23
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Article: not found

          Online frauds: Learning from victims why they fall for these scams

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Cyberstalking versus off-line stalking in a forensic sample

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks

                Bookmark

                Author and article information

                Journal
                15 November 2018
                Article
                10.1093/oxfordhb/9780198812746.013.35
                1811.06624
                957e5846-4956-4f5c-8ceb-7ce0479ab90a

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                The Oxford Handbook of Cyberpsychology, 2018
                cs.CR cs.CY cs.HC

                Applied computer science,Security & Cryptology,Human-computer-interaction
                Applied computer science, Security & Cryptology, Human-computer-interaction

                Comments

                Comment on this article