Cybercriminal Networks
By

Rating

Product Description
Product Details

Table of Contents

1. Introduction; PART I: THEORY; 2. Cybercrime, social opportunity structures and routine activity theory; PART II: CYBERCRIMINAL NETWORKS; 3. Cybercrime and social ties; 4. Social ties versus digital ties within cybercriminal networks; 5. A taxonomy of cybercriminal networks; 6. Origin, growth and criminal capabilities of cybercriminal networks; 7. Money mules; PART III: SUITABLE TARGETS; 8. Suitable targets for phishing; 9. Suitable targets for phishing and malware compared; 10. An in-depth analysis of suitable targets; PART IV: CONCLUSION AND DISCUSSION; 11. Conclusion and discussion.

About the Author

Rutger Leukfeldt is postdoc researcher cybercrime at the Netherlands Institute for the study of Crime and Law Enforcement (NSCR). From 2007- 2016, he was a researcher of the Cyber Safety Research Group at the NHL University of Applied Sciences and the Dutch Police Academy. Rutger worked on a number of cybercrime studies for public and private organizations, including studies into the modus operandi and characteristics of cybercriminals and a nation-wide cybercrime victim survey.

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top