1-20 of 112
Keywords: cybercrime
Sort by
Journal Article
Catherine Carpentier-Desjardins and others
Journal of Cybersecurity, Volume 11, Issue 1, 2025, tyae029, https://doi.org/10.1093/cybsec/tyae029
Published: 20 January 2025
...% of all financial damages. The study offers a preliminary assessment of the size and scope of crime events within the DeFi sector and highlights the vulnerable position of DeFi actors in the ecosystem. cryptoassets decentralized finance profit-driven crime evidenced-based framework cybercrime Biocodex...
Journal Article
Heemeng Ho and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae020, https://doi.org/10.1093/cybsec/tyae020
Published: 19 November 2024
... is properly cited. Abstract Situational Crime Prevention (SCP) is a well-documented crime prevention approach that reduces criminal opportunities for a range of different crimes. However, SCP adoption in combating cybercrimes is currently limited. Current cybersecurity controls are not mapped to crime...
Journal Article
Gareth Mott and others
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae013, https://doi.org/10.1093/cybsec/tyae013
Published: 30 July 2024
... organizational ransomware preparedness and tailored post-ransomware mitigation. cyber security ransomware harms victim experience malware human aspects psychological harm financial harm cyberpsychology cybercrime The Research Institute for Sociotechnical Cyber Security Engineering and Physical...
Journal Article
Remco Spithoven and Anthonie Drenth
Journal of Cybersecurity, Volume 10, Issue 1, 2024, tyae010, https://doi.org/10.1093/cybsec/tyae010
Published: 18 June 2024
... of the human-as-solution approach.. phishing cybercrime public organizations cyber resilience awareness human-as-solution For many years phishing has been top of the list as the most frequently occurring digital crime in organizations [ 1 , 2 ]. This comes as no real surprise. Cybercriminals often use...
Journal Article
Alexander Bilz and others
Interacting with Computers, Volume 35, Issue 6, November 2023, Pages 773–788, https://doi.org/10.1093/iwc/iwad048
Published: 27 October 2023
... for monetary gain. It is a cruel form of cybercrime whereby victims are left heartbroken, often facing financial ruin. We characterize the literary landscape on romance scams, advancing the understanding of researchers and practitioners by systematically reviewing and synthesizing contemporary qualitative...
Journal Article
Katie Logos and others
International Journal of Law and Information Technology, Volume 31, Issue 3, Autumn 2023, Pages 186–212, https://doi.org/10.1093/ijlit/eaad023
Published: 05 October 2023
.... Beyond international law, namely Article 32 the Budapest Convention on Cybercrime 18 (for which Australia is a signatory), there is no specific law which expressly governs the use of ADCT in Australia. Further, there is very scant judicial guidance. A comprehensive review of federal...
Journal Article
Timothy C Haas
Journal of Cybersecurity, Volume 9, Issue 1, 2023, tyad004, https://doi.org/10.1093/cybsec/tyad004
Published: 22 March 2023
... of security operations center managers [ 28 ]. Reducing wildlife cybercrime, however, will need peer-to-peer management of a large number of independent wildlife trafficking investigators who work across many countries and who require that they retain control over who they trust [ 29 , 30...
Journal Article
Fran Casino and others
Journal of Cybersecurity, Volume 8, Issue 1, 2022, tyac014, https://doi.org/10.1093/cybsec/tyac014
Published: 15 December 2022
... strategies to fill in the identified gaps timely and accurately. cybercrime digital evidence digital forensics evidence exchange international investigation cross-border collaboration Horizon 2020 10.13039/100010661 832735 Government of Catalonia 10.13039/501100002809 101021801 00035...
Journal Article
Masarah Paquet-Clouston and others
Journal of Cybersecurity, Volume 8, Issue 1, 2022, tyac010, https://doi.org/10.1093/cybsec/tyac010
Published: 15 July 2022
... medium, provided the original work is properly cited. Abstract Many activities related to cybercrime operations do not require much secrecy, such as developing websites or translating texts. This research provides indications that many users of a popular public internet marketing forum have connections...
Journal Article
Steven Cook and others
The British Journal of Criminology, Volume 63, Issue 2, March 2023, Pages 384–406, https://doi.org/10.1093/bjc/azac021
Published: 09 May 2022
...Steven Cook; Luca Giommoni; Nicolas Trajtenberg Pareja; Michael Levi; Matthew L Williams Abstract Despite the increasing prevalence of cybercrime and its study by criminologists, very little research has examined the extent, nature, and impact of fear of cybercrime. In this study, we conducted...
Journal Article
Simon Mackenzie
The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1537–1552, https://doi.org/10.1093/bjc/azab118
Published: 07 February 2022
... that the grey economy of cryptocurrency trading is part of a wider evolution of society towards the technosocial, and beyond that perhaps towards the metaversal. cryptocurrency scams fraud financial crime cybercrime European Research Council 10.13039/501100000781 European Union’s Horizon 2020...
Journal Article
Asher Flynn and others
The British Journal of Criminology, Volume 62, Issue 6, November 2022, Pages 1341–1358, https://doi.org/10.1093/bjc/azab111
Published: 03 December 2021
... and harms of deepfake and digitally altered imagery abuse, as well as challenges in legal responses, policing and prevention. deepfakes image-based sexual abuse revenge pornography sexual violence cybercrime Australian Research Council 10.13039/501100000923 DP170101433 Image-based sexual abuse...
Journal Article
Max Boholm
Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab016, https://doi.org/10.1093/cybsec/tyab016
Published: 15 July 2021
... linking them to topical events, as is otherwise typical of news reports. The findings in relation to previous studies of cybersecurity discourse and the implications for informal learning and threat perception are discussed. discourse cybercrime text analysis media Information security...
Journal Article
Fintan J Parsons and others
Journal of Travel Medicine, Volume 28, Issue 8, December 2021, taab103, https://doi.org/10.1093/jtm/taab103
Published: 06 July 2021
... to cover travel costs, medical expenses or to fund a business opportunity may be sent by the scammer. What to do if a victim of financial cybercrime Make a formal report to local law enforcement. Change compromised passwords. Contact bank and credit card companies to report concerns regarding...
Journal Article
Ben Collier and others
The British Journal of Criminology, Volume 61, Issue 5, September 2021, Pages 1407–1423, https://doi.org/10.1093/bjc/azab026
Published: 15 April 2021
... analysis of empirical data from interviews and novel data sources such as forums and chat channels, we argue that as they industrialize, deviant subcultures can begin to replicate the division of labour, cultural tensions and conditions of alienation present in mainstream capitalist economies. cybercrime...
Journal Article
Justin K Haner and Robert K Knake
Journal of Cybersecurity, Volume 7, Issue 1, 2021, tyab003, https://doi.org/10.1093/cybsec/tyab003
Published: 10 April 2021
... the original work is properly cited. Abstract Malicious networks of botnets continue to grow in strength as millions of new users and devices connect to the internet each day, many becoming unsuspectingly complicit in cyber-attacks or unwitting accomplices to cybercrimes. Both states and nonstate actors use...
Journal Article
Robert A Roks and others
The British Journal of Criminology, Volume 61, Issue 4, July 2021, Pages 926–945, https://doi.org/10.1093/bjc/azaa091
Published: 29 December 2020
... research approaches, concluding that ‘each have particular commitments in their respective fields that when combined can be mutually beneficial’. The current study follows this thinking, drawing to different data sources to bridge between the study of (economic) street crimes and cybercrime. It is driven...
Journal Article
Lena Yuryna Connolly and others
Journal of Cybersecurity, Volume 6, Issue 1, 2020, tyaa023, https://doi.org/10.1093/cybsec/tyaa023
Published: 28 December 2020
...-ransomware propagation class had any significant bearing on the severity of the outcome, but attacks that were purposefully directed at specific victims wreaked more damage than opportunistic ones. ransomware cybercrime attack severity vulnerability factors victimization impact assessment In recent...
Journal Article
Luigi Tavazzi
European Heart Journal Supplements, Volume 21, Issue Supplement_B, March 2019, Pages B98–B102, https://doi.org/10.1093/eurheartj/suz034
Published: 29 March 2019
... evidence-based Public Health System: the Learning Health System. The road will be long and gruelling. A first negative by-product is the proliferation of cybercrime throughout digital medicine. Big data Digitalization Health cybercrime Big data is a technical term used to measure byte...
Journal Article
Markus Riek and Rainer Böhme
Journal of Cybersecurity, Volume 4, Issue 1, 2018, tyy004, https://doi.org/10.1093/cybsec/tyy004
Published: 11 October 2018
... evidence”. Several academic scholars, public, and private organizations have worked on measuring cybercrime. We review available data sources for consumer-facing cybercrime in ‘Data sources’, thereby motivating the use of victimization surveys. Section ‘Victimization surveys on cybercrime’ provides...