Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet6/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   2   3   4   5   6   7   8   9   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

1.1.3
 
Motivation 
Describing a typical cybercriminal stereotype and 
its motives is almost impossible, mostly because 
cybercrime agents act based on one or several 
motives. 
Some motives entail curiosity, fun, satisfaction
publicity, manipulation, destruction, revenge, ego 
gratification, hacktivism, nationalism, radicalism, 
religion, politics, and financial benefit. 
In fact, the SKRAM (Skills, Knowledge, 
Resources, Authority, Motivation) model [3] can 
calculate the threat potential of cybercriminals 
using their skills, knowledge, resources, authority
intensity of motives and countervailing information 
assurance linked on technological and human 
factors. 
The formula is (S*K*R*A*M) / IA where these 
factors have impact on the amount and time under 
certain circumstances of the cybercriminal‘s 
capabilities. 
2
 
CYBERATTACKS 
We base our study on previous research work 
(
Table 1
) from practitioners, scholars and industry 
experts. Arief et al. previously studied cybercrime 
on two different perspectives: Part 1 from the 
attacker‘s side [4] and Part 2 for defenders and 
victims
[5]. Chawki et al. [6] focused on 
cybercrime and its management issues. Cardwell et 
al. studied theft of intellectual property, damage of 
corporate networks, financial fraud, hacker system 
penetration and execution of viruses and worms. 
Britz [7] introduced traditional computer crime, 
contemporary computer crime, identity theft, 
identity fraud, cyberterrorism and technological 
organized crime. Mc Quade, III categorized 
cybercriminals based on the nature of their 
cybercrimes.
 
Table 1: Previous studies on cybercrime and cyberattacks 

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish