DOI QR코드

DOI QR Code

체계적 문헌 연구를 통한 사이버범죄 비즈니스 모델(CBM) 구축

A Study on the Establishment of Cybercrime Business Model(CBM) through a Systematic Literature Review

  • 박지용 (성균관대학교 기술경영학과) ;
  • 이희상 (성균관대학교 기술경영학과)
  • Park, Ji-Yong (Department of Management of Technology, Sungkyunkwan University) ;
  • Lee, Heesang (Department of Management of Technology, Sungkyunkwan University)
  • 투고 : 2020.03.02
  • 심사 : 2020.06.05
  • 발행 : 2020.06.30

초록

기술의 혁신과 빠르게 성장하는 새로운 인터넷 비즈니스는 기존 기업 경영의 패러다임을 바꾸고 사회에 다양한 영향을 주고 있다. 인터넷 기술의 발달은 기술 혁신에 대한 역효과 또한 상승시키고 있고, 특히 컴퓨터와 관련된 사이버 범죄는 기술의 혁신과 함께 지속적으로 증가하고 있다. 본 연구의 목적은 사이버범죄를 줄이기 위해 비즈니스 모델 캔버스(BMC: Business Model Canvas) 이론을 사이버범죄에 활용하여 사이버범죄 비즈니스 모델(CBM: Cybercrime Business Model)을 구축하고 이 모델을 한국의 사이버범죄 유형에 적용시켜 분석하는 것이다. 본 연구에서는 사이버범죄의 구성요소를 찾기 위해 체계적 문헌 연구를 실시했으며, 이를 통해 키워드 기반의 문헌 탐색을 통해 적합한 60개의 문헌을 발굴하여 분류하였다. 또한 분류된 문헌의 정성적 연구를 수행해 사이버범죄의 구성 요소를 18개의 서브블록(sub-blocks)과 9개의 빌딩블록(building blocks)으로 도출하고 이를 BMC 이론에 대입하고 적절한 재정의를 통해 CBM을 구축하였다. 마지막으로 개발한 CBM을 한국의 사이버범죄에 적용하여 사이버 침해사고 대응 인력들에게 사이버범죄에 대한 분석적 이해를 도울 수 있었다. 본 연구는 사이버범죄를 감소시킬 수 있는 새로운 분석 틀을 마련하는데 기여하였다.

Technological innovations and fast-growing new internet businesses are changing the paradigm of traditional business management, having various impacts on society. The development of internet technology is also increasing the adverse effects on technological innovation, and in particular, cybercrime related to computers continues to increase with each technological innovation. The purpose of this study is to construct a cybercrime business model (CBM) by using the business model canvas (BMC) theory for cybercrime in order to reduce cybercrime, and this model is applied and analyzed based on types of Korean cybercrimes. For this study, a systematic literature review was conducted to determine the components of cybercrime, and 60 relevant documents were classified through a keyword-based literature search. Besides, qualitative research in the classified literature has led to the derivation of cybercrime into 18 sub-blocks and nine building blocks. This study applies BMC theory to this derivation of cybercrime and builds the CBM through proper redefinition. Lastly, the developed CBM could be applied to cybercrime in Korea to help cyber incident-response staff understand cybercrimes analytically. This study contributes to the development of a new analysis framework that can reduce cybercrime.

키워드

참고문헌

  1. D. J. Teece, "Business Models, Business Strategy and Innovation", Long Range Planning, Vol.43, Issues2-3, pp.172-194, 2001. DOI: https://doi.org/10.1016/j.lrp.2009.07.003
  2. B. Moon, J. D. McCluskey, & C. P. McCluskeyd, "A general theory of crime and computer crime: An empirical test", Journal of Criminal Justice, vol.38, Issue4, pp.767-772, 2010. DOI: https://doi.org/10.1016/j.jcrimjus.2010.05.003
  3. https://www.police.go.kr/www/open/publice/publice0204.jsp
  4. S. Caneppele, & M. F. Aebi, "Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes", Policing, Vol.13, Issue1, Pages 66-79, 2017. DOI: https://doi.org/10.1093/police/pax055
  5. P. Hunton, "The growing phenomenon of crime and the internet; A cyber crime execution and analysis model", Computer Law & Security Review, Vol.25, Issue6, pp.528-535, 2009. DOI: https://doi.org/10.1016/j.clsr.2009.09.005
  6. R. Bryant, Investigating digital crime, Wildy, 2008, pp.79-93.
  7. E. Kraemer-Mbula, P. Tang, & H. Rush, "The cyber crime ecosystem; Online innovation in the shadows?", Technological Forecasting & Social Change, Vol.80, Issue3, pp.541-555, 2013. DOI: https://doi.org/10.1016/j.techfore.2012.07.002
  8. A. Osterwalder & Y. Pigneur, Business Model Generation, Wiley, 2010, pp.20-57.
  9. http://en.wikipedia.org/wiki/Computer_crime.
  10. D. Halde, & K. Jaishankar, Cyber crime and the Victimization of Women: Laws, Rights, and Regulations, IGI Global, 2011, pp.12-33.
  11. D. L. Shinder, & E. Tittel, Scene of the cyber crime: Computer forensics handbook, Syngress Publishing, 2002, pp.18-33.
  12. http://www.mondaq.com/article.asp?articleid=28603
  13. D. Wall, Cybercrime: The transformation of crime in the information age, Malden, MA, Polity Press, 2007, pp.30-130.
  14. http://www.police.go.kr/www/security/cyber/cyber01.jsp
  15. https://cyberbureau.police.go.kr/prevention/nw/sub2_notitle.jsp?mid=010201
  16. https://cyberbureau.police.go.kr/prevention/nw/sub2_2_notitle.jsp?mid=010202
  17. https://cyberbureau.police.go.kr/prevention/nw/sub2_3_notitle.jsp?mid=010203
  18. A. Afuah, & C. L. Tucci, Internet Business Models and Strategies, McGraw-Hill, 2001, p.9-12.
  19. A. Osterwalder, Y. Pigneur, & C. L. Tucci, "Clarifying Business Models: Origins, Present, and Future of the Concept", Communications of the Association or information Systems, Vol.16, No.1, pp.1-25, 2005. DOI: https://doi.org/10.17705/1CAIS.01601
  20. R. Alt, & H. Zimmermann, "Introduction to Special Section - Business Models", Electronic Markets, Vol.11, No.1, 2001. DOI: https://doi.org/10.1080/713765630
  21. C. Zott, R. Amit, & L. Massa, "The business model: Theoretical roots, recent developments, and future research", IESE Business School Working Paper, University of Navarra, Barcelona, Spain, No.862. 2010.
  22. J. Ojasalo, & K. Ojasalo, "Service Logic Business Model Canvas", Journal of Research in Marketing and Entrepreneurship, Vol.20, No.1, pp.70-98, 2018. DOI: https://doi.org/10.1108/JRME-06-2016-0015
  23. S. Keane, K. Cormican, & J. Sheahan, "Comparing how entrepreneurs and managers represent the elements of the business model canvas", Journal of Research in Marketing and Entrepreneurship, Vol.9, pp.65-74, 2018. DOI: https://doi.org/10.1016/j.jbvi.2018.02.004
  24. A. Joyce, & R. Paquin, "The triple layered business model canvas: A tool to design more sustainable business models", Journal of Cleaner Production, Vol.135, pp.1474-1486, 2016. DOI: https://doi.org/10.1016/j.jclepro.2016.06.067
  25. E. Turko, "Business plan vs business model canvas in entrepreneurship training: A comparison of students' perceptions", Asian Social Science, Vol.12, No.10, pp.55-62, 2016. DOI: http://dx.doi.org/10.5539/ass.v12n10p55
  26. M. Urban, M. Klemm, K. Ploetner, & M. Hornung, "Airline categorisation by applying the business model canvas and clustering algorithms", Journal of Business Venturing Insights, Vol.71, pp.175-192, 2018. DOI: https://doi.org/10.1016/j.jairtraman.2018.04.005
  27. M. Toro-Jarrín, I. Ponce-Jaramillo, & D. Guemes-Castorena, "Methodology for the of building process integration of Business Model Canvas and Technological Roadmap", Technological Forecasting and Social Change, Vol.110, pp.213-225, 2016. DOI: https://doi.org/10.1016/j.techfore.2016.01.009
  28. B. Fritscher, & Y. Pigneur, "Classifying business model canvas usage from novice to master: A dynamic perspective", Lecture Notes in Business Information Processing, Vol.257, pp.134-151, 2016. DOI: http://dx.doi.org/10.1007%2F978-3-319-40512-4_8 https://doi.org/10.1007/978-3-319-40512-4_8
  29. M. Dudin, G. Kutsuri, I. Fedorova, S. Dzusova, & A. Namitulina, "The Innovative Business Model Canvas in the System of Effective Budgeting", Asian Social Science, Vol.11, No.7, pp.290-296, 2015. DOI: http://dx.doi.org/10.5539/ass.v11n7p290
  30. B. Fritscher, & Y. Pigneur, "Visualizing business model evolution with the Business Model Canvas: Concept and tool", 16th IEEE Conference on Business Informatics, IEEE, Geneva, Switzerland, pp.151-158, 2014. DOI: https://doi.org/10.1109/CBI.2014.9
  31. T. O'Neill, "The innovative business model canvas in the system of effective budgeting", Reference Services Review, Vol.43, No.3, pp.450-460, 2015. DOI: http://dx.doi.org/10.1108/RSR-02-2015-0013
  32. B. Glaser, & A. Strauss(1967), The Discovery of Grounded Theory: Strategies for Qualitative research, Routledge, 2000, pp.21-160.
  33. E. Babbie, The practice of social research, Wadsworth Publishing, 2012, pp.88-122.
  34. A. Bryman, & E. Bell, Business research methods, Oxford University Press, 2015, pp. 578-604.
  35. J. M. Corbin, & A. L. Straus, Basics of qualitative research: Techniques and procedures for developing grounded theory, Sage publications, 2007, pp. 65-297.
  36. S. Green, "Systematic reviews and meta-analysis", Singapore medical journal, vol.46, no.6, pp.270-274, 2005.
  37. B. Paek, & H. Lee, "Exploratory research on the dynamic capabilities of leading firms: Research framework building", Journal of the Korea Academia-Industrial cooperation Society, Vol.16, No.12, pp.8262-8273, 2015. DOI: https://doi.org/10.5762/KAIS.2015.16.12.8262
  38. M. N. Al-Mhiqani, R. Ahmad, W. Yassin, A. Hassan, Z. Z. Abidin, N. S. Ali, & K. H. Abdulkareem, "Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems", International Journal of Advanced Computer Science and Applications, Vol.9, Issue1, pp.499-508, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090169
  39. B. Dupont, "Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime", Crime, Law and Social Change, Vol.67, pp. 97-116, 2017. DOI: https://doi.org/10.1007%2Fs10611-016-9649-z https://doi.org/10.1007/s10611-016-9649-z
  40. D. Kao, "Exploring the cybercrime investigation framework of ATM Heist from ISO/IEC 27043:2015", International Conference on Advanced Communication Technology, Vol.67, Issue1, pp.177-182, 2017. DOI: https://doi.org/10.23919/ICACT.2017.7890079
  41. M. A. Al-garadi, K. D. Varathan, & S. D. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network", Computers in Human Behavior, Vol.63, pp.433-443, 2016. DOI: https://doi.org/10.1016/j.chb.2016.05.051
  42. Y. Prayudi,, & S. Yusirwan, "The recognize of malware characteristics through static and dynamic analysis approach as an effort to prevent cybercrime activities", Journal of Theoretical and Applied Information Technology, Vol.77, No.3, pp.438-445, 2015.
  43. D. de Graaf, A. F. Shosha, & P. Gladyshev, "BREDOLAB: Shopping in the Cybercrime Underworld", International Conference on Digital Forensics and Cyber Crime, Indiana, USA, pp.302-313, 2013. DOI: https://doi.org/10.1007/978-3-642-39891-9_19
  44. A. K Sood, S. Zeadally, & R. Bansal, "Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels", IEEE Communications Magazine, Vol.55, Issue7, pp.22-28, 2017. DOI: https://doi.org/10.1109/MCOM.2017.1600969
  45. F. Skopik, & Q. Li, "Trustworthy incident information sharing in social cyber defense alliances", IEEE Symposium on Computers and Communications, IEEE, Split, Croatia, pp.233-239, 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754951
  46. K. K. e Silva, "Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?", International Review of Law, Computers & Technology, Vol.32, Issue1, pp.21-36, 2018. DOI: https://doi.org/10.1080/13600869.2018.1418142
  47. E. R. Leukfeldt, A. Lavorgna, & E. R. Kleemans, "Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime", European Journal of Criminal Policy and Research, Vol.23, No.3, pp.287-300, 2017. DOI: http://dx.doi.org/10.1007/s10610-016-9332-z
  48. K. Hui, S. Kim, & Q. Wang, "Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks", MIS Quarterly, Vol.41, No.2, pp.497-523, 2017. DOI: http://dx.doi.org/10.25300/MISQ/2017/41.2.08
  49. D. Kao, "Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments", The Journal of Supercomputing, Vol.72, Issue1, pp.141-160, 2016. DOI: https://doi.org/10.1007/s11227-015-1516-7
  50. C. Konradt, A. Schillingb, & B. Wernersb, "Phishing: An economic analysis of cybercrime perpetrators", Computers and Security, Vol.58, pp.39-46, 2016. DOI: https://doi.org/10.1016/j.cose.2015.12.001
  51. S. Pieschl, C. Kuhlmann & T. Porsch, "Beware of Publicity! Perceived Distress of Negative Cyber Incidents and Implications for Defining Cyberbullying", Journal of School Violence, Vol.14, No.1, pp.111-132, 2015. DOI: https://doi.org/10.1080/15388220.2014.971363
  52. T. J. Holt, "Examining the Forces Shaping Cybercrime Markets Online", Social Science Computer Review, Vol.31, Issue2, pp.165-177, 2013. DOI: https://doi.org/10.1177/0894439312452998
  53. A. K. Sood., R. Bansal, & R. J. Enbody, "Cybercrime: Dissecting the state of underground enterprise", IEEE Internet Computing, Vol.17, Issue1, pp.60-68, 2013. DOI: https://doi.org/10.1109/MIC.2012.61
  54. M. R. J. Soudijn, & B. C. H. T Zegers, "Cybercrime and virtual offender convergence settings", Trends in Organized Crime, Vol.15, Issue2-3, pp.111-129, 2012. DOI: https://doi.org/10.1007/s12117-012-9159-z
  55. A. Kuzmin, "State and trends of Russian cybercrime in 2011", 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, St. Petersburg, Russia, pp.933-939, 2012. DOI: https://doi.org/10.1109/ICUMT.2012.6459794
  56. A. Kigerl, "Routine Activity Theory and the Determinants of High Cybercrime Countries", Social Science Computer Review, Vol.30, Issue4, pp.470-486, 2011. DOI: https://doi.org/10.1177/0894439311422689
  57. M. Redford, "U.S. and EU Legislation on Cybercrime", 2011 European Intelligence and Security Informatics Conference, IEEE, Athens, Greece, pp.34-37, 2011. DOI: https://doi.org/10.1109/EISIC.2011.38
  58. S. McCombie, J. Pieprzyk, & P. Watters, "Cybercrime Attribution: An Eastern European Case Study", Proceedings of the 7th Australian Digital Forensics Conference, Edith Cowan University, Australian, pp.41-51, 2009. DOI: https://doi.org/10.4225/75/57b2880840ccf
  59. A. M. Gasso, V. Fernandez-Cruz, I. Montiel, C. Martin-Fumado, & J. R. Agustina, "Retos forenses ante la cibercriminalidad social en menoresForensic challenges presented by social cybercrime in minors", Revista Española de Medicina Legal, Vol.45, Issue2, pp.73-76, 2019. DOI: https://doi.org/10.1016/j.reml.2018.11.003
  60. A. S. Ahmed, S. Deb, A. S. B. Habib, M. N. Mollah, & A. S. Ahmad, "Simplistic Approach to Detect Cybercrimes and Deter Cyber Criminals", 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering, IEEE, Rajshahi, Bangladesh, 2018. DOI: https://doi.org/10.1109/IC4ME2.2018.8465618
  61. E. Vasilomanolakis, S. Karuppayah, P. Kikiras, & M. Muhlhauser, "A honeypot-driven cyber incident monitor: lessons learned and steps ahead", Proceedings of the 8th International Conference on Security of Information and Networks, ACM International Conference, Sochi, Russia, pp.158-164, 2015. DOI: https://doi.org/10.1145/2799979.2799999
  62. M. Tariq, B. Aslam, I. Rashid, & A. Waqar, "Cyber threats and incident response capability - a case study of Pakistan", 2013 2nd National Conference on Information Assurance, IEEE, Rawalpindi, Pakistan, pp.15-20, 2013. DOI: https://doi.org/10.1109/NCIA.2013.6725319
  63. N. B. Sukhai, "Hacking and cybercrime", 2004 Information Security Curriculum Development Conference, ACM International Conference, NY, USA, pp.128-132, 2004. DOI: https://doi.org/10.1145/1059524.1059553
  64. I.. Nadir, & T. Bakhshi, "Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques", 2018 International Conference on Computing, Mathematics and Engineering Technologies, IEEE, Sukkur, Pakistan, March 2018. DOI: https://doi.org/10.1109/ICOMET.2018.8346329
  65. A. V. Mbaziira, & D. R. Murphy, "An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks", Proceedings of the 2nd International Conference on Compute and Data Analysis, ICCDA, IL, USA, pp.42-46, 2018. DOI: https://doi.org/10.1145/3193077.3193080
  66. G. Settanni, Y. Shovgenya, F. Skopik, R. Graf, M. Wurzenberger & R. Fiedler, "Correlating cyber incident information to establish situational awareness in Critical Infrastructures", 2016 14th Annual Conference on Privacy, Security and Trust, IEEE, Auckland, New Zealand, pp.78-81, 2016. DOI: https://doi.org/10.1109/PST.2016.7906940
  67. M. Eddolls, "Making cybercrime prevention the highest priority", Network Security, Vol.2016, Issue8, pp.5-8, 2016. DOI: https://doi.org/10.1016/S1353-4858(16)30075-7
  68. M. Ionita, & V. Patriciu, "Cyber Incident Response Aided by Neural Networks and Visual Analytics", 2015 20th International Conference on Control Systems and Computer Science, IEEE, Bucharest, Romania, pp.229-233, 2015. DOI: https://doi.org/10.1109/CSCS.2015.41
  69. F. Alrimawi, L. Pasquale, & B. Nuseibeh, "Software engineering challenges for investigating cyber-physical incidents", 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems, IEEE, Buenos Aires, Argentina, pp.34-40, 2017. DOI: https://doi.org/10.1109/SEsCPS.2017.9
  70. M. Hopkins, & A. Dehghantanha, "Exploit Kits: The production line of the Cybercrime economy?", 2015 Second International Conference on Information Security and Cyber Forensics, IEEE, Cape Town, South Africa, pp.23-27, 2015. DOI: https://doi.org/10.1109/InfoSec.2015.7435501
  71. J. Armin, P. Foti, & M. Cremonini, "0-Day Vulnerabilities and Cybercrime", 10th International Conference on Availability, Reliability and Security, IEEE, Toulouse, France, pp.711-718, 2015. DOI: https://doi.org/10.1109/ARES.2015.55
  72. M. Eriksen-Jensen, "Holding back the tidal wave of cybercrime", Computer Fraud and Security, Vol.2013, No.3, pp.10-16, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70028-9
  73. S. M. Virtanen, "Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities", Psychiatry, Psychology and Law, Vol.23, Issue3, pp.323-338, 2017. DOI: https://doi.org/10.1080/13218719.2017.1315785
  74. Y. Bentaleb, A. Abarda, H. Mharzi, & S. E. Hajji, "Application of latent class analysis to identify the youth population who risk being cybercrime victim on social networks", Contemporary Engineering Sciences, Vol.8, No.32, pp.1529-1534, 2015. DOI: https://doi.org/10.12988/ces.2015.58261
  75. E. R. Leukfeldt, "Cybercrime and social ties: Phishing in Amsterdam", Trends in Organized Crime, Vol.17, Issue4, pp.231-249, 2014. DOI: https://doi.org/10.1007/s12117-014-9229-5
  76. J. L. Bele, M. Dimc, D. Rozman, & A. S. Jemec, "Rasing awarenss of cybercrime - the use of education as a means of prevention and protection", 10th International Conference Mobile Learning 2014, Madrid, Spain, pp.281-284, 2014.
  77. P. Gerard, N. Kapadia, J. Acharya, P. T. Chang, & Z. Lefkovitz, "Cybersecurity in Radiology: Access of Public Hot Spots and Public Wi-Fi and Prevention of Cybercrimes and HIPAA Violations", American Journal of Roentgenology, Vol.201, No.6, pp.1186-1189, 2013. DOI: https://doi.org/10.2214/AJR.12.9651
  78. I. Lin, Y. Yen, & A. Chang, "A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime", 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, Seoul, South Korea, pp.543-548, 2011. DOI: https://doi.org/10.1109/IMIS.2011.58
  79. M. S. Bargh, S. Choenni, I. Mulder, & R. Pastoor, "Exploring a Warrior Paradigm to Design Out Cybercrime", 2012 European Intelligence and Security Informatics Conference, IEEE, Odense, Denmark, pp.84-90, 2012. DOI: https://doi.org/10.1109/EISIC.2012.40
  80. G. Davis, A. Garcia, & W. Zhang "Empirical Analysis of the Effects of Cyber Security Incidents", Risk Analysis, Vol.29, No.9, pp.1304-1316, 2009. DOI: https://doi.org/10.1111/j.1539-6924.2009.01245.x
  81. D. Manky, "Cybercrime as a service: a very modern business", Computer Fraud & Security, Vol.2013, Issue6, pp.9-13, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70053-8
  82. C. M. M. Reep-van den Bergh, & M. Junger, "Victims of cybercrime in Europe: a review of victim surveys", Crime Science, Vol.7, No.5, 2018. DOI: https://doi.org/10.1186/s40163-018-0079-3
  83. S. G. A. van de Weijer, R. Leukfeldt, & W. Bernasco, "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking", European Journal of Criminology, Vol.16, Issue4, pp.486-508, 2018. DOI: https://doi.org/10.1177/1477370818773610
  84. M. Kaakinen, T. Keipi, P. Rasanen, & A. Oksanen, "Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults", Cyberpsychology, Behavior, and Social Networking, Vol.21, No.20, pp.129-137, 2018. DOI: https://doi.org/10.1089/cyber.2016.0728
  85. M. Junger, L. Montoya, P. Hartel, & M. Heydari, "Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe", 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA, IEEE, London, UK, June 2017. DOI: https://doi.org/10.1109/CyberSA.2017.8073391
  86. S. G. A. van de Weijer, & E. R. Leukfeldt, "Big Five Personality Traits of Cybercrime Victims", Cyberpsychology, Behavior, and Social Networking, Vol.20, No.7, 2017. DOI: https://doi.org/10.1089/cyber.2017.0028
  87. A. Al-Nemrat, & C. Benzaid, "Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation", 214th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Helsinki, Finland, pp.1380-1385, August 2015. DOI: https://doi.org/10.1109/Trustcom.2015.534
  88. W. Goucher, "Being a cybercrime victim", Computer Fraud and Security, Vol.2010, Issue10, pp.16-18, 2010. DOI: https://doi.org/10.1016/S1361-3723(10)70134-2
  89. L. Allodi, M. Corradin, & F. Massacci, "Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned", IIEEE Transactions on Emerging Topics in Computing, Vol.4. No.1, pp.35-46, 2016. DOI: https://doi.org/10.1109/TETC.2015.2397395
  90. A. Nagurney, "A Multiproduct Network Economic Model of Cybercrime in Financial Services", Service Science, Vol.7, No.1, pp.70-81, 2015. DOI: https://doi.org/10.1287/serv.2015.0095
  91. A. Alazab, J. Abawajy, M. Hobbs, R. Layton, & A. Khraisat., "Crime toolkits: The productisation of cybercrime", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Melbourne, Australia, pp.1626-1632, 2013. DOI: https://doi.org/10.1109/TrustCom.2013.273
  92. K. L. Modecki, B. L. Barber, & L. Vernon, "Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization", Journal of Youth and Adolescence, Vol.42, Issue5, pp.651-661, 2013. DOI: http://dx.doi.org/10.1007/s10964-013-9938-0
  93. G. Settanni, F. Skopik, Y. Shovgenya, & R. Fiedler, "A Collaborative Analysis System for Cross-organization Cyber Incident Handling", Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP, Rome, Italy, pp.105-116, 2016. DOI: https://doi.org/10.5220/0005688301050116
  94. S. Romanosky, "Examining the costs and causes of cyber incidents", Journal of Cybersecurity, Vol.2, Issue2, pp. 121-135, 2016. DOI: https://doi.org/10.1093/cybsec/tyw001
  95. J. Doyon-Martin, "Cybercrime in West Africa as a Result of Transboundary E-Waste", Journal of Applied Security Researchy, Vol.10, Issue2, pp.207-220, 2015. DOI: https://doi.org/10.1080/19361610.2015.1004511
  96. A. Joode, "Effective corporate security and cybercrime", Network Security, Vol. 2011, Issue 9, pp.16-18, 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70097-6
  97. R. Joffee, "Cybercrime: the global epidemic at your network door", Network Security, Vol.2010, Issue7, pp.4-7, 2010. DOI: https://doi.org/10.1016/S1353-4858(10)70091-X
  98. Y. Ben-Itzhak, "Organised cybercrime and payment cards", Card Technology Today, Vol. 21, Issue2, pp.10-11, 2009. DOI: https://doi.org/10.1016/S0965-2590(09)70057-X