Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit

@article{Nurse2018CybercrimeAY,
  title={Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit},
  author={Jason R. C. Nurse},
  journal={ArXiv},
  year={2018},
  volume={abs/1811.06624}
}
Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online… 

Figures and Tables from this paper

Cybersecurity Awareness
  • Jason R. C. Nurse
  • Computer Science
    Encyclopedia of Cryptography, Security and Privacy
  • 2021
TLDR
Information and communication technologies have become a core part of society, and are increasingly used to support governments and interaction between workers and members of the public, and Cyber-attacks, i.e., threats that leverage cyberspace, are constantly growing.
The Social and Psychological Impact of Cyber-Attacks
The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
TLDR
This chapter critically examines the group element of cybercrime from several perspectives, and identifies the platforms that online groups—cybercriminal and otherwise—use to interact, and considers groups as both perpetrators and victims of cyber crime.
Profiling the Cybercriminal: A Systematic Review of Research
  • Maria Bada, Jason R. C. Nurse
  • Computer Science
    2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
  • 2021
TLDR
The review found that one of the primary types of cybercriminals that studies have focused on is hackers and the majority of papers used the deductive approach as a preferred one, demonstrating that overall, there is lack of a common definition of profiling for cyber-offenders.
The Infodemic as a Threat to Cybersecurity
  • Tiffany Smith
  • Computer Science
    The International Journal of Intelligence, Security, and Public Affairs
  • 2021
TLDR
This paper will delve into the caveats of the cyber threats posed by the infodemic and what it means for the broader network of cybersecurity and the protection of human rights in cyberspace.
Cybercrimes during COVID -19 Pandemic
TLDR
The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic.
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
TLDR
This paper uses interviews with experts from government and private sectors who investigate cybercrimes as the main data gathering process and identifies several outstanding challenges faced by investigators, which pertain to practical, technical, and social issues such as systems availability, usability, and in computer-supported collaborative work.
An Exploration of the Psychological Impact of Hacking Victimization
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studies have examined the adverse psychological impact of cybercrime for victims; however, the specific
CYBER CRIME IN PAKISTAN; DETECTION AND PUNISHMENT MECHANISM
“Cyber Crime in Pakistan; Detection and Punishment Mechanism” addresses improvement of public health and safety policies by focusing on enhancing knowledge about cybercrime, women victimization, the
...
...

References

SHOWING 1-10 OF 83 REFERENCES
Cyberstalking, a New Crime: Evaluating the Effectiveness of Current State and Federal Laws
Cyberstalking involves using the Internet, e-mail, or other means of electronic communication to repeatedly harass or threaten another individual. This article explores how the nature of
The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
TLDR
This chapter critically examines the group element of cybercrime from several perspectives, and identifies the platforms that online groups—cybercriminal and otherwise—use to interact, and considers groups as both perpetrators and victims of cyber crime.
The Internet as a Conduit for Criminal Activity
TLDR
While there appears to be a common view that the Internet has had a major impact upon criminality, there is much less consensus as to what that impact has been and a large gap in understanding.
Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace
The Internet and the criminal behaviour it transforms (cybercrime) pose considerable challenges for order maintenance and law enforcement because Internet‐related offending takes place within a
Trustworthy and effective communication of cybersecurity risks: A review
TLDR
Information-trustworthiness research and the established field of risk communication are drawn on if systems are to be designed that play to individuals' strengths and assist them in maintaining security and protecting their applications and information.
Baiting the hook: factors impacting susceptibility to phishing attacks
TLDR
Gender and the years of PC usage have a statistically significant impact on the detection rate of phishing; pop-up based attacks have a higher rate of success than the other tested strategies; and, the psychological anchoring effect can be observed in phishing as well.
On the definition and classification of cybercrime
TLDR
The breadth of computer-based crime is explored, providing a definition of the emerging terms “Cybercrime” and “crimeware”, and two case studies are used to illustrate the role of crimeware in different types of Cybercrime.
Cyberstalking versus off-line stalking in a forensic sample
TLDR
Comparing 36 cyberstalking offenders with an age and gender matched sample of 36 off-line stalkers to investigate differences in demographic, clinical and behavioural characteristics support broad conclusions from previous research indicating that there are relatively few differences between cyberstalkers and off- line stalkers.
Cyberbullying: another main type of bullying?
TLDR
There was a significant incidence of cyberbullying in lower secondary schools, less in sixth-form colleges, and gender differences were few.
A TYPOLOGY OF IDENTITY-RELATED CRIME
Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of
...
...