740
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Storytelling for Tackling Organized Cybercrime

      proceedings-article
      , ,
      The 26th BCS Conference on Human Computer Interaction (HCI)
      Human Computer Interaction
      12 - 14 September 2012
      Organized cybercrime, narrative, attacker persona, intrigue sketch
      Bookmark

            Abstract

            Cybercrime is often organized, and the actual individuals that are perpetrating the different parts of the attack might not be aware of or interested in the overall organizational motives behind the attack. In this paper, based on interviews with IT security experts, we build on the attacker persona methodology and extend it with methodology to also handle organizational attacking motives in order to tackle organized cybercrime. The resulting framework extends the attacker persona methodology by also using narratives in order to assess the own organization’s security. These narratives give rise to intrigue sketches involving any number of attacker personas which, hence, make it possible to take organized cybercrime into account.

            Content

            Author and article information

            Contributors
            Conference
            September 2012
            September 2012
            : 1-4
            Affiliations
            [0001]Royal Institute of Technology

            SE-100 44 Stockholm, Sweden
            Article
            10.14236/ewic/HCI2012.67
            77954286-f88f-4e24-94e0-a6ba69ca25bc
            © Muhammad Adnan Tariq et al. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            The 26th BCS Conference on Human Computer Interaction
            HCI
            26
            Birmingham, UK
            12 - 14 September 2012
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2012.67
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Organized cybercrime,narrative,attacker persona,intrigue sketch

            Comments

            Comment on this article