
- 239 pages
- English
- PDF
- Available on iOS & Android
About this book
Cybercriminal networks make use of digital means, such as phishing, malware, or hacking to steal money from customers of financial institutions. The author analyzes the processes of origin, growth, and criminal capabilities to put forward several explanations for the differences found between traditional criminal networks and cybercriminal networks. Although the majority of these cybercriminal networks still rely on real-world social ties for their origin and growth, some networks make full use of the advantages that digitization provides. As a new kind of offender convergence setting, forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts. This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Furthermore, based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security. Dissertation. [Subject: Criminology, Criminal Law, Cyber Security]
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title page
- Contents
- 1. Introduction
- PART I: THEORY
- PART II: CYBERCRIMINAL NETWORKS
- PART III: SUITABLE TARGETS
- PART IV: CONCLUSION ANDDISCUSSION
- SUMMARY
- Samenvatting
- References
- Appendix 1: Definitions
- Appendix 2: Analytical framework cybercriminal networks
- Appendix 3: Informed consent study into cybercriminal networks
- Acknowledgements
- Curriculum vitae
- Publications