2011
DOI: 10.1108/09685221111143051
|View full text |Cite
|
Sign up to set email alerts
|

The landscape of cybercrime in Greece

Abstract: Purpose -Cybercrime is a serious threat for most modern societies as it hinders the necessary adoption of information and communication technologies (ICT). This paper seeks to analyze a large number of real cases related to the cybercrime in Greece. Design/methodology/approach -All cases were voluntarily submitted from Greek users, who asked for assistance to a special task force, composed of public sector employees and servants. By analyzing more than 1,000 similar cases, the paper derives a taxonomy of secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
31
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(31 citation statements)
references
References 11 publications
0
31
0
Order By: Relevance
“…The previous research on the topic of digital shadow economy is mostly limited with the studies in cybercriminal activities, such as breaking into online banking systems or decryption of PIN codes (Yip, et al, 2012;Holz, et al, 2012), forms of e-fraud (Thomas & Martin, 2006;Yip et al, 2012;Mello, 2013;Vlachos, Minou, Assimakopouos, & Toska, 2011;Amasiatu & Shah, 2014;Zorz, 2015 and others) and the motives of the consumers to get involved in digital piracy (Williams, Nicholas, & Rowlands, 2010;Sirkeci & Magnusdottir, 2011;Camarero, Anton, & Rodriguez, 2014;Amasiatu & Shah, 2014;Vida, Koklic, Kukar-Kinney, & Penz, 2012;Taylor, 2012;Arli, Tjiptono, & Porto, 2015;Yu, Young, & Ju, 2015 and others). However, the scientific literature still lacks of the complex studies in the field of digital shadow economy, which determined the aim of this research -to systematize the scientific literature on digital shadow economy and perform the critical analysis of the researched phenomenon.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The previous research on the topic of digital shadow economy is mostly limited with the studies in cybercriminal activities, such as breaking into online banking systems or decryption of PIN codes (Yip, et al, 2012;Holz, et al, 2012), forms of e-fraud (Thomas & Martin, 2006;Yip et al, 2012;Mello, 2013;Vlachos, Minou, Assimakopouos, & Toska, 2011;Amasiatu & Shah, 2014;Zorz, 2015 and others) and the motives of the consumers to get involved in digital piracy (Williams, Nicholas, & Rowlands, 2010;Sirkeci & Magnusdottir, 2011;Camarero, Anton, & Rodriguez, 2014;Amasiatu & Shah, 2014;Vida, Koklic, Kukar-Kinney, & Penz, 2012;Taylor, 2012;Arli, Tjiptono, & Porto, 2015;Yu, Young, & Ju, 2015 and others). However, the scientific literature still lacks of the complex studies in the field of digital shadow economy, which determined the aim of this research -to systematize the scientific literature on digital shadow economy and perform the critical analysis of the researched phenomenon.…”
mentioning
confidence: 99%
“…Analysing the landscape of cybercrime in Greece, Vlachos et al (2011) introduced such cybercrime forms as financial frauds (frauds that have financial incentives, from simplistic phishing attacks to pump "n" dump and money mule schemes), children issues (any case of children abuse, including children pornography or paedophilia), spams (unsolicited bulk e-mail that affects the performance of internet users and is related to fraudulent merchandise), breaches of privacy and personal data (all the incidents that are related to privacy issues and personal data, which were intercepted or obtained by electronic devices), technological advanced activities (including utilization of botnets, targeted attacks or custom malware), online games (serving for the stealing of accounts, illegal transfers of virtual money and virtual goods) and technical issues (deliberately caused technical problems related directly to computer or system security). Yip et al (2012) analysed online social networks, better known as carding forums (Holt & Lampke, 2010;Poulsen, 2011).…”
mentioning
confidence: 99%
“…Also, cybercrimes are referred to as offences committed by exploiting networked technology in order to carry out complex and far-reaching tasks that can be repeated countless times globally (Yip et al 2012), robust underground economies that are industrialized by making and delivering the tools for criminal behaviour (Mello 2013) or technologically advanced criminal activities that cause serious threats for consumers, organizations and enterprises as well as for the public sector (e.g. utilization of bonnets, targeted attacks or custom malware) (Vlachos et al 2011). Amasiatu and Shah (2014) invoke the term "faceless crimes", which is explained as fraudulent activities performed engaging IT and the Internet network for illegal business conduct, basically in retail industry.…”
Section: Concepts Features and Channels Of Digital Shadow Economy: Tmentioning
confidence: 99%
“…Having analysed the topic of e-fraud, Amasiatu and Shah (2014) note that in first party (consumer's) fraud, the trust is breached when a consumer reneges on the contract agreement. According to Vlachos et al (2011), most of e-fraud cases are related to fraudulent transactions, as the users are seeking to purchase consumer goods (expensive clothes, computer and electronics equipment, music and entertainment devices) at discount prices.…”
Section: Concepts Features and Channels Of Digital Shadow Economy: Tmentioning
confidence: 99%
See 1 more Smart Citation