Cybercriminal networks :: origin, growth and criminal capabilities /
This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks m...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Utrecht :
Eleven International,
[2016]
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks make full use of the advantages that digitization provides. Forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. |
Beschreibung: | 1 online resource (230 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 201-210). |
ISBN: | 9789462746138 9462746133 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn966641458 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161221s2016 ne a obm 000 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d N$T |d OCLCO |d IDB |d OCLCF |d YDX |d IDEBK |d CNCGM |d OCLCQ |d UAB |d MERUC |d AGLDB |d IGB |d CN8ML |d SNK |d INTCL |d MHW |d BTN |d AUW |d OCLCQ |d VTS |d D6H |d OCLCQ |d OCLCO |d G3B |d S8I |d S8J |d S9I |d STF |d OCLCQ |d OSU |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 967107956 |a 969542785 |a 975045457 |a 978448464 |a 978911676 |a 980907163 |a 987026479 |a 988764854 |a 991159388 |a 999473775 | ||
020 | |a 9789462746138 |q (electronic bk.) | ||
020 | |a 9462746133 |q (electronic bk.) | ||
020 | |z 9789462367081 |q (paperback) | ||
020 | |z 9462367086 |q (paperback) | ||
035 | |a (OCoLC)966641458 |z (OCoLC)967107956 |z (OCoLC)969542785 |z (OCoLC)975045457 |z (OCoLC)978448464 |z (OCoLC)978911676 |z (OCoLC)980907163 |z (OCoLC)987026479 |z (OCoLC)988764854 |z (OCoLC)991159388 |z (OCoLC)999473775 | ||
037 | |a 996347 |b MIL | ||
050 | 4 | |a HV6001-7220.5 | |
072 | 7 | |a SOC |x 004000 |2 bisacsh | |
072 | 7 | |a K |2 lcco | |
072 | 7 | |a HV |2 lcco | |
082 | 7 | |a 364 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Leukfeldt, E. R. |q (E. Rutger), |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjqv7y8Brh6KrD4GMQkCHy |0 http://id.loc.gov/authorities/names/n2010069558 | |
245 | 1 | 0 | |a Cybercriminal networks : |b origin, growth and criminal capabilities / |c E.R. Leukfeldt. |
264 | 1 | |a Utrecht : |b Eleven International, |c [2016] | |
300 | |a 1 online resource (230 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 201-210). | ||
520 | 8 | |a This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks make full use of the advantages that digitization provides. Forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. | |
505 | 0 | |a Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case. | |
505 | 8 | |a 3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy. | |
505 | 8 | |a 5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods. | |
505 | 8 | |a 8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction. | |
505 | 8 | |a 11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer crimes. |0 http://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Phishing. |0 http://id.loc.gov/authorities/subjects/sh2005003206 | |
650 | 0 | |a Malware (Computer software) |0 http://id.loc.gov/authorities/subjects/sh2009005103 | |
650 | 0 | |a Hacking. |0 http://id.loc.gov/authorities/subjects/sh2013002597 | |
650 | 6 | |a Criminalité informatique. | |
650 | 6 | |a Hameçonnage. | |
650 | 6 | |a Logiciels malveillants. | |
650 | 6 | |a Piratage informatique. | |
650 | 7 | |a SOCIAL SCIENCE |x Criminology. |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Hacking |2 fast | |
650 | 7 | |a Malware (Computer software) |2 fast | |
650 | 7 | |a Phishing |2 fast | |
758 | |i has work: |a Cybercriminal networks (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGd8bgfX3h3VYyrpXCRPDC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Leukfeldt, Rutger. |t Cybercriminal networks. Origin, growth and criminal capabilities. |d Utrecht : Eleven International 2016 |z 9789462367081 |w (OCoLC)961212515 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1441967 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1441967 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL4770596 | ||
938 | |a EBSCOhost |b EBSC |n 1441967 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis37239439 | ||
938 | |a YBP Library Services |b YANK |n 13229173 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn966641458 |
---|---|
_version_ | 1826942137206308864 |
adam_text | |
any_adam_object | |
author | Leukfeldt, E. R. (E. Rutger) |
author_GND | http://id.loc.gov/authorities/names/n2010069558 |
author_facet | Leukfeldt, E. R. (E. Rutger) |
author_role | aut |
author_sort | Leukfeldt, E. R. |
author_variant | e r l er erl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6001-7220 |
callnumber-raw | HV6001-7220.5 |
callnumber-search | HV6001-7220.5 |
callnumber-sort | HV 46001 47220.5 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBA |
contents | Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case. 3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy. 5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods. 8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction. 11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks. |
ctrlnum | (OCoLC)966641458 |
dewey-full | 364 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364 |
dewey-search | 364 |
dewey-sort | 3364 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07286cam a2200697 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn966641458</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">161221s2016 ne a obm 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">YDX</subfield><subfield code="d">IDEBK</subfield><subfield code="d">CNCGM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">MERUC</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IGB</subfield><subfield code="d">CN8ML</subfield><subfield code="d">SNK</subfield><subfield code="d">INTCL</subfield><subfield code="d">MHW</subfield><subfield code="d">BTN</subfield><subfield code="d">AUW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">G3B</subfield><subfield code="d">S8I</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OSU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">967107956</subfield><subfield code="a">969542785</subfield><subfield code="a">975045457</subfield><subfield code="a">978448464</subfield><subfield code="a">978911676</subfield><subfield code="a">980907163</subfield><subfield code="a">987026479</subfield><subfield code="a">988764854</subfield><subfield code="a">991159388</subfield><subfield code="a">999473775</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789462746138</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9462746133</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789462367081</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9462367086</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)966641458</subfield><subfield code="z">(OCoLC)967107956</subfield><subfield code="z">(OCoLC)969542785</subfield><subfield code="z">(OCoLC)975045457</subfield><subfield code="z">(OCoLC)978448464</subfield><subfield code="z">(OCoLC)978911676</subfield><subfield code="z">(OCoLC)980907163</subfield><subfield code="z">(OCoLC)987026479</subfield><subfield code="z">(OCoLC)988764854</subfield><subfield code="z">(OCoLC)991159388</subfield><subfield code="z">(OCoLC)999473775</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">996347</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6001-7220.5</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">K</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HV</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">364</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Leukfeldt, E. R.</subfield><subfield code="q">(E. Rutger),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjqv7y8Brh6KrD4GMQkCHy</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2010069558</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercriminal networks :</subfield><subfield code="b">origin, growth and criminal capabilities /</subfield><subfield code="c">E.R. Leukfeldt.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Utrecht :</subfield><subfield code="b">Eleven International,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (230 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 201-210).</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks make full use of the advantages that digitization provides. Forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029492</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2005003206</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2009005103</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013002597</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Hameçonnage.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels malveillants.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Piratage informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">Criminology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hacking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Malware (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Phishing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cybercriminal networks (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGd8bgfX3h3VYyrpXCRPDC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Leukfeldt, Rutger.</subfield><subfield code="t">Cybercriminal networks. Origin, growth and criminal capabilities.</subfield><subfield code="d">Utrecht : Eleven International 2016</subfield><subfield code="z">9789462367081</subfield><subfield code="w">(OCoLC)961212515</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1441967</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1441967</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4770596</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1441967</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis37239439</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">13229173</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn966641458 |
illustrated | Illustrated |
indexdate | 2025-03-18T14:23:13Z |
institution | BVB |
isbn | 9789462746138 9462746133 |
language | English |
oclc_num | 966641458 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (230 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Eleven International, |
record_format | marc |
spelling | Leukfeldt, E. R. (E. Rutger), author. https://id.oclc.org/worldcat/entity/E39PCjqv7y8Brh6KrD4GMQkCHy http://id.loc.gov/authorities/names/n2010069558 Cybercriminal networks : origin, growth and criminal capabilities / E.R. Leukfeldt. Utrecht : Eleven International, [2016] 1 online resource (230 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 201-210). This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks make full use of the advantages that digitization provides. Forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case. 3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy. 5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods. 8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction. 11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks. Print version record. Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Phishing. http://id.loc.gov/authorities/subjects/sh2005003206 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Criminalité informatique. Hameçonnage. Logiciels malveillants. Piratage informatique. SOCIAL SCIENCE Criminology. bisacsh Computer crimes fast Hacking fast Malware (Computer software) fast Phishing fast has work: Cybercriminal networks (Text) https://id.oclc.org/worldcat/entity/E39PCGd8bgfX3h3VYyrpXCRPDC https://id.oclc.org/worldcat/ontology/hasWork Print version: Leukfeldt, Rutger. Cybercriminal networks. Origin, growth and criminal capabilities. Utrecht : Eleven International 2016 9789462367081 (OCoLC)961212515 |
spellingShingle | Leukfeldt, E. R. (E. Rutger) Cybercriminal networks : origin, growth and criminal capabilities / Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case. 3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy. 5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods. 8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction. 11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks. Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Phishing. http://id.loc.gov/authorities/subjects/sh2005003206 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Criminalité informatique. Hameçonnage. Logiciels malveillants. Piratage informatique. SOCIAL SCIENCE Criminology. bisacsh Computer crimes fast Hacking fast Malware (Computer software) fast Phishing fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85029492 http://id.loc.gov/authorities/subjects/sh2005003206 http://id.loc.gov/authorities/subjects/sh2009005103 http://id.loc.gov/authorities/subjects/sh2013002597 |
title | Cybercriminal networks : origin, growth and criminal capabilities / |
title_auth | Cybercriminal networks : origin, growth and criminal capabilities / |
title_exact_search | Cybercriminal networks : origin, growth and criminal capabilities / |
title_full | Cybercriminal networks : origin, growth and criminal capabilities / E.R. Leukfeldt. |
title_fullStr | Cybercriminal networks : origin, growth and criminal capabilities / E.R. Leukfeldt. |
title_full_unstemmed | Cybercriminal networks : origin, growth and criminal capabilities / E.R. Leukfeldt. |
title_short | Cybercriminal networks : |
title_sort | cybercriminal networks origin growth and criminal capabilities |
title_sub | origin, growth and criminal capabilities / |
topic | Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Phishing. http://id.loc.gov/authorities/subjects/sh2005003206 Malware (Computer software) http://id.loc.gov/authorities/subjects/sh2009005103 Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Criminalité informatique. Hameçonnage. Logiciels malveillants. Piratage informatique. SOCIAL SCIENCE Criminology. bisacsh Computer crimes fast Hacking fast Malware (Computer software) fast Phishing fast |
topic_facet | Computer crimes. Phishing. Malware (Computer software) Hacking. Criminalité informatique. Hameçonnage. Logiciels malveillants. Piratage informatique. SOCIAL SCIENCE Criminology. Computer crimes Hacking Phishing |
work_keys_str_mv | AT leukfeldter cybercriminalnetworksorigingrowthandcriminalcapabilities |