Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cybercrime

Known as: Internet crimes, Computer abuse, Attacking users 
Cybercrime, or computer crime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Although employee computer abuse is a costly and significant problem for firms, the existing academic literature regarding this… Expand
Review
2018
Review
2018
Technological advances have resulted in organisations digitalizing many parts of their operations. The threat landscape of cyber… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2012
Highly Cited
2012
This chapter documents what we believe to be the first systematic study of the costs of cybercrime. The initial workshop paper… Expand
  • figure 1
  • figure 2
  • table 1
Highly Cited
2007
Highly Cited
2007
How has the internet transformed criminal behaviour? What is different about cybercrime compared with traditional criminal… Expand
Highly Cited
2006
Highly Cited
2006
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as… Expand
  • figure 1
  • table 1
Highly Cited
2005
Highly Cited
2005
Recent discussions of ‘cybercrime’ focus upon the apparent novelty or otherwise of the phenomenon. Some authors claim that such… Expand
Highly Cited
2004
Highly Cited
2004
A comprehensive model of cybercrime investigations is important for standardising terminology, defining requirements, and… Expand
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Highly Cited
2002
Highly Cited
2002
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now… Expand
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
Highly Cited
1986
Highly Cited
1986
  • D. Denning
  • IEEE Symposium on Security and Privacy
  • 1986
  • Corpus ID: 10713382
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
  • figure 5-1