Abstract
AbstractThis article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable.
Publisher
Springer Science and Business Media LLC
Reference49 articles.
1. Ablon L, Libicki MC, Golay AA (2014) Markets for cybercrime tools and stolen data. Hackers’ Bazaar. RAND: www.rand.org
2. Bijlenga N, Kleemans ER (2018) Criminals seeking ICT-expertise: an exploratory study of dutch cases. Eur J Criminal Policy Res. https://doi.org/10.1007/s10610-017-9356-z
3. Bulanova-Hristova G, Kasper K, Odinot G, Verhoeven M, Pool R, de Poot C, Werner W, Korsell L (eds) (2016) Cyber-OC - scope and manifestations in selected EU member states. Bundeskriminalamt, Wiesbaden
4. Campana P (2016) The structure of human trafficking: lifting the Bonnet on a nigerian transnational network. Br J Criminol 56(1):68–86
5. Chu B, Holt TJ, Ahn GJ (2010) Examining the creation, distribution, and function of malware on-line. Technical Report for National Institute of Justice. NIJ Grant No. 2007-IJ-CX-0018. Available at https://www.ncjrs.gov/pdffiles1/nij/grants/230112.pdf
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献