Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44) (KAR id:54146)
|
PDF
Publisher pdf
Language: English |
|
|
Download this file (PDF/1MB) |
|
| Request a format suitable for use with assistive technology e.g. a screenreader | |
| Official URL: http://dx.doi.org/10.1109/MSP.2015.44 |
|
| Additional URLs: |
|
Abstract
A comprehensive model and taxonomy of cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 1 of this two-part series, which appeared in the January/February 2015 issue of IEEE Security & Privacy, explored cyberattackers and their motives in detail. Part 2 focuses on the other key stakeholders: defenders and victims of cybercrime.
| Item Type: | Article |
|---|---|
| DOI/Identification number: | 10.1109/MSP.2015.44 |
| Uncontrolled keywords: | Computer crime, Government, Ontologies, Taxnomy, Software development, Computer security,security, cybercrime, cybersecurity, cybercrime stakeholders, cybercrime defenders, cybercrime victims |
| Subjects: | Q Science > QA Mathematics (inc Computing science) |
| Institutional Unit: | Schools > School of Computing |
| Former Institutional Unit: |
Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
|
| Depositing User: | Budi Arief |
| Date Deposited: | 10 Feb 2016 17:55 UTC |
| Last Modified: | 20 May 2025 10:17 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/54146 (The current URI for this page, for reference purposes) |
- Link to SensusAccess
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0002-1830-1587
Altmetric
Altmetric