Cyber Crime and Cyber Terrorism Investigator's Handbook 2014
DOI: 10.1016/b978-0-12-800743-3.00012-8
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrime classification and characteristics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0
3

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(32 citation statements)
references
References 2 publications
0
29
0
3
Order By: Relevance
“…These aspects might result in longer and recurring victimization, and might recidivate the consequences (Leukfeldt et al, 2018). For instance, with online harassment or bullying, the offence has no clear end, as opposed to offline harassment or bullying (Jahankhani et al, 2014;Nadim & Fladmoe, 2021). Online harassment may cause people to become more cautious about sharing their views openly, an obvious behavioral implication of this type of crime (Nadim & Fladmoe, 2021).…”
Section: Studies Considering Cybercrime From a Victim Perspectivementioning
confidence: 99%
See 1 more Smart Citation
“…These aspects might result in longer and recurring victimization, and might recidivate the consequences (Leukfeldt et al, 2018). For instance, with online harassment or bullying, the offence has no clear end, as opposed to offline harassment or bullying (Jahankhani et al, 2014;Nadim & Fladmoe, 2021). Online harassment may cause people to become more cautious about sharing their views openly, an obvious behavioral implication of this type of crime (Nadim & Fladmoe, 2021).…”
Section: Studies Considering Cybercrime From a Victim Perspectivementioning
confidence: 99%
“…Because of the online aspect, the offender is able to reach the victim at any time and from any place. This might result in the victim not feeling safe anywhere (Jahankhani et al, 2014;Jansen & Leukfeldt, 2018;. Additionally, the offender seems intangible, because he or she operates anonymous and from a distance.…”
Section: Studies Considering Cybercrime From a Victim Perspectivementioning
confidence: 99%
“…One common method is to get the victim to help, using a woman profile. In this example of fraud, the message states that the woman wants to meet the victim and that a certain amount of money must be sent in order for the woman to go to the victim's country (Jahankhani, Al-Nemrat, & Hosseinian-Far, 2014). In the method used in this fraud, the message that women are economically weak is conveyed to the other party.…”
Section: Internet Fraud (Cybercrime Fraud)mentioning
confidence: 99%
“…Wall, 2007), such efforts tend to evolve over time following the evolution of technology and how people use that technology. Jahankhani et al (2014) provide a typology of cybercrime that includes a category defined by “using a computer as the instrumentality of the crime (e.g. fraudulent use of automated teller machine (ATM) cards and accounts, credit card and telecommunication fraud).” The extant research does not consider a form of crime in this category − the emerging form of cybercrime tied to shoplifting using technology, such as mobile phones and store devices, used either by employees or customers.…”
Section: Theorymentioning
confidence: 99%