Skip to main content
Erschienen in:
Buchtitelbild

2010 | OriginalPaper | Buchkapitel

1. The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

verfasst von : Dr. Nir Kshetri

Erschienen in: The Global Cybercrime Industry

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The meteoric rise in cybercrime has been an issue of pressing concern to our society. Cybercrime is global and organized. This chapter deals with definitional issues; analyses economic, social, and political impacts; and discusses methodological, conceptual, logical, and statistical problems in estimating the size of the cybercrime industry. The chapter also sheds light into different types of cybercrimes and relevant actors associated with the cybercrime industry.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Africa News. (2007, October 24). South Africa; Internet banking fraud on the increase. Africa News. (2007, October 24). South Africa; Internet banking fraud on the increase.
Zurück zum Zitat Andrews, L. (2009). Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) Section A (p. 5). Andrews, L. (2009). Online scams go unreported and unpunished. Cybercriminals beating the law Canberra Times (Australia) Section A (p. 5).
Zurück zum Zitat Antonopoulos, A. (2009). ATM hack: Organized crime or market forces? Network World. Southborough, 26(8), 20. Antonopoulos, A. (2009). ATM hack: Organized crime or market forces? Network World. Southborough, 26(8), 20.
Zurück zum Zitat Asner, M. A., & Kleyna, M. (2009). The new white house cyber czar. Computer & Internet Lawyer, 26(7), 1–4. Asner, M. A., & Kleyna, M. (2009). The new white house cyber czar. Computer & Internet Lawyer, 26(7), 1–4.
Zurück zum Zitat Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143. Bauerly, R. J. (2009). Online auction fraud and ebay. Marketing Management Journal, 19(1), 133–143.
Zurück zum Zitat Beatty, A. (2009, June 17). Agence France Presse – English. US cybersecurity chief warns of ‘market’ in malware. Beatty, A. (2009, June 17). Agence France Presse – English. US cybersecurity chief warns of ‘market’ in malware.
Zurück zum Zitat Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.CrossRef Becker, G. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76(2), 169–217.CrossRef
Zurück zum Zitat Bell, R.E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.CrossRef Bell, R.E. (2002). The prosecution of computer crime. Journal of Financial Crime, 9(4), 308–325.CrossRef
Zurück zum Zitat Benson, M., & Simpson, G. R. (2001, January 18). Privacy measure for US is backed by trade group. Wall Street Journal, B.6. Benson, M., & Simpson, G. R. (2001, January 18). Privacy measure for US is backed by trade group. Wall Street Journal, B.6.
Zurück zum Zitat Birmingham Post. (2007, September 16). Politics: Cybercrime victim every 10 seconds, 4. Birmingham Post. (2007, September 16). Politics: Cybercrime victim every 10 seconds, 4.
Zurück zum Zitat Blakely, R., & O’Neill, S. (2007, December 4). Cybercrime agency faces cuts as computer raid threats grow. The Times (London), 41. Blakely, R., & O’Neill, S. (2007, December 4). Cybercrime agency faces cuts as computer raid threats grow. The Times (London), 41.
Zurück zum Zitat Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News. Blitstein, R. (2007, November 14). Cybercops: US targets terrorists as online thieves run amok. San Jose Mercury News.
Zurück zum Zitat Britt, P. (2008). International Cybercrime Convention Gains Adherents around the World, Info Tech & Telecom News, The Heartland Institute. Britt, P. (2008). International Cybercrime Convention Gains Adherents around the World, Info Tech & Telecom News, The Heartland Institute.
Zurück zum Zitat Business Week. (2009). Microsoft Sues, 137, 9. Business Week. (2009). Microsoft Sues, 137, 9.
Zurück zum Zitat Carvajal, D. (2008, April 7). Cybercrime evolves as it grows. The International Herald Tribune, 10. Carvajal, D. (2008, April 7). Cybercrime evolves as it grows. The International Herald Tribune, 10.
Zurück zum Zitat Cetron, M. J., & Davies, O. (2009). Ten critical trends for cybersecurity. Futurist, 43(5), 40–49. Cetron, M. J., & Davies, O. (2009). Ten critical trends for cybersecurity. Futurist, 43(5), 40–49.
Zurück zum Zitat Cheney, J. S. (2005). Identity theft: Do definitions still matter? Federal Reserve Bank of Philadelphia, Payment Cards Center, Discussion paper, No. 05–10 August. Cheney, J. S. (2005). Identity theft: Do definitions still matter? Federal Reserve Bank of Philadelphia, Payment Cards Center, Discussion paper, No. 05–10 August.
Zurück zum Zitat Chertoff, M. (2009). The responsibility to contain: Protecting sovereignty under international law. Foreign Affairs, 88(1), 130–148. Chertoff, M. (2009). The responsibility to contain: Protecting sovereignty under international law. Foreign Affairs, 88(1), 130–148.
Zurück zum Zitat Christian Science Monitor. (2006, March 17). When the Law Chases the Internet, 98(77), 6. Christian Science Monitor. (2006, March 17). When the Law Chases the Internet, 98(77), 6.
Zurück zum Zitat Coates, J. F. (2002). What’s next? Foreseeable terrorist acts. The Futurist, 36(5), 23–26. Coates, J. F. (2002). What’s next? Foreseeable terrorist acts. The Futurist, 36(5), 23–26.
Zurück zum Zitat Consumer Reports. (2007). Winning at eBay: How to bid smart & play safe. 72(8), 12–14. Consumer Reports. (2007). Winning at eBay: How to bid smart & play safe. 72(8), 12–14.
Zurück zum Zitat Csikszentmihalyi, M. (1975). Beyond boredom and anxiety: The experience of play in work and games. San Francisco: Jossey-Bass, Inc. Csikszentmihalyi, M. (1975). Beyond boredom and anxiety: The experience of play in work and games. San Francisco: Jossey-Bass, Inc.
Zurück zum Zitat Davis, J. B. (2006). Cybercrime fighters. ABA Journal, 89, 36. Davis, J. B. (2006). Cybercrime fighters. ABA Journal, 89, 36.
Zurück zum Zitat Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum Press. Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum Press.
Zurück zum Zitat Economist.com. (2007). The mouse that roared; Cyberwarfare: Is cyberwarfare a serious threat? Economist.com. (2007). The mouse that roared; Cyberwarfare: Is cyberwarfare a serious threat?
Zurück zum Zitat Finkle, J. (2009, July 1). The Globe and Mail (Canada) Friend or cyber criminal? Cybercrime growing on Facebook, Reuters P. L3. Finkle, J. (2009, July 1). The Globe and Mail (Canada) Friend or cyber criminal? Cybercrime growing on Facebook, Reuters P. L3.
Zurück zum Zitat Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com. Fong, C. (2008, May 8). Fighting the agents of organized cybercrime. CNN.com.
Zurück zum Zitat Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92. Foreign Policy. (2005, March/April). Caught in the net: Australian teens, 92.
Zurück zum Zitat Frechette, J. (2005). Cyber-democracy or cyber-hegemony? Exploring the political and economic structures of the internet as an alternative source of information. Library Trends, 53(4), 555–575. Frechette, J. (2005). Cyber-democracy or cyber-hegemony? Exploring the political and economic structures of the internet as an alternative source of information. Library Trends, 53(4), 555–575.
Zurück zum Zitat Frey, B. (1997). Not just for the money: An economic theory of Brookfield. VT: Edward Elgar Publishing Company. Frey, B. (1997). Not just for the money: An economic theory of Brookfield. VT: Edward Elgar Publishing Company.
Zurück zum Zitat Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef Gabrys, E. (2002). The international dimensions of cyber-crime, Part 1. Information Systems Security, 11(4), 21–32.CrossRef
Zurück zum Zitat GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats. RPT-NUMBER: GAO-07-705. GAO Reports. (2007). Public and private entities face challenges in addressing cyber threats. RPT-NUMBER: GAO-07-705.
Zurück zum Zitat GAO Reports. (2009, June 17). Identity theft: Governments have acted to protect personally identifiable information, but vulnerabilities remain (preceding) (pp. 1–20). GAO Reports. (2009, June 17). Identity theft: Governments have acted to protect personally identifiable information, but vulnerabilities remain (preceding) (pp. 1–20).
Zurück zum Zitat Giannangeli, M. (2008). Are we ready for Russian Mafia’s crime revolution? Sunday Express, June 8, 2008, Scottish Edition, p. 3. Giannangeli, M. (2008). Are we ready for Russian Mafia’s crime revolution? Sunday Express, June 8, 2008, Scottish Edition, p. 3.
Zurück zum Zitat Glaser, D. (1971). Social deviance. Chicago, IL: Markham. Glaser, D. (1971). Social deviance. Chicago, IL: Markham.
Zurück zum Zitat Glenny, M. M. (2008). A journey through the global criminal underworld, Knopf. Glenny, M. M. (2008). A journey through the global criminal underworld, Knopf.
Zurück zum Zitat Goodwin, B. (2004, February 10). Victims must speak up to beat cybercrime. Computer Weekly, 18. Goodwin, B. (2004, February 10). Victims must speak up to beat cybercrime. Computer Weekly, 18.
Zurück zum Zitat Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2,13–20.CrossRef Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology, 2,13–20.CrossRef
Zurück zum Zitat Grant, I. (2009). Microsoft gives police training in IT forensics Computer Weekly, 6 pp. Grant, I. (2009). Microsoft gives police training in IT forensics Computer Weekly, 6 pp.
Zurück zum Zitat Greenberg, A. (2009). Cybercops without borders. Forbes, June 4. Greenberg, A. (2009). Cybercops without borders. Forbes, June 4.
Zurück zum Zitat Greenemeier, L. (2006, October 30). New from Cybercrooks: Fake chrome, pump-and-dump. InformationWeek, 1112, 26. Greenemeier, L. (2006, October 30). New from Cybercrooks: Fake chrome, pump-and-dump. InformationWeek, 1112, 26.
Zurück zum Zitat Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week. Grow, B., & Bush, J. (2005, May 30). Hacker hunters. Business Week.
Zurück zum Zitat Guillén, M. F., & Suárez, S. L. (2005). Explaining the global digital divide: Economic, political and sociological drivers of cross-national internet use. Social Forces, 84(2), 681–708.CrossRef Guillén, M. F., & Suárez, S. L. (2005). Explaining the global digital divide: Economic, political and sociological drivers of cross-national internet use. Social Forces, 84(2), 681–708.CrossRef
Zurück zum Zitat Hansen, B. (2002). Early hackers wanted to advance technology, not diminish it. CQ Weekly, 60(26). Hansen, B. (2002). Early hackers wanted to advance technology, not diminish it. CQ Weekly, 60(26).
Zurück zum Zitat Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29 (1), 20–24. Harler, C., & Fox, B. (1992). Network security communications news. Nokomis, 29 (1), 20–24.
Zurück zum Zitat Harvard Law Review. (2006, June). Note: Immunizing the internet, Or: How I learned to stop worrying and love the worm, 119, 2442. Harvard Law Review. (2006, June). Note: Immunizing the internet, Or: How I learned to stop worrying and love the worm, 119, 2442.
Zurück zum Zitat Havely, J. (2000, February 16). Online’s when states go to cyber-war. BBC News. Havely, J. (2000, February 16). Online’s when states go to cyber-war. BBC News.
Zurück zum Zitat Hirshleifer, J. (1998). The bioeconomic causes of war. Managerial and Decision Economics, 19(7/8), 457–466.CrossRef Hirshleifer, J. (1998). The bioeconomic causes of war. Managerial and Decision Economics, 19(7/8), 457–466.CrossRef
Zurück zum Zitat Ho, S. (2004, November/December). Haven for hackers. Foreign Policy. Ho, S. (2004, November/December). Haven for hackers. Foreign Policy.
Zurück zum Zitat Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12. Ismail, I. (2008, February 18). Understanding cybercriminals. New Straits Times (Malaysia), 12.
Zurück zum Zitat Iwata, E., & Martin, K. (2005). Crooks faking Web sites to bilk unwitting donors. USA Today. Iwata, E., & Martin, K. (2005). Crooks faking Web sites to bilk unwitting donors. USA Today.
Zurück zum Zitat Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629. Jones, B. R. (2007). Comment: Virtual neighborhood watch: Open source software and community policing against cybercrime. Journal of Criminal Law & Criminology, 97(2), 601–629.
Zurück zum Zitat Jones, M. (2006, September 15). Cybercrime becoming more organized. Baseline.com. Jones, M. (2006, September 15). Cybercrime becoming more organized. Baseline.com.
Zurück zum Zitat Joseph, L. C. (2007). Keeping Safe in Cyberspace. MultiMedia & Internet@Schools, 14(1), 17–20. Joseph, L. C. (2007). Keeping Safe in Cyberspace. MultiMedia & Internet@Schools, 14(1), 17–20.
Zurück zum Zitat Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.CrossRef Katyal, N. K. (2001). Criminal law in cyberspace. University of Pennsylvania Law Review, 149(4), 1003–1114.CrossRef
Zurück zum Zitat Keizer, G. (2006, January 25). Cybercrime feared 3 times more than physical crime. InformationWeek. Keizer, G. (2006, January 25). Cybercrime feared 3 times more than physical crime. InformationWeek.
Zurück zum Zitat Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.CrossRef Kshetri, N. (2005). Pattern of global cyber war and crime: A conceptual framework. Journal of International Management, 11(4), 541–562.CrossRef
Zurück zum Zitat Kshetri, N. (2006). The simple economics of cybercrimes. IEEE Security and Privacy, 4(1), 33–39.CrossRef Kshetri, N. (2006). The simple economics of cybercrimes. IEEE Security and Privacy, 4(1), 33–39.CrossRef
Zurück zum Zitat Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12). Kshetri, N. (2009). Positive externality, increasing returns and the rise in cybercrimes. Communications of the ACM, 52(12).
Zurück zum Zitat Lakhani, K. R., & Wolf, R. G. (2005). Why hackers do what they do: Understanding motivation and effort in free/open source software projects. In Feller, J., Fitzgerald, B., Hissam, S., & Lakhani, K. R. (Eds.), Perspectives on Free and Open Source Software. Cambridge, MA: MIT Press. Lakhani, K. R., & Wolf, R. G. (2005). Why hackers do what they do: Understanding motivation and effort in free/open source software projects. In Feller, J., Fitzgerald, B., Hissam, S., & Lakhani, K. R. (Eds.), Perspectives on Free and Open Source Software. Cambridge, MA: MIT Press.
Zurück zum Zitat Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34. Larkin, E. (2009). Organized crime moves into data theft. PC World, 27(7), 33–34.
Zurück zum Zitat Lee, J. K. (2000). The e-citizen, social education. Arlington, 64(6), 378–380. Lee, J. K. (2000). The e-citizen, social education. Arlington, 64(6), 378–380.
Zurück zum Zitat Lindenberg, S. (2001). Intrinsic motivation in a new light. Kyklos, 54(2/3), 317–342. Lindenberg, S. (2001). Intrinsic motivation in a new light. Kyklos, 54(2/3), 317–342.
Zurück zum Zitat Lunau, K. (2008). Burma sets its sights on online critics Maclean’s, 121(39), 51. Lunau, K. (2008). Burma sets its sights on online critics Maclean’s, 121(39), 51.
Zurück zum Zitat Madden, C. (2007). Firms trying to crack down on cyber-crime. The Irish Times, 14. Madden, C. (2007). Firms trying to crack down on cyber-crime. The Irish Times, 14.
Zurück zum Zitat M2 PressWIRE. (2008). BCS: BCS Launches Special Cybercrime ‘Think Tank’ ahead of London 2012. M2 PressWIRE. (2008). BCS: BCS Launches Special Cybercrime ‘Think Tank’ ahead of London 2012.
Zurück zum Zitat Michael, G. (2009). Adam Gadahn and Al-Qaeda’s internet strategy. Middle East Policy, 16(3), 135–152.CrossRef Michael, G. (2009). Adam Gadahn and Al-Qaeda’s internet strategy. Middle East Policy, 16(3), 135–152.CrossRef
Zurück zum Zitat Mitnick, K. D., & Simon, L. W. (2002). The art of deception: Controlling the human element of security. John Wiley & Sons, Inc. Mitnick, K. D., & Simon, L. W. (2002). The art of deception: Controlling the human element of security. John Wiley & Sons, Inc.
Zurück zum Zitat Naylor, R. T. (2005). The rise and fall of the underground economy. Brown Journal of World Affairs, Winter/Spring, 11(2), 131–143. Naylor, R. T. (2005). The rise and fall of the underground economy. Brown Journal of World Affairs, Winter/Spring, 11(2), 131–143.
Zurück zum Zitat Pappas, K. (2008). Back to basics to fight botnets. Communications News, 45(5), 12. Pappas, K. (2008). Back to basics to fight botnets. Communications News, 45(5), 12.
Zurück zum Zitat Parker, D. B. (1998). Fighting computer crime: A new framework for protecting information. New York: John Wiley & Sons, Inc. Parker, D. B. (1998). Fighting computer crime: A new framework for protecting information. New York: John Wiley & Sons, Inc.
Zurück zum Zitat Pike, G. H. (2006). Lost data: The legal challenges. Information Today, 23(10), 1–3. Pike, G. H. (2006). Lost data: The legal challenges. Information Today, 23(10), 1–3.
Zurück zum Zitat PR Newswire. (2008, February 21). New McAfee research shows regionalized malware rising; More attacks tailored to different cultures and technologies. PR Newswire. (2008, February 21). New McAfee research shows regionalized malware rising; More attacks tailored to different cultures and technologies.
Zurück zum Zitat Rasch, M. D. (1996). Criminal law and the internet, in the internet and business: A lawyer’s guide to the emerging legal issues. In J. F. Ruh, Jr. (ed.), Computer Law Ass’n 1996 (http://www.cla.org/RuhBook). Accessed 1 October 2007. Rasch, M. D. (1996). Criminal law and the internet, in the internet and business: A lawyer’s guide to the emerging legal issues. In J. F. Ruh, Jr. (ed.), Computer Law Ass’n 1996 (http://​www.​cla.​org/​RuhBook). Accessed 1 October 2007.
Zurück zum Zitat Rho, J. J. (2007). Blackbeards of the twenty-first century: Holding cybercriminals liable under the Alien tort statute. Chicago Journal of International Law, 7(2), 695–719. Rho, J. J. (2007). Blackbeards of the twenty-first century: Holding cybercriminals liable under the Alien tort statute. Chicago Journal of International Law, 7(2), 695–719.
Zurück zum Zitat Roberds, W., & Schreft, S. L. (2009). Data security, privacy, and identity theft: The economics behind the policy debates. Economic Perspectives, 33(1), 22–30. Roberds, W., & Schreft, S. L. (2009). Data security, privacy, and identity theft: The economics behind the policy debates. Economic Perspectives, 33(1), 22–30.
Zurück zum Zitat Robertson, J. (2007). China disputes report calling it a key cyber warfare instigator. Worldstream: Associated Press. Robertson, J. (2007). China disputes report calling it a key cyber warfare instigator. Worldstream: Associated Press.
Zurück zum Zitat Rodier, M. (2007). Thwarting Hackers; As hacking increases, experts say firms must use a blend of multifactor authentication, risk analysis and people to protect themselves. Wall Street & Technology, October 1, P. 17. Rodier, M. (2007). Thwarting Hackers; As hacking increases, experts say firms must use a blend of multifactor authentication, risk analysis and people to protect themselves. Wall Street & Technology, October 1, P. 17.
Zurück zum Zitat Roush, W. (2003). The internet reborn: The internet has transformed the way we find information, shop, and do business. But it is a dumb network built for a bygone age. A university-industry coalition is designing a vastly smarter and more secure Internet: PlanetLab, Technology Review, 1 October 2003. Roush, W. (2003). The internet reborn: The internet has transformed the way we find information, shop, and do business. But it is a dumb network built for a bygone age. A university-industry coalition is designing a vastly smarter and more secure Internet: PlanetLab, Technology Review, 1 October 2003.
Zurück zum Zitat Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.CrossRef Ryan, R. M., & Deci, E. L. (2000). Intrinsic and extrinsic motivations: Classic definitions and new directions. Contemporary Educational Psychology, 25(1), 54–67.CrossRef
Zurück zum Zitat Saroyan, S. (2005). Mean girls online The Internet has made almost everything easier, faster, and more intense-including bullying. Teen Vogue, 158–159. Saroyan, S. (2005). Mean girls online The Internet has made almost everything easier, faster, and more intense-including bullying. Teen Vogue, 158–159.
Zurück zum Zitat Schafer, S. (2006). A piracy culture; Beijing continues to defy US and European efforts to stop IP theft. Newsweek (International ed.). Schafer, S. (2006). A piracy culture; Beijing continues to defy US and European efforts to stop IP theft. Newsweek (International ed.).
Zurück zum Zitat Schreft, S. L. (2007). Risks of identity theft: Can the market protect the payment system? Economic Review, Federal Reserve Bank of Kansas City, Fourth Quarter, 5–40. Schreft, S. L. (2007). Risks of identity theft: Can the market protect the payment system? Economic Review, Federal Reserve Bank of Kansas City, Fourth Quarter, 5–40.
Zurück zum Zitat Shackelford, S. J. (2009). From nuclear war to net war: Analogizing cyber attacks in international law. Berkeley Journal of International Law, 27(1), 192–251. Shackelford, S. J. (2009). From nuclear war to net war: Analogizing cyber attacks in international law. Berkeley Journal of International Law, 27(1), 192–251.
Zurück zum Zitat Shapira, Z. (1976). Expectancy determinants of intrinsically motivated behavior. Journal of Personality and Social Psychology, 34, 1235–1244.CrossRef Shapira, Z. (1976). Expectancy determinants of intrinsically motivated behavior. Journal of Personality and Social Psychology, 34, 1235–1244.CrossRef
Zurück zum Zitat Smith, A. D. (2004). Cybercriminal impacts on online business and consumer confidence. Online Information Review, 28(3), 224–234.CrossRef Smith, A. D. (2004). Cybercriminal impacts on online business and consumer confidence. Online Information Review, 28(3), 224–234.CrossRef
Zurück zum Zitat Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472.CrossRef Snidal, D. (1994). The politics of scope: Endogenous actors, heterogeneity and institutions. Journal of Theoretical Politics, 6(4), 449–472.CrossRef
Zurück zum Zitat Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137.CrossRef Snidal, D. (1996). Political economy and international institutions. International Review of Law and Economics, 16(1), 121–137.CrossRef
Zurück zum Zitat Sutherland, B. (2008). The rise of black market data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24). Sutherland, B. (2008). The rise of black market data; Criminals who steal personal data often don’t exploit it. Instead, they put it up for sale on one of the many vibrant online markets. Newsweek (International ed.), 152(24).
Zurück zum Zitat Swartz, J. (2007). Chinese hackers seek US access; Attacks highlight weaknesses in Internet security, USA Today, March 12, P. 3B. Swartz, J. (2007). Chinese hackers seek US access; Attacks highlight weaknesses in Internet security, USA Today, March 12, P. 3B.
Zurück zum Zitat Swartz, J. (2008). Cybercriminals can’t get away with it like they used to USA Today. Swartz, J. (2008). Cybercriminals can’t get away with it like they used to USA Today.
Zurück zum Zitat Tedeschi, B. (2003, January 27). Crime is soaring in cyberspace, but many companies keep it quiet. New York Times, C.4. Tedeschi, B. (2003, January 27). Crime is soaring in cyberspace, but many companies keep it quiet. New York Times, C.4.
Zurück zum Zitat The Daily Yomiuri. (2007, February 23). (Tokyo) NPA: Cybercrime jumped 40% in 2006. Net fraud tops list, 1. The Daily Yomiuri. (2007, February 23). (Tokyo) NPA: Cybercrime jumped 40% in 2006. Net fraud tops list, 1.
Zurück zum Zitat The Economist. (1999). Crime without punishment: Special article. Russian Organized Crime, 352(134), 17–19. The Economist. (1999). Crime without punishment: Special article. Russian Organized Crime, 352(134), 17–19.
Zurück zum Zitat The Economist. (2008, December 8). Marching off to cyberwar. 389(8609), 20. The Economist. (2008, December 8). Marching off to cyberwar. 389(8609), 20.
Zurück zum Zitat The Economist. (2009). International: It may make life easier and cheaper. East Africa gets broadband. 391(8636), 46. The Economist. (2009). International: It may make life easier and cheaper. East Africa gets broadband. 391(8636), 46.
Zurück zum Zitat United States Government Accountability Office. (2007, June). GAO report to congressional requesters, cyber crime, public and private entities face challenges in addressing cyber threats. United States Government Accountability Office. (2007, June). GAO report to congressional requesters, cyber crime, public and private entities face challenges in addressing cyber threats.
Zurück zum Zitat US Fed News Service, Including US State News. (2005, May 20). Cracking down on cyber crime. Washington, DC. US Fed News Service, Including US State News. (2005, May 20). Cracking down on cyber crime. Washington, DC.
Zurück zum Zitat Vidalis, S., & Kazmi, Z. (2007). Security through deception. Information Systems Security, 16(1), 34–41.CrossRef Vidalis, S., & Kazmi, Z. (2007). Security through deception. Information Systems Security, 16(1), 34–41.CrossRef
Zurück zum Zitat Voigt, K. (2009, June 21). Dangerous Internet search terms grow with cybercrime. CNN.com. Voigt, K. (2009, June 21). Dangerous Internet search terms grow with cybercrime. CNN.com.
Zurück zum Zitat Wall, D. S. (1998). Catching cybercriminals: Policing the internet, international review of law. Computers & Technology, 12(2), 201–218. Wall, D. S. (1998). Catching cybercriminals: Policing the internet, international review of law. Computers & Technology, 12(2), 201–218.
Zurück zum Zitat Waltz, E. (1998). Information warfare. Norwood, MA: Artech House. Waltz, E. (1998). Information warfare. Norwood, MA: Artech House.
Zurück zum Zitat Werth, C. (2009). Software crackdown. Newsweek (International ed.), 154(5). Werth, C. (2009). Software crackdown. Newsweek (International ed.), 154(5).
Zurück zum Zitat Williams, P. (2001, August 13). Organized crime and cybercrime: Synergies, trends, and responses, Office of International Information Programs, US Department of State, http://usinfo.state.gov. Accessed 1 October 2002. Williams, P. (2001, August 13). Organized crime and cybercrime: Synergies, trends, and responses, Office of International Information Programs, US Department of State, http://​usinfo.​state.​gov. Accessed 1 October 2002.
Zurück zum Zitat Wiltenburg, M. (2008, April 22). McMAFIA: Coming soon to a location near you. Christian Science Monitor. Wiltenburg, M. (2008, April 22). McMAFIA: Coming soon to a location near you. Christian Science Monitor.
Zurück zum Zitat Wolf, J. (2000, August 9). Hacking of pentagon persists. Washington Post, A23. Wolf, J. (2000, August 9). Hacking of pentagon persists. Washington Post, A23.
Zurück zum Zitat Wolfe, D. (2008, January 2). Cybercrime. American Banker, 173(1), 5. Wolfe, D. (2008, January 2). Cybercrime. American Banker, 173(1), 5.
Zurück zum Zitat Wolfe, D., & Wade, W. (2008). Security Watch. American Banker, 173(237), 5. Wolfe, D., & Wade, W. (2008). Security Watch. American Banker, 173(237), 5.
Zurück zum Zitat Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1. Wylie, I. (2007, December 26). Internet; Romania home base for EBay scammers; The auction website has dispatched its own cyber-sleuth to help police crack fraud rings. Los Angeles Times, C.1.
Zurück zum Zitat Zeller, T., Jr. (2005, June 21). Black market in credit cards thrives on web. New York Times, A.1. Zeller, T., Jr. (2005, June 21). Black market in credit cards thrives on web. New York Times, A.1.
Zurück zum Zitat Zhou, L., Burgoon, J. K., Twitchell, D. P., Qin, T., & Nunamaker, J. F., Jr. (2004). A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20(4): 139–165. Zhou, L., Burgoon, J. K., Twitchell, D. P., Qin, T., & Nunamaker, J. F., Jr. (2004). A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20(4): 139–165.
Metadaten
Titel
The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures
verfasst von
Dr. Nir Kshetri
Copyright-Jahr
2010
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-11522-6_1