Introducing and Exploring the Extremist Cybercrime Database (ECCD)

This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps i...

Full description

Saved in:  
Bibliographic Details
Authors: Holt, Thomas J. 1978- (Author) ; Chermak, Steven M. 1964- (Author) ; Freilich, Joshua D. (Author) ; Turner, Noah (Author) ; Greene-Colozzi, Emily (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Crime & delinquency
Year: 2023, Volume: 69, Issue: 12, Pages: 2411-2436
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1869155238
003 DE-627
005 20231215151822.0
007 cr uuu---uuuuu
008 231103s2023 xx |||||o 00| ||eng c
024 7 |a 10.1177/00111287221083899  |2 doi 
035 |a (DE-627)1869155238 
035 |a (DE-599)KXP1869155238 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Holt, Thomas J.  |d 1978-  |e VerfasserIn  |0 (DE-588)14391930X  |0 (DE-627)704643197  |0 (DE-576)167596403  |4 aut 
109 |a Holt, Thomas J. 1978-  |a Holt, Thomas Jeffrey 1978- 
245 1 0 |a Introducing and Exploring the Extremist Cybercrime Database (ECCD)  |c Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, Noah Turner, Emily Greene-Colozzi 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps in existing research and better inform policymakers. We describe our open source collection procedures, the type of information uncovered, and how we assessed their quality and reliability. We highlight our findings, compare these extremist cyber-crimes to extremist real world violence, and discuss their conceptual and policy implications. 
650 4 |a Cybercrime 
650 4 |a Cyberterrorism 
650 4 |a Extremism 
650 4 |a Hacking 
650 4 |a Terrorism 
700 1 |a Chermak, Steven M.  |d 1964-  |e VerfasserIn  |0 (DE-588)1127256297  |0 (DE-627)881706507  |0 (DE-576)171603303  |4 aut 
700 1 |a Freilich, Joshua D.  |e VerfasserIn  |0 (DE-588)1075831423  |0 (DE-627)833977083  |0 (DE-576)18457045X  |4 aut 
700 1 |a Turner, Noah  |e VerfasserIn  |0 (DE-588)131364580X  |0 (DE-627)1876224320  |4 aut 
700 1 |a Greene-Colozzi, Emily  |e VerfasserIn  |0 (DE-588)1313645869  |0 (DE-627)1876224517  |4 aut 
773 0 8 |i Enthalten in  |t Crime & delinquency  |d Thousand Oaks, Calif. [u.a.] : Sage Publications, 1960  |g 69(2023), 12, Seite 2411-2436  |h Online-Ressource  |w (DE-627)306655128  |w (DE-600)1499997-3  |w (DE-576)081985045  |x 1552-387X  |7 nnns 
773 1 8 |g volume:69  |g year:2023  |g number:12  |g pages:2411-2436 
856 4 0 |u https://doi.org/10.1177/00111287221083899  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
936 u w |d 69  |j 2023  |e 12  |h 2411-2436 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4401400402 
LOK |0 003 DE-627 
LOK |0 004 1869155238 
LOK |0 005 20231215151826 
LOK |0 008 231103||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krzo 
ORI |a WA-MARC-krimdoka001.raw