Abstract
In this chapter, we document various sources of cybercrime data to help guide future research endeavors. We focus most of our attention on datasets associated with hacking, and to a lesser degree online fraud. Rather than a catalog of sources, we also describe what research has accomplished with these data on specific crimes and discuss the strengths and limitations of their use. The data discussed throughout the chapter are gathered from a variety of sources including the FBI, Cambridge Cybercrime Centre, Zone-H, various cybersecurity companies, and several other websites and platforms. These data allow researchers the opportunity to assess cybercrime correlates of engagement, victimization patterns, and macro-level trends. However, they share one major flaw; they do not allow for the assessment of causation. We conclude by suggesting that criminologists should prioritize longitudinal data collection that allows for causal assessment.
References
Arbor Networks. (2018). Insight into the global threat landscape. Retrieved from https://www.netscout.com/report
Babko-Malaya, O., Cathey, R., Hinton, S., Maimon, D., & Gladkova, T. (2017). Detection of hacking behaviors and communication patterns on social media. In 2017 IEEE international conference on big data (Big Data) (pp. 4636–4641). Boston, MA: IEEE.
Benjamin, V., Li, W., Holt, T., & Chen, H. (2015). Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. In Intelligence and Security Informatics (ISI), 2015 IEEE international conference on (pp. 85–90). Baltimore, MD: IEEE.
Bitdefender. (2018). Cyberthreat real time map. Retrieved from https://threatmap.bitdefender.com
Bossler, A. M. (2017). Need for debate on the implications of honeypot data for restrictive deterrence policies in cyberspace. Criminology & Public Policy, 16(3), 681–688.
Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391–408.
Federal Bureau of Investigation. (2019a). Crime in the United States 2018. Retrieved from https://ucr.fbi.gov/crime-in-the-u.s/2018/crime-in-the-u.s.-2018/topic-pages/about-cius
Federal Bureau of Investigation. (2019b). National incident-based reporting system. Retrieved from https://www.fbi.gov/services/cjis/ucr/nibrs
Federal Bureau of Investigation Internet Crime Complain Center (IC3). (2017). 2017 Internet crime report. Retrieved from https://pdf.ic3.gov/2017_IC3Report.pdf
Holt, T. J., Strumsky, D., Smirnova, O., & Kilger, M. (2012). Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, 6(1).
Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). Assessing the macro-level correlates of malware infections using a routine activities framework. International Journal of Offender Therapy and Comparative Criminology, 62(6), 1720–1741.
Hong, J. (2012). The state of phishing attacks. Communications of the ACM, 55(1), 74–81.
Howell, C. J., Maimon, D., Cochran, J. K., Jones, H. M., & Powers, R. A. (2017). System trespasser behavior after exposure to warning messages at a Chinese computer network: An Examination. International Journal of Cyber Criminology, 11(1), 63–77.
Howell, C. J., Burruss, B. W., Maimon, D., & Sahani, S. (2019). Website defacement and routine activities: Considering the importance of hackers’ valuations of potential targets. Journal of Crime and Justice, 42, 536.
Huff, R., Desilets, C., & Kane, J. (2010). National public survey on white collar crime. Fairmont: National White Collar Crime Center.
Kaspersky Lab. (2018). Cyberthreat real-time map. Retrieved from https://cybermap.kaspersky.com
Kigerl, A. (2012). Routine activity theory and the determinants of high cybercrime countries. Social Science Computer Review, 30(4), 470–486.
Lastdrager, E. E. (2014). Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science, 3(1), 1–10.
Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed denial of service attacks. In Systems, man, and cybernetics, 2000 IEEE international conference on (Vol. 3, pp. 2275–2280). Nashville, TN: IEEE.
Lee, M., Pak, S., Lee, D., & Schapiro, A. (1999). Electronic commerce, hackers, and the search for legitimacy: A regulatory proposal. Berkeley Technology Law Journal, 14(2), 839.
Macdonald, M., Frank, R., Mei, J., & Monk, B. (2015). Identifying digital threats in a hacker web forum. In Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining 2015 (pp. 926–933). Paris, France: ACM.
Maimon, D., & Louderback, E. R. (2018). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, (0), 191–216.
Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52(1), 33–59.
Maimon, D., Fukuda, A., Hinton, S., Babko-Malaya, O., & Cathey, R. (2017). On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks. In 2017 IEEE international conference on big data (Big Data) (pp. 4668–4673). Boston, MA: IEEE.
Malware Domain List (MDL). (2013). Malware domain list frequent asked questions. Retrieved from http://www.malwaredomainlist.com
McAfee. (2018). Global virus map. Retrieved from https://home.mcafee.com/virusinfo/global-virus-map
McGrath, D. K., & Gupta, M. (2008). Behind phishing: An examination of phisher modi operandi. LEET, 8, 4.
Muniz, C. N. (2019). Sexual assault and robbery disclosure: An examination of Black’s theory of the behavior of law (Doctoral dissertation, University of South Florida).
Pangaria, M., & Shrivastava, V. (2013). Need of ethical hacking in online world. International Journal of Science and Research (IJSR), India Online. ISSN: 2319–7064, 529–531.
Project Honey pot. (2018). Project honey pot. Retrieved from https://www.projecthoneypot.org
Rantala, R. (2008). Cybercrime against businesses, 2005. Retrieved from http://www.bjs.gov/index.cfm?ty=pbdetail&iid=769
Reyns, B. W. (2015). A routine activity perspective on online victimisation: Results from the Canadian general social survey. Journal of Financial Crime, 22(4), 396–411.
Reyns, B. W., Henson, B., Fisher, B. S., Fox, K. A., & Nobles, M. R. (2016). A gendered lifestyle-routine activity approach to explaining stalking victimization in Canada. Journal of Interpersonal Violence, 31(9), 1719–1743.
Schafer, J. A., Lee, C., Burruss, G. W., & Giblin, M. J. (2018). College student perceptions of campus safety initiatives. Criminal Justice Policy Review, 29(4), 319–340.
Testa, A., Maimon, D., Sobesto, B., & Cukier, M. (2017). Illegal roaming and file manipulation on target computers: Assessing the effect of sanction threats on system trespassers’ online behaviors. Criminology & Public Policy, 16(3), 689–726.
Trend Micro. (2018). Global botnet map. Retrieved from https://botnet-cd.trendmicro.com
U.K. Office for National Statistics. (2019) Crime and justice. Retrieved from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice
Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system: Additional evidence for the relevance of restrictive deterrence in cyberspace. Journal of Research in Crime and Delinquency, 52(6), 829–855.
Zhang, X., Tsang, A., Yue, W. T., & Chau, M. (2015). The classification of hackers by knowledge exchange behaviors. Information Systems Frontiers, 17(6), 1239–1251.
Zone-H. (2018). Unrestricted information. Retrieved from http://www.zone-h.org
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 The Author(s), under exclusive licence to Springer Nature Switzerland AG
About this entry
Cite this entry
Howell, C.J., Burruss, G.W. (2020). Datasets for Analysis of Cybercrime. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-90307-1_15-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-90307-1_15-1
Received:
Accepted:
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-90307-1
Online ISBN: 978-3-319-90307-1
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences