2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) 2019
DOI: 10.1109/eurospw.2019.00052
|View full text |Cite
|
Sign up to set email alerts
|

Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Moreover, they assert that cyber place management strategies based on implementing cybersecurity awareness training and a resilient incident response can be essential to reduce the probability of cybercrime victimization in an online domain. Similarly, many cybersecurity experts (e.g., Abawajy et al, 2008; Back et al, 2019; Dodge et al, 2007) conclude that cybersecurity awareness program is a capstone of the cybersecurity practices so that it enables individual online users to enhance their capabilities and alter their behaviors to effectively fight against cyber threats. To that end, human factors—cyber place management and online user’s behavior—still play an important role in developing cybersecurity counter-measures and protecting critical infrastructure and information from cyber adversaries.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, they assert that cyber place management strategies based on implementing cybersecurity awareness training and a resilient incident response can be essential to reduce the probability of cybercrime victimization in an online domain. Similarly, many cybersecurity experts (e.g., Abawajy et al, 2008; Back et al, 2019; Dodge et al, 2007) conclude that cybersecurity awareness program is a capstone of the cybersecurity practices so that it enables individual online users to enhance their capabilities and alter their behaviors to effectively fight against cyber threats. To that end, human factors—cyber place management and online user’s behavior—still play an important role in developing cybersecurity counter-measures and protecting critical infrastructure and information from cyber adversaries.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The type of data used to investigate cybercriminals is also crucial to understanding the nature of this research on this topic. We found that 22 (or, just over half of the) articles rely on new data, be it from surveys, interviews (with criminals and law enforcement), court records, case studies, underground markets or honeypots [3], [7], [8], [10], [11], [24], [29], [31]- [36], [43]- [45], [48], [49], [52], [57]- [59]. The other studies primarily use existing literature to form their arguments and often rely on research from other fields, or established approaches mapped to the cybercrime domain [2], [4], [5], [9], [12], [13], [15], [18], [21], [25], [27], [46], [50], [53]- [56].…”
Section: B Characteristics Of Articlesmentioning
confidence: 99%
“…As described: "....Determining and understanding why hackers do what they do". Overall, the definitions provided focused on different criminal profiling approaches such as inductive and deductive profiling [3], [4], [9], [11], [46], [48], [55], geographic profiling [8], and psychological profiling [46].…”
Section: Definitions Of Cybercriminal Profilingmentioning
confidence: 99%
See 2 more Smart Citations