1. Introduction; PART I: THEORY; 2. Cybercrime, social opportunity structures and routine activity theory; PART II: CYBERCRIMINAL NETWORKS; 3. Cybercrime and social ties; 4. Social ties versus digital ties within cybercriminal networks; 5. A taxonomy of cybercriminal networks; 6. Origin, growth and criminal capabilities of cybercriminal networks; 7. Money mules; PART III: SUITABLE TARGETS; 8. Suitable targets for phishing; 9. Suitable targets for phishing and malware compared; 10. An in-depth analysis of suitable targets; PART IV: CONCLUSION AND DISCUSSION; 11. Conclusion and discussion.
Rutger Leukfeldt is postdoc researcher cybercrime at the Netherlands Institute for the study of Crime and Law Enforcement (NSCR). From 2007- 2016, he was a researcher of the Cyber Safety Research Group at the NHL University of Applied Sciences and the Dutch Police Academy. Rutger worked on a number of cybercrime studies for public and private organizations, including studies into the modus operandi and characteristics of cybercriminals and a nation-wide cybercrime victim survey.
Ask a Question About this Product More... |