Skip to main content

Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims

Arief, Budi, Bin Adzmi, Mohd Azeem (2015) Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims. IEEE Security & Privacy, 13 (2). pp. 84-88. ISSN 1540-7993. (doi:10.1109/MSP.2015.44) (KAR id:54146)

PDF Publisher pdf
Language: English
Download (1MB)
[thumbnail of UnderstandingCybercrime-Part2.pdf]
This file may not be suitable for users of assistive technology.
Request an accessible format
Official URL:
http://dx.doi.org/10.1109/MSP.2015.44

Abstract

A comprehensive model and taxonomy of cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 1 of this two-part series, which appeared in the January/February 2015 issue of IEEE Security & Privacy, explored cyberattackers and their motives in detail. Part 2 focuses on the other key stakeholders: defenders and victims of cybercrime.

Item Type: Article
DOI/Identification number: 10.1109/MSP.2015.44
Uncontrolled keywords: Computer crime, Government, Ontologies, Taxnomy, Software development, Computer security,security, cybercrime, cybersecurity, cybercrime stakeholders, cybercrime defenders, cybercrime victims
Subjects: Q Science > QA Mathematics (inc Computing science)
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: Budi Arief
Date Deposited: 10 Feb 2016 17:55 UTC
Last Modified: 10 Dec 2022 06:35 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/54146 (The current URI for this page, for reference purposes)
Arief, Budi: https://orcid.org/0000-0002-1830-1587
  • Depositors only (login required):

Downloads

Downloads per month over past year