Advertisement

Journal in Computer Virology

, Volume 2, Issue 1, pp 13–20 | Cite as

On the definition and classification of cybercrime

  • Sarah GordonEmail author
  • Richard Ford
Original Paper

Abstract

The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. We then divide Cybercrime into two distinct categories: Type I Cybercrime, which is mostly technological in nature, and Type II Cybercrime, which has a more pronounced human element. We then use two case studies to illustrate the role of crimeware in different types of Cybercrime, and offer some observations on the role of cognition in the process of Cybercrime. Finally we provide several suggestions for future work in the area of Cybercrime.

Keywords

Supra Note Identity Theft Computer Crime Unwanted Contact High Tech Crime 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bocij P. (2005) Reactive stalking: a new perspective on victimisation. Br J Forensic Pract 7(1): 1–5Google Scholar
  2. 2.
    Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. December, 2005. Downloaded January 23rd 2006 from: http://www.crime-research.org/articles/cybercrime-in-france-overview/ (2005)Google Scholar
  3. 3.
    Davis E., Wright H., Tremaine C.: Beyond phishing: pharming and crimeware attacks. Downloaded Jan 23rd 2006 from: http://www.privsecblog.com/archives/phishingpharming-53-beyond-phishing-pharming-and-crimeware-attacks-.html (2005)Google Scholar
  4. 4.
    DOJ: Cyberstalking: a new challenge for law enforcement and industry" a report from the Attorney General to the Vice President (August 1999) Downloaded January 23rd 2006 from http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm. (1999)Google Scholar
  5. 5.
    DOJ: H.R. 3402 Department of Justice Appropriations Authorization Act, fiscal years 2006 through 2009. Downloaded January 23rd from: http://www.gop.gov/Committeecentral/bills/hr3402.asp (2005)Google Scholar
  6. 6.
    Gordon, S.: Exploring spyware and adware risk assessment. Presentation to the Computers and Security Institute Conference, Phoenix, Arizona (2005)Google Scholar
  7. 7.
    Gordon S. Changing the way the World thinks about computer security. Ph.D. Thesis, University of Middlesex, Department of Computer Science. London, UK (2005)Google Scholar
  8. 8.
    Gordon S., Ford, R.: Cyberterrorism? In: Cybterterrorism. The International Library of Essays in Terrorism, Alan O’Day, Ashgate, ISBN 0 7546 2426 9 (2004)Google Scholar
  9. 9.
    Grodzinsky F.S., Tavani, H.T.: Some ethical reflections on cyberstalking. In: ACM SIGCAS Computers and Society, vol. 32 Issue 1 (2002)Google Scholar
  10. 10.
    Helpguide: Domestic violence and abuse: types, signs, symptoms, Causes, and Effects. A project of the Rotary Club of Santa Monica, California and the Center for Healthy Again. Downloaded January 23rd 2006 from: http://www.helpguide.org/mental/domestic_violence_abuse_types_signs_causes_effects.htm (2005)Google Scholar
  11. 11.
    Informit: Protecting yourself from internet crime. Part II. Downloaded Jan 23rd 2006 from: http://www.informit.com/ guides/content.asp?g=security&seqNum=144 (2005)Google Scholar
  12. 12.
    ISTR: Symantec internet security threat report. Trends for July 04- December 04, Vol VII (2005)Google Scholar
  13. 13.
    Krone T.: High tech crime brief. Australian Institute of Criminology, Canberra, Australia, ISSN 1832–3413 (2005)Google Scholar
  14. 14.
    Kshetri, N.: The simple economics of cybercrimes, security & privacy magazine. In: IEEE, vol. 4, Issue 1, pp. 33–39 (2006)Google Scholar
  15. 15.
    Kuhn T. (1992) The structure of scientific revolution 2nd ed. University of Chicago Press, Chicago IllinoisGoogle Scholar
  16. 16.
    Parker D. (1998) Fighting computer crime: a new framework for protecting information ISBN 0471163783. Wiley, New YorkGoogle Scholar
  17. 17.
    PC Magazine: PC magazine encyclopedia. Downloaded Jan 23rd 2006 from: http://www.pcmag.com/encyclopedia_term/ 0,2542, t=crimeware&i=55434,00.asp (2005)Google Scholar
  18. 18.
    Studycrime: Online resource guide to law and crime. Downloaded Jan 23rd 2006 from: http://www.studycrime.com/Crime/Crimeware.php (2005)Google Scholar
  19. 19.
    United Nations: The united Nations manual on the prevention and control of computer related crime, 1995, supra note 41, paragraphs 20 to 73 in International Review of Criminal Policy, pp. 43–44 (1995)Google Scholar
  20. 20.
    Wikipedia: Common usage crimeware definition. Downloaded Jan 23rd 2006 from http://en.wikipedia.org/wiki/Crimeware (2006)Google Scholar
  21. 21.
    ZD: 2.8 Billion in E-commerce revenues lost to fraud in 2005. ZD Online., Downloaded Jan 23rd 2006 from: http://blogs.zdnet.com/ITFacts/?p=9471 (2005)Google Scholar
  22. 22.
    Zeviar-Geese: The state of the law on cyberjurisdiction and cybercrime on the internet.In: California Pacific School of Law, Gonzaga Journal of International Law, vol. 1 (1997–1998)Google Scholar
  23. 23.
    Zona M.A., Sharma K.K., Lane M.D. (1993) A comparative study of erotomanic and obsessional subjects in a forensic sample. J Forensic Sci 38, 894–903Google Scholar
  24. 24.
    Zona M.A., Palarea R.E., Lane J.C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In Meloy, J.R. The Psychology of Stalking: Clinical and Forensic Perspectives. Academic, San Diego, California: (1998)Google Scholar

Copyright information

© Springer-Verlag France 2006

Authors and Affiliations

  1. 1.Symantec Security ResponseSanta MonicaUSA
  2. 2.Department of Computer SciencesFlorida TechMelbourneUSA

Personalised recommendations