifurcation of Nigerian Cybercriminals: Narratives of the Economic and Financial Crimes Commission (EFCC) Agents , 2019, Telematics Informatics.

[28]  M. Brosnan,et al.  Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? , 2019, Journal of Autism and Developmental Disorders.

[29]  Michele Maasberg,et al.  The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits , 2015, 2015 48th Hawaii International Conference on System Sciences.

[30]  Sinchul Back,et al.  Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[31]  Ganna Pogrebna,et al.  A Sneak Peek into the Motivation of a Cybercriminal , 2019, Navigating New Cyber Risks.

[32]  E. R. Leukfeldt,et al.  Organised Cybercrime or Cybercrime that is Organised? An Assessment of the Conceptualisation of Financial Cybercrime as Organised Crime , 2017 .

[33]  H. Jahankhani,et al.  Cybercrime Profiling and Trend Analysis , 2011 .

[34]  Steve Warren,et al.  How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? , 2017, HCI.

[35]  Stilianos Vidalis,et al.  Who are you Today? Profiling the ID Theft Fraudster , 2012 .

[36]  W. Bernasco,et al.  Cyber-Offending and Traditional Offending over the Life-Course: an Empirical Comparison , 2018, Journal of developmental and life-course criminology.

[37]  Alice Hutchings,et al.  Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission , 2014, Crime, Law and Social Change.

[38]  Sasa Mrdovic,et al.  Geographic profiling for serial cybercrime investigation , 2019, Digit. Investig..

[39]  Ian Thornton-Trump Malicious Attacks and Actors: An Examination of the Modern Cyber Criminal , 2018 .

[40]  Kim-Kwang Raymond Choo Organised crime groups in cyberspace: a typology , 2008 .

[41]  Peter Grabosky,et al.  Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime , 2014 .

[42]  Paul Benjamin Lowry,et al.  Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes , 2019, Information Systems Frontiers.

[43]  Eric D. Shaw,et al.  The role of behavioral research and profiling in malicious cyber insider investigations , 2006, Digit. Investig..

[44]  Pradeep Kumar Ray,et al.  Towards a Methodology for Profiling Cyber Criminals , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[45]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[46]  Kim-Kwang Raymond Choo,et al.  Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .

[47]  cyberdetective Convention on Cybercrime , 2007 .

[48]  Arun Warikoo,et al.  Proposed Methodology for Cyber Criminal Profiling , 2014, Inf. Secur. J. A Glob. Perspect..

[49]  Lucas Donato,et al.  An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations , 2009, J. Digit. Forensic Pract..

[50]  Marcus K. Rogers Psychological profiling as an investigative tool for digital forensics , 2016 .