2006
DOI: 10.1007/s11416-006-0015-z
|View full text |Cite
|
Sign up to set email alerts
|

On the definition and classification of cybercrime

Abstract: The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms "Cybercrime" and "crimeware". We then divide Cybercrime into two distinct categories: Type I Cybercrime, which is mostly technological in nature, and Type II Cybercrime, which has a more pronounced human element. We then use two case studies to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
89
0
7

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 204 publications
(96 citation statements)
references
References 5 publications
0
89
0
7
Order By: Relevance
“…The terms include computer related crime, computer crime, Internet crime, e-crime, digital crime, technology crime, hightech crime, online crime, electronic crime, computer misuse, and cybercrime. The latter has been widely used recently [3,[6][7][8][9][10][11][12][13].…”
Section: Terminology and Taxonomiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The terms include computer related crime, computer crime, Internet crime, e-crime, digital crime, technology crime, hightech crime, online crime, electronic crime, computer misuse, and cybercrime. The latter has been widely used recently [3,[6][7][8][9][10][11][12][13].…”
Section: Terminology and Taxonomiesmentioning
confidence: 99%
“…Brenner [22] classifies cybercrime into three categories: the use of a computer as a target of criminal activity (e.g., hacking, dissemination of viruses and worms), the use of a computer as a tool or instrument used to commit a criminal activity (e.g., online fraud, harassment), and the use of a computer as incidental to the crime (e.g., data storage for a drug dealer to monitor sales and profits). Some others concur with this view (Symantec Corporation [14], Gordon and Ford [8], Sukhai [23], Kelly [7], and the Australian Centre for Police Research [21]). Still others however classify cybercrime into only two categories (see Koenig [24], Furnell [3], Wilson [25], Lewis [26], and the Australian High Tech Crime Centre [27]).…”
Section: Terminology and Taxonomiesmentioning
confidence: 99%
“…The first challenge concerns its definition (McQuade III, 2006, 16-17;Marler, 2002, 185;Gordon & Ford, 2006). The fashionable label ‗cybercrime' in fact covers different types of offences (Council of Europe, 2005, 87;Smith, Grabosky & Urbas, 2004, 7).…”
Section: Cybercrime and Criminal Justice Systemsmentioning
confidence: 99%
“…According to Henson, Reyns, and Fisher (2011), they defined "Cyber-crime refers to any illegal activity that occurs in the virtual world of cyberspace" (Henson, Reyns, & Fisher, 2011). Gordon and Ford (2006) formulated an even more generic typology. Their typology includes any crime that is "facilitated or committed using a computer, network, or hardware device" (Gordon & Ford, 2006).…”
mentioning
confidence: 99%
“…Gordon and Ford (2006) formulated an even more generic typology. Their typology includes any crime that is "facilitated or committed using a computer, network, or hardware device" (Gordon & Ford, 2006).…”
mentioning
confidence: 99%