Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cybercrime

Known as: Internet crimes, Computer abuse, Attacking users 
Cybercrime, or computer crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Abstract The Internet threat landscape is fundamentally changing. A major shift away from hobby hacking toward well-organized… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This chapter documents what we believe to be the first systematic study of the costs of cybercrime. The initial workshop paper… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
How has the internet transformed criminal behaviour? What is different about cybercrime compared with traditional criminal… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
  • Nir Kshetri
  • IEEE Security & Privacy Magazine
  • 2006
  • Corpus ID: 1279404
The characteristics of cybercriminals, cybercrime victims, and law enforcement agencies have a reinforcing effect on each other… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Recent discussions of ‘cybercrime’ focus upon the apparent novelty or otherwise of the phenomenon. Some authors claim that such… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 1
Is this relevant?
Highly Cited
1986
Highly Cited
1986
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
  • figure 5-1
Is this relevant?