Show simple item record

dc.contributor.authorFurnell, SMen
dc.contributor.authorDowling, Sen
dc.date.accessioned2019-02-24T11:41:03Z
dc.date.issued2019-02-28en
dc.identifier.urihttp://hdl.handle.net/10026.1/13345
dc.description.abstract

This paper reviews current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem. A review and analysis of survey evidence is used to enable an understanding of the scope and scale of the cyber crime problem, and its effect upon those experiencing it. The analysis evidences that cyber crime exists in several dimensions, with costs and harms that can be similarly varied. There is also a sense that, moving forward, the 'cyber' label will become somewhat redundant as many crimes have the potential to have a technology component. The key evidence in this particular discussion has some geographic limitations, with much of the discussion focused upon data drawn from the the Crime Survey or England and Wales, as well as other UK-based sources. However, many of the broader points still remain more wider relevant. - A better understanding of the range and scale of cyber crime threats - Understanding of how the cyber element fits into the wider context of crime - Improving the appreciation of what cyber crime can mean for potential victims. - Recognition of the cost dimensions, and the implications for protection and response. The discussion will help businesses and individuals to have a better appreciation of the cyber crime threat, and what ought to be considered in response to it. The discussion is based upon recent evidence, and therefore represents a more up-to-date view of the cyber crime landscape than reviews already available in earlier literature.

en
dc.language.isoenen
dc.subjectInterneten
dc.subjectFrauden
dc.subjectHackingen
dc.subjectMalwareen
dc.subjectRansomwareen
dc.subjectCyber crimeen
dc.titleCyber crime: A portrait of the landscapeen
dc.typeJournal Article
plymouth.journalJournal of Criminological Research, Policy and Practiceen
dc.identifier.doi10.1108/JCRPP-07-2018-0021en
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/00 Groups by role
plymouth.organisational-group/Plymouth/00 Groups by role/Academics
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
dcterms.dateAccepted2018-11-26en
dc.rights.embargodate2019-03-16en
dc.rights.embargoperiodNot knownen
rioxxterms.versionAMen
rioxxterms.versionofrecord10.1108/JCRPP-07-2018-0021en
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.licenseref.startdate2019-02-28en
rioxxterms.typeJournal Article/Reviewen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
@mire NV