Abstract
Painted in the broadest of strokes, cybercrime essentially is the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud, and, in some cases, corporate espionage. Who are the miscreants who commit these crimes, and what are their motivations? One might imagine they are not the same individuals committing crimes in the physical world. Bank robbers and scam artists garner a certain public notoriety after only a few occurrences of their crimes, yet cybercriminals largely remain invisible and unheralded. Based on sketchy news accounts and a few public arrests, such as Mafiaboy, accused of paralyzing Amazon, CNN, and other Web sites, the public may infer these miscreants are merely a subculture of teenagers. In this article we provide insight into the root causes of cybercrime, its participants and their motivations, and we identify some of the issues inherent in dealing with this crime wave.
Publisher
Association for Computing Machinery (ACM)
Reference3 articles.
1. National Strategy to Secure Cyberspace; http://www.whitehouse.gov/pcipb/. National Strategy to Secure Cyberspace; http://www.whitehouse.gov/pcipb/.
2. Council on Europe; http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=8/18/2006&CL=ENG Council on Europe; http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM=8&DF=8/18/2006&CL=ENG
3. Charney S. 2005. Combating cybercrime: a public-private strategy in the digital environment; http://www.nwacc.org/programs/conf05/UNCrimeCongressPaper.doc. Charney S. 2005. Combating cybercrime: a public-private strategy in the digital environment; http://www.nwacc.org/programs/conf05/UNCrimeCongressPaper.doc.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Bibliometric analysis of artificial intelligence trends in auditing and fraud detection;Corporate Governance and Organizational Behavior Review;2024
2. Cybercrime: Concerns, Challenges and Opportunities;Studies in Computational Intelligence;2016-10-22
3. URL Manipulation and the Slippery Slope;Human Rights and Ethics;2015
4. URL Manipulation and the Slippery Slope;International Journal of Interdisciplinary Telecommunications and Networking;2013-04
5. Crimeware-as-a-service—A survey of commoditized crimeware in the underground market;International Journal of Critical Infrastructure Protection;2013-03