Skip to main content

Cybercrime Profiling and Trend Analysis

  • Chapter
  • First Online:
Intelligence Management

Part of the book series: Advanced Information and Knowledge Processing ((AI&KP))

Abstract

A significant percentage of the populace do not consider or understand “what and how” cybercrime is committed, nor how they might be a victim of it, and many fear they might unconsciously be part of the process, i.e. they don’t understand how to behave online. Reducing the opportunities for cybercrime is not a simple task. It will require co-operation between many players, and fundamental changes in common attitudes and practices. When considering legal implications of the misuse of technologies, it is worth noting that crossing national borders results in a change in the laws that people are subject to. Some countries do not consider hacking and online identity theft as high priority crimes. Similarly, the technological divide leaves gaps in the laws in those countries that are less technologically advanced. The aim of this chapter is to examine the relationship between online behaviour and computer victimisation. Understanding the trends of cybercrime and the strategies employed by cyber criminals in order to commit cybercrime will help to identify the steps that needs be taken to prevent such criminal activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • APPG, 2007.” Identity_ Fraud Report12. Available online: http://www.idfraud.org.uk [Access Oct.2010].

  • BBC, Thursday, 21 January 2010 “Young Facing online Fraud Risks http://news.bbc.co.uk/1/hi/business/8470631.stm. [Accessed March 2011]

  • Bennett, Richard R. 1991. Routine Activities: A Cross- National Assessment of a Criminological Perspective. Social Forces, 70: pp 147–163.

    Article  Google Scholar 

  • Bainbridge, D., (2007).”Criminal law tackles computer fraud and misuse”. Computer Law & Security Report. 23(3) pp. 276–281.

    Google Scholar 

  • Brantingham, P.L., and Brantingham, P.J,. (1991). Notes on the geometry of crime, in Environmental Criminology, USA: Wavelend Press Inc.

    Google Scholar 

  • Brantingham, P.J., and Brantingham, P.L. (1984) Patterns in crime. New York: Macmillan.

    Google Scholar 

  • Castells, M. (2002). The internet galaxy: Reflections on the Internet, business, and society. Oxford, United Kingdom: Oxford University Press.

    Google Scholar 

  • Calson Analytics (2004). cybercafés and telecentres. (http://www.calson.com.au/cafenote.htm. [Accessed Feb. 2011]

  • Chance, T., (2005), The Hacker Ethic and Meaningful Work. MA Philosophy candidate University of Reading

    Google Scholar 

  • Choi, Choi-shick Computer Crime Victimization and Integrated Theory: An Empirical Assessment, International Journal of Cyber Criminology, 0974 – 2891 January-June 2008, Vol 2 (1): 308–333

    Google Scholar 

  • Cohen, L. E., & Felson, M., (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44, pp 588–608

    Article  Google Scholar 

  • Cohen, L. E., Felson, M., & Land, K, (1981). Social inequality and predatory criminal victimisation: An exposition and a test of a formal theory. American Sociological Review, 46, pp 505–524.

    Article  Google Scholar 

  • Fafinski S. &Minassian N.; (2009) “UK Cybercrime Report”. Invenio Research. Garlic powerful stuff.

    Google Scholar 

  • http://www.garlik.com/press.php?id=613-GRLK_PRD [Accessed Feb 2010]

  • Fafinski, S. & Minassian, N., (2008). UK Cybercrime Report. Garlik Power Stuff. London. http://www.garlik.com/static_pdfs/cybercrime_report_2008.pdf {Accessed May 2011]

  • Farrell, G. et al. 2005 “Of Targets and Supertargets: A routine Activity Theory of High Crime Rates” Internet Journal of Criminology(IJC). http://www.internetjournalofcriminology.com/Farrell,%20Clark,%20Ellingworth%20&%20Pease%20-%20Supertargets [Accessed April 2011]

  • Holt et al, (2009). Examining the applicability of lifestyle-routine activity theory for cybercrime victimisation. Deviant Behaviour, 30: pp 1–25.

    Article  Google Scholar 

  • Hamid Jahankhani, Ameer Al-Nemrat, Cybercrime victimisations/ criminalisation and Punishment, 6th International Conference on Global Security, Safety and Sustainability, Communications in Computer and Information Science, CCIS, Springer Proceedings of the 6th ICGS3- 10, 1–3 September 10, Braga, Portual.

    Google Scholar 

  • Leyden, J. (2007). UK.gov lambasted for ignoring peers’ cybercrime report”, Channel & Register. http://m.channelregister.co.uk/2007/10/30/ukgov_cybercrime_response [Accessed March 2011]

  • Miethe, Terance; Stafford, Mark C.; and Long, J. Scott. 1987. Social Differentiation in Criminal Victimisation: A Test of Routine Activities/ Life style Theories. American Sociological Review, 52:pp 184–194.

    Article  Google Scholar 

  • McConnell Report, (2000). Cyber Crime and Punishment? Archaic Laws Threaten Global Information. www.mcconnellinternational.com [Accessed March 2011]

  • Mohammad L.; A, (2008). Cybercafé Systems Security. Security and Software for cybercafé, 1–17. Ed. Esharenana E. Adomi. IGI Global

    Google Scholar 

  • Pease, K. (2001).” Crime future and foresight”, In Wall, D.S. (Ed) Crime and the Internet. London, Routledge.

    Google Scholar 

  • Piazza, P. (2006). Technofile:Antisocial networking sites. Security Management, 1–5.

    Google Scholar 

  • Rowlingston, R., 2007. Towards A Strategy for E-Crime Prevention. IN ICGeS Global e Security. 3rd edn. London

    Google Scholar 

  • Rosenblatt, K. S. (1996), High-technology crime. San Jose, CA: KSK.

    Google Scholar 

  • Sukhai N. B, 2004, “ Hacking and Cybercrime”, Information Security Curriculum Development. 1(1): 128–132.

    Google Scholar 

  • Sommer, P., (2004). The future for the policing cybercrime. Computer Fraud & Security. 2004(1):pp 8–12.

    Article  Google Scholar 

  • Symantec Global Internet Security Threat Report Trends for 2008 (A); Volume XIV, Published April 2009 http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf [Accessed May 2011]

  • Symantec Report on Rogue Security Software, July 08 – June 09 (B), Published October 2009 http://eval.symantec.com/mktginfo/enterprise/white_papers/bsymc_report_on_rogue_security_software_WP_20100385.en-us.pdf [Accessed Jan 2011]

  • Tiernan, B. (2000). E-tailing. Chicago: Dearborn.

    Google Scholar 

  • Wall, D. (2007), Hunting Shooting, and Phishing: New Cybercrime Challenges for Cybercanadians in The 21st Century. The ECCLES Centre for American Studies.http://bl.uk/ ecclescentre 2009

  • Waren, P., (2007).”Lack of concern over growing cybercrime angers UK Businesses”, The Guardian, Thursday July 19. 2007. Available at: www.guardian.co.uk/technology/2007/jul/19/crime.gurdianweeklytechnologysection

  • Williams, K.S., (2008). “Using Title’s Control Balance Theory to understand computer crime and deviance”, International Review of Law Computers & Technology. 22(1), pp. 145–155.

    Article  Google Scholar 

  • Willison, R., (2006). Understanding the offender/environment dynamic for computer crimes. Information technology and people, 19 (2), pp. 170–186.

    Article  Google Scholar 

  • Willison, R., (2006). Understanding the perpetration of employee computer crime in the organizational context.http://ir.lib.cbs.dk/downloaded/ISBN/x656517364.pdf [Accessed March

  • 2011]

    Google Scholar 

  • Yar, M. (2006). Cybercrime And Society. Sage Publication Ltd. London

    Google Scholar 

  • Yar, M (2005). The Novelty of “Cybercrime”: An Assessment in Light of Routine Activity Theory. European Journal of Criminology 2005; 2; 407

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this chapter

Cite this chapter

Jahankhani, H., Al-Nemrat, A. (2011). Cybercrime Profiling and Trend Analysis. In: Akhgar, B., Yates, S. (eds) Intelligence Management. Advanced Information and Knowledge Processing. Springer, London. https://doi.org/10.1007/978-1-4471-2140-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2140-4_12

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2139-8

  • Online ISBN: 978-1-4471-2140-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics