Cargando…

Cybercriminal networks : origin, growth and criminal capabilities /

This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Leukfeldt, E. R. (E. Rutger) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Utrecht : Eleven International, [2016]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_ocn966641458
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 161221s2016 ne a obm 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d N$T  |d OCLCO  |d IDB  |d OCLCF  |d YDX  |d IDEBK  |d CNCGM  |d OCLCQ  |d UAB  |d MERUC  |d AGLDB  |d IGB  |d CN8ML  |d SNK  |d INTCL  |d MHW  |d BTN  |d AUW  |d OCLCQ  |d VTS  |d D6H  |d OCLCQ  |d OCLCO  |d G3B  |d S8I  |d S8J  |d S9I  |d STF  |d OCLCQ  |d OSU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 967107956  |a 969542785  |a 975045457  |a 978448464  |a 978911676  |a 980907163  |a 987026479  |a 988764854  |a 991159388  |a 999473775 
020 |a 9789462746138  |q (electronic bk.) 
020 |a 9462746133  |q (electronic bk.) 
020 |z 9789462367081  |q (paperback) 
020 |z 9462367086  |q (paperback) 
029 1 |a AU@  |b 000059644049 
035 |a (OCoLC)966641458  |z (OCoLC)967107956  |z (OCoLC)969542785  |z (OCoLC)975045457  |z (OCoLC)978448464  |z (OCoLC)978911676  |z (OCoLC)980907163  |z (OCoLC)987026479  |z (OCoLC)988764854  |z (OCoLC)991159388  |z (OCoLC)999473775 
037 |a 996347  |b MIL 
050 4 |a HV6001-7220.5 
072 7 |a SOC  |x 004000  |2 bisacsh 
072 7 |a K  |2 lcco 
072 7 |a HV  |2 lcco 
082 0 4 |a 364  |2 22 
049 |a UAMI 
100 1 |a Leukfeldt, E. R.  |q (E. Rutger),  |e author. 
245 1 0 |a Cybercriminal networks :  |b origin, growth and criminal capabilities /  |c E.R. Leukfeldt. 
264 1 |a Utrecht :  |b Eleven International,  |c [2016] 
300 |a 1 online resource (230 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 201-210). 
520 8 |a This book is about cybercriminal networks that make use of digital means. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Some networks make full use of the advantages that digitization provides. Forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. 
505 0 |a Cover; Title page; Contents; 1. Introduction; 1.1 Background; 1.2 Research questions; 1.3 Data and methods; 1.4 Outline for dissertation; PART I: THEORY; 2. Cybercrime, social opportunitystructures and routine activitytheory; 2.1 Introduction; 2.2 Cybercrime and social opportunity structures; 2.3 Cybercrime and routine activity theory; 2.4 Theoretical model of social opportunity structures and routine activities; PART II: CYBERCRIMINAL NETWORKS; Introduction; 3. Cybercrime and social ties; 3.1 Introduction; 3.2 Data and methods; 3.3 Phishing: the Amsterdam case. 
505 8 |a 3.4 Similarities and differences between the case reported by Soudijn and Zegers and the Amsterdam case3.5 Opportunities for situational crime prevention; 3.6 Conclusion and discussion; 4. Social ties versus digital ties within cybercriminal networks; 4.1 Introduction; 4.2 (Cyber)criminal networks and social opportunity structures; 4.3 Data and methods; 4.4 Empirical results; 4.5 Discussion and conclusion; 5. A taxonomy of cybercriminal networks; 5.1 Introduction; 5.2 Social opportunity structures; 5.3 Data and methods; 5.4 Criminal opportunities; 5.5 Mapping the networks; 5.6 Taxonomy. 
505 8 |a 5.7 Conclusion and discussion6. Origin, growth and criminal capabilities of cybercriminal networks; 6.1 Introduction; 6.2 Prior empirical research in the Netherlands; 6.3 Data and methods; 6.4 Results; 6.5 Conclusion and discussion; 7. Money mules; 7.1 Introduction; 7.2 Prior empirical research on cybercriminal networks and money mules; 7.3 Data and methods; 7.4 Results; 7.5 Conclusion and discussion; PART III: SUITABLE TARGETS; Introduction; 8. Suitable targets for phishing; 8.1 Introduction; 8.2 Suitable targets: expectations based on routine activity theory; 8.3 Data and methods. 
505 8 |a 8.4 Suitable targets: risk factors8.5 Discussion: opportunities for crime prevention; 9. Suitable targets for phishing and malware compared; 9.1 Introduction; 9.2 Suitable targets: expectations based on routine activity theory; 9.3 Data and methods; 9.4 Suitable targets: risk factors compared; 9.5 Conclusion and discussion; 10. An in-depth analysis of suitable targets; 10.1 Introduction; 10.2 Theoretical background; 10.3 Methods; 10.4 Results; 10.5 Conclusion and discussion; PART IV: CONCLUSION ANDDISCUSSION; 11. Conclusion and discussion; 11.1 Introduction. 
505 8 |a 11.2 What are the processes of origin and growth of the cybercriminal networks?11.3 What is the structure of cybercriminal networks?; 11.4 What is the modus operandi of cybercriminal networks?; 11.5 Who are suitable targets for cybercriminal networks?; 11.6 Theoretical implications; 11.7 Practical implications: possibilities for situational crime prevention; 11.8 Research limitations and future research directions; SUMMARY; Samenvatting; References; Appendix 1: Definitions; Appendix 2: Analytical framework cybercriminal networks; Appendix 3: Informed consent study into cybercriminal networks. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer crimes. 
650 0 |a Phishing. 
650 0 |a Malware (Computer software) 
650 0 |a Hacking. 
650 6 |a Criminalité informatique. 
650 6 |a Hameçonnage. 
650 6 |a Logiciels malveillants. 
650 6 |a Piratage informatique. 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Malware (Computer software)  |2 fast  |0 (OCoLC)fst01748230 
650 7 |a Phishing.  |2 fast  |0 (OCoLC)fst01737436 
776 0 8 |i Print version:  |a Leukfeldt, Rutger.  |t Cybercriminal networks. Origin, growth and criminal capabilities.  |d Utrecht : Eleven International 2016  |z 9789462367081  |w (OCoLC)961212515 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1441967  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4770596 
938 |a EBSCOhost  |b EBSC  |n 1441967 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37239439 
938 |a YBP Library Services  |b YANK  |n 13229173 
994 |a 92  |b IZTAP