Figures & data
Figure 1. Flow diagram for the dynamics of cybercrime depicting how people transition between compartments as individuals experience cybercrime.
![Figure 1. Flow diagram for the dynamics of cybercrime depicting how people transition between compartments as individuals experience cybercrime.](/cms/asset/3175a21f-9291-4d02-ae1f-1bfb1f1c545e/oama_a_2295059_f0001_b.gif)
Figure 2. Plots of the steady-state proportion of the network that is victimised when the criminals are external to the network, i.e. with ψ = 0. Model parameters used: ,
,
,
, p = 0.75. In (a)
, in (b) α = 0.5.
![Figure 2. Plots of the steady-state proportion of the network that is victimised when the criminals are external to the network, i.e. with ψ = 0. Model parameters used: σ2=2, σ3=1, σ4y=σ4c=2, σ5=1, p = 0.75. In (a) σ1=0.5, in (b) α = 0.5.](/cms/asset/2912691e-fff3-4259-b6b6-9daa640113db/oama_a_2295059_f0002_b.gif)
Figure 3. Plots of the steady-state proportion of the network that is victimised when the criminals are internal to the network, i.e. with ψ = 1. The solid blue line is the value ye whilst the red crosses are given by which is the proportion of available population in the network that are victimised at steady state. Model parameters used:
,
,
,
, p = 0.75. In (a)
, in (b) α = 0.5.
![Figure 3. Plots of the steady-state proportion of the network that is victimised when the criminals are internal to the network, i.e. with ψ = 1. The solid blue line is the value ye whilst the red crosses are given by ye/(1−ψc) which is the proportion of available population in the network that are victimised at steady state. Model parameters used: σ2=2, σ3=1, σ4y=σ4c=2, σ5=1, p = 0.75. In (a) ce=0.01, in (b) α = 0.5.](/cms/asset/575a8669-77e0-49c7-b602-f2269c637304/oama_a_2295059_f0003_oc.jpg)