References
- D. J. Teece, "Business Models, Business Strategy and Innovation", Long Range Planning, Vol.43, Issues2-3, pp.172-194, 2001. DOI: https://doi.org/10.1016/j.lrp.2009.07.003
- B. Moon, J. D. McCluskey, & C. P. McCluskeyd, "A general theory of crime and computer crime: An empirical test", Journal of Criminal Justice, vol.38, Issue4, pp.767-772, 2010. DOI: https://doi.org/10.1016/j.jcrimjus.2010.05.003
- https://www.police.go.kr/www/open/publice/publice0204.jsp
- S. Caneppele, & M. F. Aebi, "Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes", Policing, Vol.13, Issue1, Pages 66-79, 2017. DOI: https://doi.org/10.1093/police/pax055
- P. Hunton, "The growing phenomenon of crime and the internet; A cyber crime execution and analysis model", Computer Law & Security Review, Vol.25, Issue6, pp.528-535, 2009. DOI: https://doi.org/10.1016/j.clsr.2009.09.005
- R. Bryant, Investigating digital crime, Wildy, 2008, pp.79-93.
- E. Kraemer-Mbula, P. Tang, & H. Rush, "The cyber crime ecosystem; Online innovation in the shadows?", Technological Forecasting & Social Change, Vol.80, Issue3, pp.541-555, 2013. DOI: https://doi.org/10.1016/j.techfore.2012.07.002
- A. Osterwalder & Y. Pigneur, Business Model Generation, Wiley, 2010, pp.20-57.
- http://en.wikipedia.org/wiki/Computer_crime.
- D. Halde, & K. Jaishankar, Cyber crime and the Victimization of Women: Laws, Rights, and Regulations, IGI Global, 2011, pp.12-33.
- D. L. Shinder, & E. Tittel, Scene of the cyber crime: Computer forensics handbook, Syngress Publishing, 2002, pp.18-33.
- http://www.mondaq.com/article.asp?articleid=28603
- D. Wall, Cybercrime: The transformation of crime in the information age, Malden, MA, Polity Press, 2007, pp.30-130.
- http://www.police.go.kr/www/security/cyber/cyber01.jsp
- https://cyberbureau.police.go.kr/prevention/nw/sub2_notitle.jsp?mid=010201
- https://cyberbureau.police.go.kr/prevention/nw/sub2_2_notitle.jsp?mid=010202
- https://cyberbureau.police.go.kr/prevention/nw/sub2_3_notitle.jsp?mid=010203
- A. Afuah, & C. L. Tucci, Internet Business Models and Strategies, McGraw-Hill, 2001, p.9-12.
- A. Osterwalder, Y. Pigneur, & C. L. Tucci, "Clarifying Business Models: Origins, Present, and Future of the Concept", Communications of the Association or information Systems, Vol.16, No.1, pp.1-25, 2005. DOI: https://doi.org/10.17705/1CAIS.01601
- R. Alt, & H. Zimmermann, "Introduction to Special Section - Business Models", Electronic Markets, Vol.11, No.1, 2001. DOI: https://doi.org/10.1080/713765630
- C. Zott, R. Amit, & L. Massa, "The business model: Theoretical roots, recent developments, and future research", IESE Business School Working Paper, University of Navarra, Barcelona, Spain, No.862. 2010.
- J. Ojasalo, & K. Ojasalo, "Service Logic Business Model Canvas", Journal of Research in Marketing and Entrepreneurship, Vol.20, No.1, pp.70-98, 2018. DOI: https://doi.org/10.1108/JRME-06-2016-0015
- S. Keane, K. Cormican, & J. Sheahan, "Comparing how entrepreneurs and managers represent the elements of the business model canvas", Journal of Research in Marketing and Entrepreneurship, Vol.9, pp.65-74, 2018. DOI: https://doi.org/10.1016/j.jbvi.2018.02.004
- A. Joyce, & R. Paquin, "The triple layered business model canvas: A tool to design more sustainable business models", Journal of Cleaner Production, Vol.135, pp.1474-1486, 2016. DOI: https://doi.org/10.1016/j.jclepro.2016.06.067
- E. Turko, "Business plan vs business model canvas in entrepreneurship training: A comparison of students' perceptions", Asian Social Science, Vol.12, No.10, pp.55-62, 2016. DOI: http://dx.doi.org/10.5539/ass.v12n10p55
- M. Urban, M. Klemm, K. Ploetner, & M. Hornung, "Airline categorisation by applying the business model canvas and clustering algorithms", Journal of Business Venturing Insights, Vol.71, pp.175-192, 2018. DOI: https://doi.org/10.1016/j.jairtraman.2018.04.005
- M. Toro-Jarrín, I. Ponce-Jaramillo, & D. Guemes-Castorena, "Methodology for the of building process integration of Business Model Canvas and Technological Roadmap", Technological Forecasting and Social Change, Vol.110, pp.213-225, 2016. DOI: https://doi.org/10.1016/j.techfore.2016.01.009
- B. Fritscher, & Y. Pigneur, "Classifying business model canvas usage from novice to master: A dynamic perspective", Lecture Notes in Business Information Processing, Vol.257, pp.134-151, 2016. DOI: http://dx.doi.org/10.1007%2F978-3-319-40512-4_8 https://doi.org/10.1007/978-3-319-40512-4_8
- M. Dudin, G. Kutsuri, I. Fedorova, S. Dzusova, & A. Namitulina, "The Innovative Business Model Canvas in the System of Effective Budgeting", Asian Social Science, Vol.11, No.7, pp.290-296, 2015. DOI: http://dx.doi.org/10.5539/ass.v11n7p290
- B. Fritscher, & Y. Pigneur, "Visualizing business model evolution with the Business Model Canvas: Concept and tool", 16th IEEE Conference on Business Informatics, IEEE, Geneva, Switzerland, pp.151-158, 2014. DOI: https://doi.org/10.1109/CBI.2014.9
- T. O'Neill, "The innovative business model canvas in the system of effective budgeting", Reference Services Review, Vol.43, No.3, pp.450-460, 2015. DOI: http://dx.doi.org/10.1108/RSR-02-2015-0013
- B. Glaser, & A. Strauss(1967), The Discovery of Grounded Theory: Strategies for Qualitative research, Routledge, 2000, pp.21-160.
- E. Babbie, The practice of social research, Wadsworth Publishing, 2012, pp.88-122.
- A. Bryman, & E. Bell, Business research methods, Oxford University Press, 2015, pp. 578-604.
- J. M. Corbin, & A. L. Straus, Basics of qualitative research: Techniques and procedures for developing grounded theory, Sage publications, 2007, pp. 65-297.
- S. Green, "Systematic reviews and meta-analysis", Singapore medical journal, vol.46, no.6, pp.270-274, 2005.
- B. Paek, & H. Lee, "Exploratory research on the dynamic capabilities of leading firms: Research framework building", Journal of the Korea Academia-Industrial cooperation Society, Vol.16, No.12, pp.8262-8273, 2015. DOI: https://doi.org/10.5762/KAIS.2015.16.12.8262
- M. N. Al-Mhiqani, R. Ahmad, W. Yassin, A. Hassan, Z. Z. Abidin, N. S. Ali, & K. H. Abdulkareem, "Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems", International Journal of Advanced Computer Science and Applications, Vol.9, Issue1, pp.499-508, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090169
- B. Dupont, "Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime", Crime, Law and Social Change, Vol.67, pp. 97-116, 2017. DOI: https://doi.org/10.1007%2Fs10611-016-9649-z https://doi.org/10.1007/s10611-016-9649-z
- D. Kao, "Exploring the cybercrime investigation framework of ATM Heist from ISO/IEC 27043:2015", International Conference on Advanced Communication Technology, Vol.67, Issue1, pp.177-182, 2017. DOI: https://doi.org/10.23919/ICACT.2017.7890079
- M. A. Al-garadi, K. D. Varathan, & S. D. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network", Computers in Human Behavior, Vol.63, pp.433-443, 2016. DOI: https://doi.org/10.1016/j.chb.2016.05.051
- Y. Prayudi,, & S. Yusirwan, "The recognize of malware characteristics through static and dynamic analysis approach as an effort to prevent cybercrime activities", Journal of Theoretical and Applied Information Technology, Vol.77, No.3, pp.438-445, 2015.
- D. de Graaf, A. F. Shosha, & P. Gladyshev, "BREDOLAB: Shopping in the Cybercrime Underworld", International Conference on Digital Forensics and Cyber Crime, Indiana, USA, pp.302-313, 2013. DOI: https://doi.org/10.1007/978-3-642-39891-9_19
- A. K Sood, S. Zeadally, & R. Bansal, "Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels", IEEE Communications Magazine, Vol.55, Issue7, pp.22-28, 2017. DOI: https://doi.org/10.1109/MCOM.2017.1600969
- F. Skopik, & Q. Li, "Trustworthy incident information sharing in social cyber defense alliances", IEEE Symposium on Computers and Communications, IEEE, Split, Croatia, pp.233-239, 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754951
- K. K. e Silva, "Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?", International Review of Law, Computers & Technology, Vol.32, Issue1, pp.21-36, 2018. DOI: https://doi.org/10.1080/13600869.2018.1418142
- E. R. Leukfeldt, A. Lavorgna, & E. R. Kleemans, "Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime", European Journal of Criminal Policy and Research, Vol.23, No.3, pp.287-300, 2017. DOI: http://dx.doi.org/10.1007/s10610-016-9332-z
- K. Hui, S. Kim, & Q. Wang, "Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks", MIS Quarterly, Vol.41, No.2, pp.497-523, 2017. DOI: http://dx.doi.org/10.25300/MISQ/2017/41.2.08
- D. Kao, "Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments", The Journal of Supercomputing, Vol.72, Issue1, pp.141-160, 2016. DOI: https://doi.org/10.1007/s11227-015-1516-7
- C. Konradt, A. Schillingb, & B. Wernersb, "Phishing: An economic analysis of cybercrime perpetrators", Computers and Security, Vol.58, pp.39-46, 2016. DOI: https://doi.org/10.1016/j.cose.2015.12.001
- S. Pieschl, C. Kuhlmann & T. Porsch, "Beware of Publicity! Perceived Distress of Negative Cyber Incidents and Implications for Defining Cyberbullying", Journal of School Violence, Vol.14, No.1, pp.111-132, 2015. DOI: https://doi.org/10.1080/15388220.2014.971363
- T. J. Holt, "Examining the Forces Shaping Cybercrime Markets Online", Social Science Computer Review, Vol.31, Issue2, pp.165-177, 2013. DOI: https://doi.org/10.1177/0894439312452998
- A. K. Sood., R. Bansal, & R. J. Enbody, "Cybercrime: Dissecting the state of underground enterprise", IEEE Internet Computing, Vol.17, Issue1, pp.60-68, 2013. DOI: https://doi.org/10.1109/MIC.2012.61
- M. R. J. Soudijn, & B. C. H. T Zegers, "Cybercrime and virtual offender convergence settings", Trends in Organized Crime, Vol.15, Issue2-3, pp.111-129, 2012. DOI: https://doi.org/10.1007/s12117-012-9159-z
- A. Kuzmin, "State and trends of Russian cybercrime in 2011", 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, St. Petersburg, Russia, pp.933-939, 2012. DOI: https://doi.org/10.1109/ICUMT.2012.6459794
- A. Kigerl, "Routine Activity Theory and the Determinants of High Cybercrime Countries", Social Science Computer Review, Vol.30, Issue4, pp.470-486, 2011. DOI: https://doi.org/10.1177/0894439311422689
- M. Redford, "U.S. and EU Legislation on Cybercrime", 2011 European Intelligence and Security Informatics Conference, IEEE, Athens, Greece, pp.34-37, 2011. DOI: https://doi.org/10.1109/EISIC.2011.38
- S. McCombie, J. Pieprzyk, & P. Watters, "Cybercrime Attribution: An Eastern European Case Study", Proceedings of the 7th Australian Digital Forensics Conference, Edith Cowan University, Australian, pp.41-51, 2009. DOI: https://doi.org/10.4225/75/57b2880840ccf
- A. M. Gasso, V. Fernandez-Cruz, I. Montiel, C. Martin-Fumado, & J. R. Agustina, "Retos forenses ante la cibercriminalidad social en menoresForensic challenges presented by social cybercrime in minors", Revista Española de Medicina Legal, Vol.45, Issue2, pp.73-76, 2019. DOI: https://doi.org/10.1016/j.reml.2018.11.003
- A. S. Ahmed, S. Deb, A. S. B. Habib, M. N. Mollah, & A. S. Ahmad, "Simplistic Approach to Detect Cybercrimes and Deter Cyber Criminals", 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering, IEEE, Rajshahi, Bangladesh, 2018. DOI: https://doi.org/10.1109/IC4ME2.2018.8465618
- E. Vasilomanolakis, S. Karuppayah, P. Kikiras, & M. Muhlhauser, "A honeypot-driven cyber incident monitor: lessons learned and steps ahead", Proceedings of the 8th International Conference on Security of Information and Networks, ACM International Conference, Sochi, Russia, pp.158-164, 2015. DOI: https://doi.org/10.1145/2799979.2799999
- M. Tariq, B. Aslam, I. Rashid, & A. Waqar, "Cyber threats and incident response capability - a case study of Pakistan", 2013 2nd National Conference on Information Assurance, IEEE, Rawalpindi, Pakistan, pp.15-20, 2013. DOI: https://doi.org/10.1109/NCIA.2013.6725319
- N. B. Sukhai, "Hacking and cybercrime", 2004 Information Security Curriculum Development Conference, ACM International Conference, NY, USA, pp.128-132, 2004. DOI: https://doi.org/10.1145/1059524.1059553
- I.. Nadir, & T. Bakhshi, "Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques", 2018 International Conference on Computing, Mathematics and Engineering Technologies, IEEE, Sukkur, Pakistan, March 2018. DOI: https://doi.org/10.1109/ICOMET.2018.8346329
- A. V. Mbaziira, & D. R. Murphy, "An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks", Proceedings of the 2nd International Conference on Compute and Data Analysis, ICCDA, IL, USA, pp.42-46, 2018. DOI: https://doi.org/10.1145/3193077.3193080
- G. Settanni, Y. Shovgenya, F. Skopik, R. Graf, M. Wurzenberger & R. Fiedler, "Correlating cyber incident information to establish situational awareness in Critical Infrastructures", 2016 14th Annual Conference on Privacy, Security and Trust, IEEE, Auckland, New Zealand, pp.78-81, 2016. DOI: https://doi.org/10.1109/PST.2016.7906940
- M. Eddolls, "Making cybercrime prevention the highest priority", Network Security, Vol.2016, Issue8, pp.5-8, 2016. DOI: https://doi.org/10.1016/S1353-4858(16)30075-7
- M. Ionita, & V. Patriciu, "Cyber Incident Response Aided by Neural Networks and Visual Analytics", 2015 20th International Conference on Control Systems and Computer Science, IEEE, Bucharest, Romania, pp.229-233, 2015. DOI: https://doi.org/10.1109/CSCS.2015.41
- F. Alrimawi, L. Pasquale, & B. Nuseibeh, "Software engineering challenges for investigating cyber-physical incidents", 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems, IEEE, Buenos Aires, Argentina, pp.34-40, 2017. DOI: https://doi.org/10.1109/SEsCPS.2017.9
- M. Hopkins, & A. Dehghantanha, "Exploit Kits: The production line of the Cybercrime economy?", 2015 Second International Conference on Information Security and Cyber Forensics, IEEE, Cape Town, South Africa, pp.23-27, 2015. DOI: https://doi.org/10.1109/InfoSec.2015.7435501
- J. Armin, P. Foti, & M. Cremonini, "0-Day Vulnerabilities and Cybercrime", 10th International Conference on Availability, Reliability and Security, IEEE, Toulouse, France, pp.711-718, 2015. DOI: https://doi.org/10.1109/ARES.2015.55
- M. Eriksen-Jensen, "Holding back the tidal wave of cybercrime", Computer Fraud and Security, Vol.2013, No.3, pp.10-16, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70028-9
- S. M. Virtanen, "Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities", Psychiatry, Psychology and Law, Vol.23, Issue3, pp.323-338, 2017. DOI: https://doi.org/10.1080/13218719.2017.1315785
- Y. Bentaleb, A. Abarda, H. Mharzi, & S. E. Hajji, "Application of latent class analysis to identify the youth population who risk being cybercrime victim on social networks", Contemporary Engineering Sciences, Vol.8, No.32, pp.1529-1534, 2015. DOI: https://doi.org/10.12988/ces.2015.58261
- E. R. Leukfeldt, "Cybercrime and social ties: Phishing in Amsterdam", Trends in Organized Crime, Vol.17, Issue4, pp.231-249, 2014. DOI: https://doi.org/10.1007/s12117-014-9229-5
- J. L. Bele, M. Dimc, D. Rozman, & A. S. Jemec, "Rasing awarenss of cybercrime - the use of education as a means of prevention and protection", 10th International Conference Mobile Learning 2014, Madrid, Spain, pp.281-284, 2014.
- P. Gerard, N. Kapadia, J. Acharya, P. T. Chang, & Z. Lefkovitz, "Cybersecurity in Radiology: Access of Public Hot Spots and Public Wi-Fi and Prevention of Cybercrimes and HIPAA Violations", American Journal of Roentgenology, Vol.201, No.6, pp.1186-1189, 2013. DOI: https://doi.org/10.2214/AJR.12.9651
- I. Lin, Y. Yen, & A. Chang, "A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime", 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, Seoul, South Korea, pp.543-548, 2011. DOI: https://doi.org/10.1109/IMIS.2011.58
- M. S. Bargh, S. Choenni, I. Mulder, & R. Pastoor, "Exploring a Warrior Paradigm to Design Out Cybercrime", 2012 European Intelligence and Security Informatics Conference, IEEE, Odense, Denmark, pp.84-90, 2012. DOI: https://doi.org/10.1109/EISIC.2012.40
- G. Davis, A. Garcia, & W. Zhang "Empirical Analysis of the Effects of Cyber Security Incidents", Risk Analysis, Vol.29, No.9, pp.1304-1316, 2009. DOI: https://doi.org/10.1111/j.1539-6924.2009.01245.x
- D. Manky, "Cybercrime as a service: a very modern business", Computer Fraud & Security, Vol.2013, Issue6, pp.9-13, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70053-8
- C. M. M. Reep-van den Bergh, & M. Junger, "Victims of cybercrime in Europe: a review of victim surveys", Crime Science, Vol.7, No.5, 2018. DOI: https://doi.org/10.1186/s40163-018-0079-3
- S. G. A. van de Weijer, R. Leukfeldt, & W. Bernasco, "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking", European Journal of Criminology, Vol.16, Issue4, pp.486-508, 2018. DOI: https://doi.org/10.1177/1477370818773610
- M. Kaakinen, T. Keipi, P. Rasanen, & A. Oksanen, "Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults", Cyberpsychology, Behavior, and Social Networking, Vol.21, No.20, pp.129-137, 2018. DOI: https://doi.org/10.1089/cyber.2016.0728
- M. Junger, L. Montoya, P. Hartel, & M. Heydari, "Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe", 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA, IEEE, London, UK, June 2017. DOI: https://doi.org/10.1109/CyberSA.2017.8073391
- S. G. A. van de Weijer, & E. R. Leukfeldt, "Big Five Personality Traits of Cybercrime Victims", Cyberpsychology, Behavior, and Social Networking, Vol.20, No.7, 2017. DOI: https://doi.org/10.1089/cyber.2017.0028
- A. Al-Nemrat, & C. Benzaid, "Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation", 214th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Helsinki, Finland, pp.1380-1385, August 2015. DOI: https://doi.org/10.1109/Trustcom.2015.534
- W. Goucher, "Being a cybercrime victim", Computer Fraud and Security, Vol.2010, Issue10, pp.16-18, 2010. DOI: https://doi.org/10.1016/S1361-3723(10)70134-2
- L. Allodi, M. Corradin, & F. Massacci, "Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned", IIEEE Transactions on Emerging Topics in Computing, Vol.4. No.1, pp.35-46, 2016. DOI: https://doi.org/10.1109/TETC.2015.2397395
- A. Nagurney, "A Multiproduct Network Economic Model of Cybercrime in Financial Services", Service Science, Vol.7, No.1, pp.70-81, 2015. DOI: https://doi.org/10.1287/serv.2015.0095
- A. Alazab, J. Abawajy, M. Hobbs, R. Layton, & A. Khraisat., "Crime toolkits: The productisation of cybercrime", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Melbourne, Australia, pp.1626-1632, 2013. DOI: https://doi.org/10.1109/TrustCom.2013.273
- K. L. Modecki, B. L. Barber, & L. Vernon, "Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization", Journal of Youth and Adolescence, Vol.42, Issue5, pp.651-661, 2013. DOI: http://dx.doi.org/10.1007/s10964-013-9938-0
- G. Settanni, F. Skopik, Y. Shovgenya, & R. Fiedler, "A Collaborative Analysis System for Cross-organization Cyber Incident Handling", Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP, Rome, Italy, pp.105-116, 2016. DOI: https://doi.org/10.5220/0005688301050116
- S. Romanosky, "Examining the costs and causes of cyber incidents", Journal of Cybersecurity, Vol.2, Issue2, pp. 121-135, 2016. DOI: https://doi.org/10.1093/cybsec/tyw001
- J. Doyon-Martin, "Cybercrime in West Africa as a Result of Transboundary E-Waste", Journal of Applied Security Researchy, Vol.10, Issue2, pp.207-220, 2015. DOI: https://doi.org/10.1080/19361610.2015.1004511
- A. Joode, "Effective corporate security and cybercrime", Network Security, Vol. 2011, Issue 9, pp.16-18, 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70097-6
- R. Joffee, "Cybercrime: the global epidemic at your network door", Network Security, Vol.2010, Issue7, pp.4-7, 2010. DOI: https://doi.org/10.1016/S1353-4858(10)70091-X
- Y. Ben-Itzhak, "Organised cybercrime and payment cards", Card Technology Today, Vol. 21, Issue2, pp.10-11, 2009. DOI: https://doi.org/10.1016/S0965-2590(09)70057-X