Organised crime groups in cyberspace: a typology

@article{Choo2008OrganisedCG,
  title={Organised crime groups in cyberspace: a typology},
  author={Kim-Kwang Raymond Choo},
  journal={Trends in Organized Crime},
  year={2008},
  volume={11},
  pages={270-295}
}
Three categories of organised groups that exploit advances in information and communications technologies (ICT) to infringe legal and regulatory controls: (1) traditional organised criminal groups which make use of ICT to enhance their terrestrial criminal activities; (2) organised cybercriminal groups which operate exclusively online; and (3) organised groups of ideologically and politically motivated individuals who make use of ICT to facilitate their criminal conduct are described in this… 
Cybercrime and Online Safety in Cyberspace
TLDR
This paper outlines some of the issues and problems in respect to the role of OC in cybercrime.
Algorithms and Methods for Organised Cybercrime Analysis
TLDR
This thesis seeks to use graph-based algorithms and methods to analyse network structures to identify interesting and relevant individuals within such networks to bridge the gap between law enforcement agencies and cybercrimials by proposing an improved way of prioritising individuals within these networks.
Cybercrime and On-Line Safety in Cyberspace
TLDR
This paper outlines some of the issues and problems in respect to the role of OC in cybercrime and outlines the scope of offences that occur in cyberspace.
Identifying Central Individuals in Organised Criminal Groups and Underground Marketplaces
TLDR
The result show that centrality measures favour individuals with more communication rather than individuals usually considered more important: organised crime leaders and cyber criminals who sell illegal materials, products and services.
Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission
This paper examines a predominantly Australian sample of computer crime offenders involved in fraud and/or unauthorised access. This paper focuses on the extent to which offenders are involved in
Criminals seeking ICT-expertise: an exploratory study of Dutch cases
Which opportunities due to digitization are exploited by criminals? And how do criminals gather the required ICT-expertise to take advantage of these opportunities? This exploratory study provides
Management models for international cybercrime
TLDR
How the management structure of cybercriminals has changed and will continue to be revised in the future as their criminal business models are modified is identified.
An incipient taxonomy of organised crime
This article constructs a taxonomy of organised crime groups. It examines the existing literature and finds a sizeable gap in relation to the classification of organised crime groups. The article
Underground Cyber Economy and the Implication for Africa's Development
Cybercrime and the activities of the underground cyber economy has detrimental consequences for the growth, development, and wellbeing of individuals, groups, organizations, and nations of the world.
Illicit network structures in cyberspace
  • Kaarel Kalm
  • Computer Science
    2013 5th International Conference on Cyber Conflict (CYCON 2013)
  • 2013
TLDR
The purpose of this paper is to review the current state of research into illicit networks in cyberspace and to apply the terminology and concepts of Social Network Analysis on criminal organisations operating online.
...
...

References

SHOWING 1-10 OF 35 REFERENCES
Criminal Exploitation of Online Systems by Organised Crime Groups
This article considers how information and communications technologies (ICT) can be used by organised crime groups to infringe legal and regulatory controls. Three categories of groups are
Transnational organised cyber crime: distinguishing threat from reality
Cybercrime has become an integral part of the transnational threat landscape and conjures up pressing images of nefarious and increasingly complex online activity. More recently, the concept of
The risks to business presented by organised and economically motivated criminal enterprises
Purpose – Based on a presentation at the 24th International Symposium on Economic Crime, September 2006, at the University of Cambridge, this paper aims to discuss the risks to business from
Future directions in technology-enabled crime: 2007-09
The aim of this report was to identify the crime risks which will arise between 2007-09 out of the environment in which Australians use information and communications technologies. The aim of this
Requirements of prosecution services to deal with cyber crime
The advent of digital technology and the convergence of computing and communications have begun to change the way we live. These trends have also created unprecedented opportunities for crime.
Money Laundering and Terrorism Financing Risks of Prepaid Cards Instruments?
Advances in information and communication technologies (ICT) have had, and will continue to have, wide-ranging influences on how the banking and finance industry operates. Making payments and
Cybercrime in Taiwan - An Analysis of Suspect Records
TLDR
The findings show that the top five categories of crime committed over the past six years are sex trading or sex trading on the Internet, Internet fraud, larceny, cyber piracy and cyber pornography.
Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships
TLDR
It is concluded that, as opposed to the fixed, hierarchical organizational models found in the "real world," criminal organization in the cyberworld will be transient, lateral and fluid, all of which can pose real challenges for law enforcement.
The prosecution of Chinese organized crime groups: the Sister Ping case and its lessons
This article analyzes the investigation and prosecution of contemporary Chinese criminal organizations through the study of one major human smuggling case: the trial of “Sister Ping.” Data were
...
...