2,589
Views
18
CrossRef citations to date
0
Altmetric
Articles

Proposed Methodology for Cyber Criminal Profiling

REFERENCES

  • Annual Report. (2012). Internet Crime Report. Internet Crime Complaint Center (IC3), p. 4.
  • Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science. Networkworld. Retrieved from http://www.networkworld.com/
  • Benny, D (2007). The uses of inductive and deductive reasoning in investigations and criminal profiling. BECCA Report, pp. 7–9.
  • Broucek, V., and Turner, P. (2006). Winning the battles, losing the war? Rethinking methodology for forensic computing research. Journal in Computer Virology, 3–12.
  • Donato, L. (2009). An introduction to how criminal profiling could be used as a support for computer hacking investigations. Journal of Digital Forensic Practice, 2, 183–195.
  • Drummond, D. (2010). A new approach to China. Google Blog. Retrieved from www. googleblog.blogspot.com
  • Jahankhani, H., and Al-Nemrat, A. (2010). Examination of cyber-criminal behavior. International Journal of Information Science and Management, 41–48.
  • Kirwan, G., and Power, A. (2011). The psychology of cyber crime, 1st edition. IGI Global.
  • Kwan, L., Ray, P., and Stephens, G. (2008). Towards a methodology for profiling cyber criminals. IEEE Computer Society. Proceedings of the 41st Hawaii International Conference on System Sciences, pp. 3–5.
  • Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., and Ignatuschtschenko, E. (2013). Comprehensive study on cybercrime. United Nations Office on Drugs and Crime, pp. 38–39
  • Nachreiner, C. (2013). Profiling modern hacktivists, criminals and cyber spies. Watchguard Security Center. Retrieved from www.watchguardsecuritycenter.com
  • Shinder, D. (2010). Profiling and categorizing cybercriminals. TechRepublic. Retrieved from www.techrepublic.com
  • Shinder, D., and Tittel, E. (2002.) Scene of the cybercrime – computer forensics handbook, 1st edition. Syngress Publishing.
  • Symantec. (n.d.). What is cybercrime? Symantec. Retrieved from www.us.norton.com
  • Tennakoon, H (2011). The need for a comprehensive methodology for profiling cyber-criminals. New Security Learning. Retrieved www.newsecuritylearning.com
  • Tompsett, B. C., Marshall, A. M., and Semmens, N. C. (2005). Cybrprofiling: Offender profiling and geographic profiling of crime on the Internet. Computer Network Forensics Research Workshop, p. 1.
  • Vidalis, S. and Jones, A. (2003). Using vulnerability trees for decision making in threat assessment. School of Computing Technical Report CS-03-2, School of Computing, University of Glamorgan, pp. 5–8.
  • Wheelbarger, S (2009). CyberForensics. Criminal justice collaboratory. Colby Community College. Retrieved from www.colbycriminaljustice.wikidot.com/cyberforensics

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.