Browse > Article
http://dx.doi.org/10.5762/KAIS.2020.21.6.646

A Study on the Establishment of Cybercrime Business Model(CBM) through a Systematic Literature Review  

Park, Ji-Yong (Department of Management of Technology, Sungkyunkwan University)
Lee, Heesang (Department of Management of Technology, Sungkyunkwan University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.21, no.6, 2020 , pp. 646-661 More about this Journal
Abstract
Technological innovations and fast-growing new internet businesses are changing the paradigm of traditional business management, having various impacts on society. The development of internet technology is also increasing the adverse effects on technological innovation, and in particular, cybercrime related to computers continues to increase with each technological innovation. The purpose of this study is to construct a cybercrime business model (CBM) by using the business model canvas (BMC) theory for cybercrime in order to reduce cybercrime, and this model is applied and analyzed based on types of Korean cybercrimes. For this study, a systematic literature review was conducted to determine the components of cybercrime, and 60 relevant documents were classified through a keyword-based literature search. Besides, qualitative research in the classified literature has led to the derivation of cybercrime into 18 sub-blocks and nine building blocks. This study applies BMC theory to this derivation of cybercrime and builds the CBM through proper redefinition. Lastly, the developed CBM could be applied to cybercrime in Korea to help cyber incident-response staff understand cybercrimes analytically. This study contributes to the development of a new analysis framework that can reduce cybercrime.
Keywords
Cybercrime business model; Cybercrime management; Business model; Cybercrime; Cybercrime in Korea;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Gerard, N. Kapadia, J. Acharya, P. T. Chang, & Z. Lefkovitz, "Cybersecurity in Radiology: Access of Public Hot Spots and Public Wi-Fi and Prevention of Cybercrimes and HIPAA Violations", American Journal of Roentgenology, Vol.201, No.6, pp.1186-1189, 2013. DOI: https://doi.org/10.2214/AJR.12.9651   DOI
2 I. Lin, Y. Yen, & A. Chang, "A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime", 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, Seoul, South Korea, pp.543-548, 2011. DOI: https://doi.org/10.1109/IMIS.2011.58
3 M. S. Bargh, S. Choenni, I. Mulder, & R. Pastoor, "Exploring a Warrior Paradigm to Design Out Cybercrime", 2012 European Intelligence and Security Informatics Conference, IEEE, Odense, Denmark, pp.84-90, 2012. DOI: https://doi.org/10.1109/EISIC.2012.40
4 M. Eriksen-Jensen, "Holding back the tidal wave of cybercrime", Computer Fraud and Security, Vol.2013, No.3, pp.10-16, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70028-9   DOI
5 D. Wall, Cybercrime: The transformation of crime in the information age, Malden, MA, Polity Press, 2007, pp.30-130.
6 http://www.police.go.kr/www/security/cyber/cyber01.jsp
7 https://cyberbureau.police.go.kr/prevention/nw/sub2_notitle.jsp?mid=010201
8 https://cyberbureau.police.go.kr/prevention/nw/sub2_2_notitle.jsp?mid=010202
9 https://cyberbureau.police.go.kr/prevention/nw/sub2_3_notitle.jsp?mid=010203
10 A. Afuah, & C. L. Tucci, Internet Business Models and Strategies, McGraw-Hill, 2001, p.9-12.
11 A. Osterwalder, Y. Pigneur, & C. L. Tucci, "Clarifying Business Models: Origins, Present, and Future of the Concept", Communications of the Association or information Systems, Vol.16, No.1, pp.1-25, 2005. DOI: https://doi.org/10.17705/1CAIS.01601
12 R. Alt, & H. Zimmermann, "Introduction to Special Section - Business Models", Electronic Markets, Vol.11, No.1, 2001. DOI: https://doi.org/10.1080/713765630
13 C. Zott, R. Amit, & L. Massa, "The business model: Theoretical roots, recent developments, and future research", IESE Business School Working Paper, University of Navarra, Barcelona, Spain, No.862. 2010.
14 J. Ojasalo, & K. Ojasalo, "Service Logic Business Model Canvas", Journal of Research in Marketing and Entrepreneurship, Vol.20, No.1, pp.70-98, 2018. DOI: https://doi.org/10.1108/JRME-06-2016-0015   DOI
15 S. Keane, K. Cormican, & J. Sheahan, "Comparing how entrepreneurs and managers represent the elements of the business model canvas", Journal of Research in Marketing and Entrepreneurship, Vol.9, pp.65-74, 2018. DOI: https://doi.org/10.1016/j.jbvi.2018.02.004
16 T. J. Holt, "Examining the Forces Shaping Cybercrime Markets Online", Social Science Computer Review, Vol.31, Issue2, pp.165-177, 2013. DOI: https://doi.org/10.1177/0894439312452998   DOI
17 K. Hui, S. Kim, & Q. Wang, "Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks", MIS Quarterly, Vol.41, No.2, pp.497-523, 2017. DOI: http://dx.doi.org/10.25300/MISQ/2017/41.2.08   DOI
18 D. Kao, "Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments", The Journal of Supercomputing, Vol.72, Issue1, pp.141-160, 2016. DOI: https://doi.org/10.1007/s11227-015-1516-7   DOI
19 C. Konradt, A. Schillingb, & B. Wernersb, "Phishing: An economic analysis of cybercrime perpetrators", Computers and Security, Vol.58, pp.39-46, 2016. DOI: https://doi.org/10.1016/j.cose.2015.12.001   DOI
20 S. Pieschl, C. Kuhlmann & T. Porsch, "Beware of Publicity! Perceived Distress of Negative Cyber Incidents and Implications for Defining Cyberbullying", Journal of School Violence, Vol.14, No.1, pp.111-132, 2015. DOI: https://doi.org/10.1080/15388220.2014.971363   DOI
21 A. K. Sood., R. Bansal, & R. J. Enbody, "Cybercrime: Dissecting the state of underground enterprise", IEEE Internet Computing, Vol.17, Issue1, pp.60-68, 2013. DOI: https://doi.org/10.1109/MIC.2012.61   DOI
22 M. R. J. Soudijn, & B. C. H. T Zegers, "Cybercrime and virtual offender convergence settings", Trends in Organized Crime, Vol.15, Issue2-3, pp.111-129, 2012. DOI: https://doi.org/10.1007/s12117-012-9159-z   DOI
23 A. Kuzmin, "State and trends of Russian cybercrime in 2011", 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, St. Petersburg, Russia, pp.933-939, 2012. DOI: https://doi.org/10.1109/ICUMT.2012.6459794
24 A. Kigerl, "Routine Activity Theory and the Determinants of High Cybercrime Countries", Social Science Computer Review, Vol.30, Issue4, pp.470-486, 2011. DOI: https://doi.org/10.1177/0894439311422689   DOI
25 M. Junger, L. Montoya, P. Hartel, & M. Heydari, "Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe", 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA, IEEE, London, UK, June 2017. DOI: https://doi.org/10.1109/CyberSA.2017.8073391
26 G. Davis, A. Garcia, & W. Zhang "Empirical Analysis of the Effects of Cyber Security Incidents", Risk Analysis, Vol.29, No.9, pp.1304-1316, 2009. DOI: https://doi.org/10.1111/j.1539-6924.2009.01245.x   DOI
27 D. Manky, "Cybercrime as a service: a very modern business", Computer Fraud & Security, Vol.2013, Issue6, pp.9-13, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70053-8   DOI
28 C. M. M. Reep-van den Bergh, & M. Junger, "Victims of cybercrime in Europe: a review of victim surveys", Crime Science, Vol.7, No.5, 2018. DOI: https://doi.org/10.1186/s40163-018-0079-3
29 S. G. A. van de Weijer, R. Leukfeldt, & W. Bernasco, "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking", European Journal of Criminology, Vol.16, Issue4, pp.486-508, 2018. DOI: https://doi.org/10.1177/1477370818773610
30 M. Kaakinen, T. Keipi, P. Rasanen, & A. Oksanen, "Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults", Cyberpsychology, Behavior, and Social Networking, Vol.21, No.20, pp.129-137, 2018. DOI: https://doi.org/10.1089/cyber.2016.0728   DOI
31 S. G. A. van de Weijer, & E. R. Leukfeldt, "Big Five Personality Traits of Cybercrime Victims", Cyberpsychology, Behavior, and Social Networking, Vol.20, No.7, 2017. DOI: https://doi.org/10.1089/cyber.2017.0028
32 A. Al-Nemrat, & C. Benzaid, "Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation", 214th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Helsinki, Finland, pp.1380-1385, August 2015. DOI: https://doi.org/10.1109/Trustcom.2015.534
33 M. Dudin, G. Kutsuri, I. Fedorova, S. Dzusova, & A. Namitulina, "The Innovative Business Model Canvas in the System of Effective Budgeting", Asian Social Science, Vol.11, No.7, pp.290-296, 2015. DOI: http://dx.doi.org/10.5539/ass.v11n7p290
34 A. Joyce, & R. Paquin, "The triple layered business model canvas: A tool to design more sustainable business models", Journal of Cleaner Production, Vol.135, pp.1474-1486, 2016. DOI: https://doi.org/10.1016/j.jclepro.2016.06.067   DOI
35 E. Turko, "Business plan vs business model canvas in entrepreneurship training: A comparison of students' perceptions", Asian Social Science, Vol.12, No.10, pp.55-62, 2016. DOI: http://dx.doi.org/10.5539/ass.v12n10p55   DOI
36 M. Urban, M. Klemm, K. Ploetner, & M. Hornung, "Airline categorisation by applying the business model canvas and clustering algorithms", Journal of Business Venturing Insights, Vol.71, pp.175-192, 2018. DOI: https://doi.org/10.1016/j.jairtraman.2018.04.005
37 M. Toro-Jarrín, I. Ponce-Jaramillo, & D. Guemes-Castorena, "Methodology for the of building process integration of Business Model Canvas and Technological Roadmap", Technological Forecasting and Social Change, Vol.110, pp.213-225, 2016. DOI: https://doi.org/10.1016/j.techfore.2016.01.009   DOI
38 B. Fritscher, & Y. Pigneur, "Classifying business model canvas usage from novice to master: A dynamic perspective", Lecture Notes in Business Information Processing, Vol.257, pp.134-151, 2016. DOI: http://dx.doi.org/10.1007%2F978-3-319-40512-4_8   DOI
39 B. Fritscher, & Y. Pigneur, "Visualizing business model evolution with the Business Model Canvas: Concept and tool", 16th IEEE Conference on Business Informatics, IEEE, Geneva, Switzerland, pp.151-158, 2014. DOI: https://doi.org/10.1109/CBI.2014.9
40 T. O'Neill, "The innovative business model canvas in the system of effective budgeting", Reference Services Review, Vol.43, No.3, pp.450-460, 2015. DOI: http://dx.doi.org/10.1108/RSR-02-2015-0013   DOI
41 A. S. Ahmed, S. Deb, A. S. B. Habib, M. N. Mollah, & A. S. Ahmad, "Simplistic Approach to Detect Cybercrimes and Deter Cyber Criminals", 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering, IEEE, Rajshahi, Bangladesh, 2018. DOI: https://doi.org/10.1109/IC4ME2.2018.8465618
42 M. Redford, "U.S. and EU Legislation on Cybercrime", 2011 European Intelligence and Security Informatics Conference, IEEE, Athens, Greece, pp.34-37, 2011. DOI: https://doi.org/10.1109/EISIC.2011.38
43 S. McCombie, J. Pieprzyk, & P. Watters, "Cybercrime Attribution: An Eastern European Case Study", Proceedings of the 7th Australian Digital Forensics Conference, Edith Cowan University, Australian, pp.41-51, 2009. DOI: https://doi.org/10.4225/75/57b2880840ccf
44 A. M. Gasso, V. Fernandez-Cruz, I. Montiel, C. Martin-Fumado, & J. R. Agustina, "Retos forenses ante la cibercriminalidad social en menoresForensic challenges presented by social cybercrime in minors", Revista Española de Medicina Legal, Vol.45, Issue2, pp.73-76, 2019. DOI: https://doi.org/10.1016/j.reml.2018.11.003   DOI
45 E. Vasilomanolakis, S. Karuppayah, P. Kikiras, & M. Muhlhauser, "A honeypot-driven cyber incident monitor: lessons learned and steps ahead", Proceedings of the 8th International Conference on Security of Information and Networks, ACM International Conference, Sochi, Russia, pp.158-164, 2015. DOI: https://doi.org/10.1145/2799979.2799999
46 M. Tariq, B. Aslam, I. Rashid, & A. Waqar, "Cyber threats and incident response capability - a case study of Pakistan", 2013 2nd National Conference on Information Assurance, IEEE, Rawalpindi, Pakistan, pp.15-20, 2013. DOI: https://doi.org/10.1109/NCIA.2013.6725319
47 N. B. Sukhai, "Hacking and cybercrime", 2004 Information Security Curriculum Development Conference, ACM International Conference, NY, USA, pp.128-132, 2004. DOI: https://doi.org/10.1145/1059524.1059553
48 A. Nagurney, "A Multiproduct Network Economic Model of Cybercrime in Financial Services", Service Science, Vol.7, No.1, pp.70-81, 2015. DOI: https://doi.org/10.1287/serv.2015.0095   DOI
49 W. Goucher, "Being a cybercrime victim", Computer Fraud and Security, Vol.2010, Issue10, pp.16-18, 2010. DOI: https://doi.org/10.1016/S1361-3723(10)70134-2   DOI
50 L. Allodi, M. Corradin, & F. Massacci, "Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned", IIEEE Transactions on Emerging Topics in Computing, Vol.4. No.1, pp.35-46, 2016. DOI: https://doi.org/10.1109/TETC.2015.2397395   DOI
51 A. Alazab, J. Abawajy, M. Hobbs, R. Layton, & A. Khraisat., "Crime toolkits: The productisation of cybercrime", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Melbourne, Australia, pp.1626-1632, 2013. DOI: https://doi.org/10.1109/TrustCom.2013.273
52 K. L. Modecki, B. L. Barber, & L. Vernon, "Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization", Journal of Youth and Adolescence, Vol.42, Issue5, pp.651-661, 2013. DOI: http://dx.doi.org/10.1007/s10964-013-9938-0   DOI
53 G. Settanni, F. Skopik, Y. Shovgenya, & R. Fiedler, "A Collaborative Analysis System for Cross-organization Cyber Incident Handling", Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP, Rome, Italy, pp.105-116, 2016. DOI: https://doi.org/10.5220/0005688301050116
54 S. Romanosky, "Examining the costs and causes of cyber incidents", Journal of Cybersecurity, Vol.2, Issue2, pp. 121-135, 2016. DOI: https://doi.org/10.1093/cybsec/tyw001
55 J. Doyon-Martin, "Cybercrime in West Africa as a Result of Transboundary E-Waste", Journal of Applied Security Researchy, Vol.10, Issue2, pp.207-220, 2015. DOI: https://doi.org/10.1080/19361610.2015.1004511   DOI
56 A. Joode, "Effective corporate security and cybercrime", Network Security, Vol. 2011, Issue 9, pp.16-18, 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70097-6   DOI
57 J. M. Corbin, & A. L. Straus, Basics of qualitative research: Techniques and procedures for developing grounded theory, Sage publications, 2007, pp. 65-297.
58 B. Glaser, & A. Strauss(1967), The Discovery of Grounded Theory: Strategies for Qualitative research, Routledge, 2000, pp.21-160.
59 E. Babbie, The practice of social research, Wadsworth Publishing, 2012, pp.88-122.
60 A. Bryman, & E. Bell, Business research methods, Oxford University Press, 2015, pp. 578-604.
61 S. Green, "Systematic reviews and meta-analysis", Singapore medical journal, vol.46, no.6, pp.270-274, 2005.
62 B. Paek, & H. Lee, "Exploratory research on the dynamic capabilities of leading firms: Research framework building", Journal of the Korea Academia-Industrial cooperation Society, Vol.16, No.12, pp.8262-8273, 2015. DOI: https://doi.org/10.5762/KAIS.2015.16.12.8262   DOI
63 M. N. Al-Mhiqani, R. Ahmad, W. Yassin, A. Hassan, Z. Z. Abidin, N. S. Ali, & K. H. Abdulkareem, "Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems", International Journal of Advanced Computer Science and Applications, Vol.9, Issue1, pp.499-508, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090169
64 M. Eddolls, "Making cybercrime prevention the highest priority", Network Security, Vol.2016, Issue8, pp.5-8, 2016. DOI: https://doi.org/10.1016/S1353-4858(16)30075-7   DOI
65 B. Dupont, "Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime", Crime, Law and Social Change, Vol.67, pp. 97-116, 2017. DOI: https://doi.org/10.1007%2Fs10611-016-9649-z   DOI
66 D. Kao, "Exploring the cybercrime investigation framework of ATM Heist from ISO/IEC 27043:2015", International Conference on Advanced Communication Technology, Vol.67, Issue1, pp.177-182, 2017. DOI: https://doi.org/10.23919/ICACT.2017.7890079
67 I.. Nadir, & T. Bakhshi, "Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques", 2018 International Conference on Computing, Mathematics and Engineering Technologies, IEEE, Sukkur, Pakistan, March 2018. DOI: https://doi.org/10.1109/ICOMET.2018.8346329
68 A. V. Mbaziira, & D. R. Murphy, "An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks", Proceedings of the 2nd International Conference on Compute and Data Analysis, ICCDA, IL, USA, pp.42-46, 2018. DOI: https://doi.org/10.1145/3193077.3193080
69 G. Settanni, Y. Shovgenya, F. Skopik, R. Graf, M. Wurzenberger & R. Fiedler, "Correlating cyber incident information to establish situational awareness in Critical Infrastructures", 2016 14th Annual Conference on Privacy, Security and Trust, IEEE, Auckland, New Zealand, pp.78-81, 2016. DOI: https://doi.org/10.1109/PST.2016.7906940
70 M. Ionita, & V. Patriciu, "Cyber Incident Response Aided by Neural Networks and Visual Analytics", 2015 20th International Conference on Control Systems and Computer Science, IEEE, Bucharest, Romania, pp.229-233, 2015. DOI: https://doi.org/10.1109/CSCS.2015.41
71 https://www.police.go.kr/www/open/publice/publice0204.jsp
72 F. Alrimawi, L. Pasquale, & B. Nuseibeh, "Software engineering challenges for investigating cyber-physical incidents", 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems, IEEE, Buenos Aires, Argentina, pp.34-40, 2017. DOI: https://doi.org/10.1109/SEsCPS.2017.9
73 M. Hopkins, & A. Dehghantanha, "Exploit Kits: The production line of the Cybercrime economy?", 2015 Second International Conference on Information Security and Cyber Forensics, IEEE, Cape Town, South Africa, pp.23-27, 2015. DOI: https://doi.org/10.1109/InfoSec.2015.7435501
74 J. Armin, P. Foti, & M. Cremonini, "0-Day Vulnerabilities and Cybercrime", 10th International Conference on Availability, Reliability and Security, IEEE, Toulouse, France, pp.711-718, 2015. DOI: https://doi.org/10.1109/ARES.2015.55
75 R. Joffee, "Cybercrime: the global epidemic at your network door", Network Security, Vol.2010, Issue7, pp.4-7, 2010. DOI: https://doi.org/10.1016/S1353-4858(10)70091-X   DOI
76 Y. Ben-Itzhak, "Organised cybercrime and payment cards", Card Technology Today, Vol. 21, Issue2, pp.10-11, 2009. DOI: https://doi.org/10.1016/S0965-2590(09)70057-X   DOI
77 D. J. Teece, "Business Models, Business Strategy and Innovation", Long Range Planning, Vol.43, Issues2-3, pp.172-194, 2001. DOI: https://doi.org/10.1016/j.lrp.2009.07.003   DOI
78 B. Moon, J. D. McCluskey, & C. P. McCluskeyd, "A general theory of crime and computer crime: An empirical test", Journal of Criminal Justice, vol.38, Issue4, pp.767-772, 2010. DOI: https://doi.org/10.1016/j.jcrimjus.2010.05.003   DOI
79 S. Caneppele, & M. F. Aebi, "Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes", Policing, Vol.13, Issue1, Pages 66-79, 2017. DOI: https://doi.org/10.1093/police/pax055   DOI
80 P. Hunton, "The growing phenomenon of crime and the internet; A cyber crime execution and analysis model", Computer Law & Security Review, Vol.25, Issue6, pp.528-535, 2009. DOI: https://doi.org/10.1016/j.clsr.2009.09.005   DOI
81 R. Bryant, Investigating digital crime, Wildy, 2008, pp.79-93.
82 D. Halde, & K. Jaishankar, Cyber crime and the Victimization of Women: Laws, Rights, and Regulations, IGI Global, 2011, pp.12-33.
83 E. Kraemer-Mbula, P. Tang, & H. Rush, "The cyber crime ecosystem; Online innovation in the shadows?", Technological Forecasting & Social Change, Vol.80, Issue3, pp.541-555, 2013. DOI: https://doi.org/10.1016/j.techfore.2012.07.002   DOI
84 A. Osterwalder & Y. Pigneur, Business Model Generation, Wiley, 2010, pp.20-57.
85 http://en.wikipedia.org/wiki/Computer_crime.
86 D. L. Shinder, & E. Tittel, Scene of the cyber crime: Computer forensics handbook, Syngress Publishing, 2002, pp.18-33.
87 http://www.mondaq.com/article.asp?articleid=28603
88 D. de Graaf, A. F. Shosha, & P. Gladyshev, "BREDOLAB: Shopping in the Cybercrime Underworld", International Conference on Digital Forensics and Cyber Crime, Indiana, USA, pp.302-313, 2013. DOI: https://doi.org/10.1007/978-3-642-39891-9_19
89 M. A. Al-garadi, K. D. Varathan, & S. D. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network", Computers in Human Behavior, Vol.63, pp.433-443, 2016. DOI: https://doi.org/10.1016/j.chb.2016.05.051   DOI
90 Y. Prayudi,, & S. Yusirwan, "The recognize of malware characteristics through static and dynamic analysis approach as an effort to prevent cybercrime activities", Journal of Theoretical and Applied Information Technology, Vol.77, No.3, pp.438-445, 2015.
91 A. K Sood, S. Zeadally, & R. Bansal, "Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels", IEEE Communications Magazine, Vol.55, Issue7, pp.22-28, 2017. DOI: https://doi.org/10.1109/MCOM.2017.1600969   DOI
92 E. R. Leukfeldt, "Cybercrime and social ties: Phishing in Amsterdam", Trends in Organized Crime, Vol.17, Issue4, pp.231-249, 2014. DOI: https://doi.org/10.1007/s12117-014-9229-5
93 F. Skopik, & Q. Li, "Trustworthy incident information sharing in social cyber defense alliances", IEEE Symposium on Computers and Communications, IEEE, Split, Croatia, pp.233-239, 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754951
94 K. K. e Silva, "Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?", International Review of Law, Computers & Technology, Vol.32, Issue1, pp.21-36, 2018. DOI: https://doi.org/10.1080/13600869.2018.1418142   DOI
95 E. R. Leukfeldt, A. Lavorgna, & E. R. Kleemans, "Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime", European Journal of Criminal Policy and Research, Vol.23, No.3, pp.287-300, 2017. DOI: http://dx.doi.org/10.1007/s10610-016-9332-z   DOI
96 S. M. Virtanen, "Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities", Psychiatry, Psychology and Law, Vol.23, Issue3, pp.323-338, 2017. DOI: https://doi.org/10.1080/13218719.2017.1315785   DOI
97 Y. Bentaleb, A. Abarda, H. Mharzi, & S. E. Hajji, "Application of latent class analysis to identify the youth population who risk being cybercrime victim on social networks", Contemporary Engineering Sciences, Vol.8, No.32, pp.1529-1534, 2015. DOI: https://doi.org/10.12988/ces.2015.58261   DOI
98 J. L. Bele, M. Dimc, D. Rozman, & A. S. Jemec, "Rasing awarenss of cybercrime - the use of education as a means of prevention and protection", 10th International Conference Mobile Learning 2014, Madrid, Spain, pp.281-284, 2014.