Cybercrime

Known as: Internet crimes, Computer abuse, Attacking users 
Cybercrime, or computer crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1970-2017
05010015019702017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
This chapter documents what we believe to be the first systematic study of the costs of cybercrime. The initial workshop paper… (More)
  • figure 12.1
  • table 12.1
  • table 12.1
Is this relevant?
2011
2011
IP source addresses are often the only initial lead when investigating cybercrime in the Internet. Unfortunately, source… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in… (More)
Is this relevant?
2011
2011
  • Cheng Yan
  • 2011 International Conference on Image Analysis…
  • 2011
The cloud is a virtual computing environment that provides applications, platforms and software support as services. The… (More)
  • figure 1
  • figure 2
Is this relevant?
2010
2010
Existing cybercrime research in the information systems (IS) field has focused on a subset of corporate incidents (e.g., fraud… (More)
  • table 1
  • figure 1
  • table 2
  • table 4
  • table 3
Is this relevant?
2006
2006
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as… (More)
  • figure 1
  • table 1
Is this relevant?
2006
2006
Painted in the broadest of strokes, cybercrime essentially is the leveraging of information systems and technology to commit… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2004
2004
This paper explores the fast growing Cyberworld and its components. It starts with definitions of who is the hacker, and what is… (More)
Is this relevant?
Review
2003
Review
2003
Cybercrime has received significant coverage in recent years, with the media, law enforcers, and governments all working to bring… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?