The Global Cybercrime Industry 2010
DOI: 10.1007/978-3-642-11522-6_9
View full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…In particular, when clients become habitual, the Internet is used as a powerful tool to make clients feel part of the same social group. The use of so-called ‘social engineering’ – that is, the capacity offenders have to ‘persuade potential victims with emotional appeals such as excitement or fear or establish interpersonal relationships or create a feeling of trust and commitment’ (Kshetri, 2010: 10) – to commit cybercrimes has already been underlined (Glenny, 2011; Kshetri, 2010). From the findings of this research, it is possible to conclude that social engineering is a common tool also in many Internet-mediated trafficking activities, such as the online trade in counterfeit pharmaceuticals.…”
Section: Resultsmentioning
confidence: 99%
“…In particular, when clients become habitual, the Internet is used as a powerful tool to make clients feel part of the same social group. The use of so-called ‘social engineering’ – that is, the capacity offenders have to ‘persuade potential victims with emotional appeals such as excitement or fear or establish interpersonal relationships or create a feeling of trust and commitment’ (Kshetri, 2010: 10) – to commit cybercrimes has already been underlined (Glenny, 2011; Kshetri, 2010). From the findings of this research, it is possible to conclude that social engineering is a common tool also in many Internet-mediated trafficking activities, such as the online trade in counterfeit pharmaceuticals.…”
Section: Resultsmentioning
confidence: 99%
“…Government websites with symbolic significance and large companies with high degree of digitalization of values have always been hot targets for hackers (Kshetri, 2010). It is therefore expected that government websites in both media and prominent US technology companies (Google, Twitter, and Facebook) in NYT are constructed as main targets for hackers.…”
Section: Resultsmentioning
confidence: 99%
“…Nonetheless, in recent years cybercriminals have increasingly formed links with other criminals. It would not be overstating matters to say that there is now a fully-fledged cybercrime industry, with clear elements not only of low-level collaboration, but also facets of broader organisation and governance [Holt and Lampke 2010; Kshetri 2010; Moore, Clayton and Anderson 2009]. The fieldwork on which this article is based further confirmed the industrial nature of cybercrime, with a strong degree of specialisation and professionalization, along with the presence of firm-like structures and mature markets.…”
mentioning
confidence: 99%