DocumentCode :
2748426
Title :
The Seven Scam Types: Mapping the Terrain of Cybercrime
Author :
Stabek, Amber ; Watters, Paul ; Layto, Robert
Author_Institution :
Internet Commerce Security Lab., Univ. of Ballarat, Ballarat, VIC, Australia
fYear :
2010
fDate :
19-20 July 2010
Firstpage :
41
Lastpage :
51
Abstract :
Threat of cyber crime is a growing danger to the economy. Industries and businesses are targeted by cyber-criminals along with members of the general public. Since cyber crime is often a symptom of more complex criminological regimes such as laundering, trafficking and terrorism, the true damage caused to society is unknown. Dissimilarities in reporting procedures and non-uniform cyber crime classifications lead international reporting bodies to produce incompatible results which cause difficulties in making valid comparisons. A cyber crime classification framework has been identified as necessary for the development of an inter-jurisdictional, transnational, and global approach to identify, intercept, and prosecute cyber-criminals. Outlined in this paper is a cyber crime classification framework which has been applied to the incidence of scams. Content analysis was performed on over 250 scam descriptions stemming from in excess of 35 scamming categories and over 80 static features derived. Using hierarchical cluster and discriminant function analysis, the sample was reduced from over 35 ambiguous categories into 7 scam types and the top four scamming functions - identified as scamming business processes, revealed. The results of this research bear significant ramifications to the current state of scam and cyber crime classification, research and analysis, as well as offer significant insight into the business processes and applications adopted by scammers and cyber-criminals.
Keywords :
computer crime; law; terrorism; business processes; content analysis; cybercrime terrain mapping; global approach; inter jurisdictional approach; laundering; scam types; terrorism; trafficking; transnational approach; Analytical models; Computer crime; Data models; Internet; Investments; Law enforcement; Agglomerative; business process; classification; cybercrime; cyberscam; divisive; framework; static feature;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second
Conference_Location :
Ballarat, VIC
Print_ISBN :
978-1-4244-8054-8
Electronic_ISBN :
978-0-7695-4186-0
Type :
conf
DOI :
10.1109/CTC.2010.14
Filename :
5615113
Link To Document :
بازگشت