2017
DOI: 10.1007/978-3-319-58460-7_38
|View full text |Cite
|
Sign up to set email alerts
|

How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?

Abstract: Abstract. Crime scripts are becoming an increasingly popular method for understanding crime by turning a crime from a static event into a process, whereby every phase of the crime is scripted. It is based on the work relating to cognitive scripts and rational-choice theory. With the exponential growth of cyber-crime, and more specifically cloud-crime, policing/law enforcement agencies are struggling with the amount of reported cyber-crime. This paper argues that crime scripts are the most effective way forward… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…A crime script analysis involves breaking down the actions of the criminal into four main stages: preparation, pre-activity, activity, and post activity. As this study claims, an appreciation of the offender's mind/perspective seems to be of the greatest importance in the creation of crime scripts, to better understand the behaviours, motives, feelings, decisions within the process of a crime [56].…”
Section: E Approaches To Profiling or Understanding Cybercriminalsmentioning
confidence: 93%
See 3 more Smart Citations
“…A crime script analysis involves breaking down the actions of the criminal into four main stages: preparation, pre-activity, activity, and post activity. As this study claims, an appreciation of the offender's mind/perspective seems to be of the greatest importance in the creation of crime scripts, to better understand the behaviours, motives, feelings, decisions within the process of a crime [56].…”
Section: E Approaches To Profiling or Understanding Cybercriminalsmentioning
confidence: 93%
“…We found that 22 (or, just over half of the) articles rely on new data, be it from surveys, interviews (with criminals and law enforcement), court records, case studies, underground markets or honeypots [3], [7], [8], [10], [11], [24], [29], [31]- [36], [43]- [45], [48], [49], [52], [57]- [59]. The other studies primarily use existing literature to form their arguments and often rely on research from other fields, or established approaches mapped to the cybercrime domain [2], [4], [5], [9], [12], [13], [15], [18], [21], [25], [27], [46], [50], [53]- [56]. This balance is interesting to note as it highlights the extent of articles on profiling that are not working with primary data.…”
Section: B Characteristics Of Articlesmentioning
confidence: 99%
See 2 more Smart Citations
“…Since the price was inflated artificially, the price usually drops, leaving buyers who bought on the strength of the false information at a loss. While we do not provide a rigorous crime script analysis (see Borrion 2013;Keatley 2018;Warren et al 2017) here, Fig. 1 can be viewed as a script abstraction of three main stages-accumulation, pump, and dump.…”
Section: What Is a Pump-and-dump Scheme?mentioning
confidence: 99%