Abstract
The idea of Cybercrime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cybercrime. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms “Cybercrime” and “crimeware”. We then divide Cybercrime into two distinct categories: Type I Cybercrime, which is mostly technological in nature, and Type II Cybercrime, which has a more pronounced human element. We then use two case studies to illustrate the role of crimeware in different types of Cybercrime, and offer some observations on the role of cognition in the process of Cybercrime. Finally we provide several suggestions for future work in the area of Cybercrime.
Similar content being viewed by others
References
Bocij P. (2005) Reactive stalking: a new perspective on victimisation. Br J Forensic Pract 7(1): 1–5
Chawki, M.: Cybercrime in France: an overview. Computer Crime Research Center. December, 2005. Downloaded January 23rd 2006 from: http://www.crime-research.org/articles/cybercrime-in-france-overview/ (2005)
Davis E., Wright H., Tremaine C.: Beyond phishing: pharming and crimeware attacks. Downloaded Jan 23rd 2006 from: http://www.privsecblog.com/archives/phishingpharming-53-beyond-phishing-pharming-and-crimeware-attacks-.html (2005)
DOJ: Cyberstalking: a new challenge for law enforcement and industry" a report from the Attorney General to the Vice President (August 1999) Downloaded January 23rd 2006 from http://www.usdoj.gov/criminal/cybercrime/cyberstalking.htm. (1999)
DOJ: H.R. 3402 Department of Justice Appropriations Authorization Act, fiscal years 2006 through 2009. Downloaded January 23rd from: http://www.gop.gov/Committeecentral/bills/hr3402.asp (2005)
Gordon, S.: Exploring spyware and adware risk assessment. Presentation to the Computers and Security Institute Conference, Phoenix, Arizona (2005)
Gordon S. Changing the way the World thinks about computer security. Ph.D. Thesis, University of Middlesex, Department of Computer Science. London, UK (2005)
Gordon S., Ford, R.: Cyberterrorism? In: Cybterterrorism. The International Library of Essays in Terrorism, Alan O’Day, Ashgate, ISBN 0 7546 2426 9 (2004)
Grodzinsky F.S., Tavani, H.T.: Some ethical reflections on cyberstalking. In: ACM SIGCAS Computers and Society, vol. 32 Issue 1 (2002)
Helpguide: Domestic violence and abuse: types, signs, symptoms, Causes, and Effects. A project of the Rotary Club of Santa Monica, California and the Center for Healthy Again. Downloaded January 23rd 2006 from: http://www.helpguide.org/mental/domestic_violence_abuse_types_signs_causes_effects.htm (2005)
Informit: Protecting yourself from internet crime. Part II. Downloaded Jan 23rd 2006 from: http://www.informit.com/ guides/content.asp?g=security&seqNum=144 (2005)
ISTR: Symantec internet security threat report. Trends for July 04- December 04, Vol VII (2005)
Krone T.: High tech crime brief. Australian Institute of Criminology, Canberra, Australia, ISSN 1832–3413 (2005)
Kshetri, N.: The simple economics of cybercrimes, security & privacy magazine. In: IEEE, vol. 4, Issue 1, pp. 33–39 (2006)
Kuhn T. (1992) The structure of scientific revolution 2nd ed. University of Chicago Press, Chicago Illinois
Parker D. (1998) Fighting computer crime: a new framework for protecting information ISBN 0471163783. Wiley, New York
PC Magazine: PC magazine encyclopedia. Downloaded Jan 23rd 2006 from: http://www.pcmag.com/encyclopedia_term/ 0,2542, t=crimeware&i=55434,00.asp (2005)
Studycrime: Online resource guide to law and crime. Downloaded Jan 23rd 2006 from: http://www.studycrime.com/Crime/Crimeware.php (2005)
United Nations: The united Nations manual on the prevention and control of computer related crime, 1995, supra note 41, paragraphs 20 to 73 in International Review of Criminal Policy, pp. 43–44 (1995)
Wikipedia: Common usage crimeware definition. Downloaded Jan 23rd 2006 from http://en.wikipedia.org/wiki/Crimeware (2006)
ZD: 2.8 Billion in E-commerce revenues lost to fraud in 2005. ZD Online., Downloaded Jan 23rd 2006 from: http://blogs.zdnet.com/ITFacts/?p=9471 (2005)
Zeviar-Geese: The state of the law on cyberjurisdiction and cybercrime on the internet.In: California Pacific School of Law, Gonzaga Journal of International Law, vol. 1 (1997–1998)
Zona M.A., Sharma K.K., Lane M.D. (1993) A comparative study of erotomanic and obsessional subjects in a forensic sample. J Forensic Sci 38, 894–903
Zona M.A., Palarea R.E., Lane J.C. (1998). Psychiatric diagnosis and the offender-victim typology of stalking. In Meloy, J.R. The Psychology of Stalking: Clinical and Forensic Perspectives. Academic, San Diego, California: (1998)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gordon, S., Ford, R. On the definition and classification of cybercrime. J Comput Virol 2, 13–20 (2006). https://doi.org/10.1007/s11416-006-0015-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-006-0015-z