Introducing and Exploring the Extremist Cybercrime Database (ECCD)
This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps i...
Authors: | ; ; ; ; |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2023
|
In: |
Crime & delinquency
Year: 2023, Volume: 69, Issue: 12, Pages: 2411-2436 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002 4500 | ||
---|---|---|---|
001 | 1869155238 | ||
003 | DE-627 | ||
005 | 20231215151822.0 | ||
007 | cr uuu---uuuuu | ||
008 | 231103s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1177/00111287221083899 |2 doi | |
035 | |a (DE-627)1869155238 | ||
035 | |a (DE-599)KXP1869155238 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Holt, Thomas J. |d 1978- |e VerfasserIn |0 (DE-588)14391930X |0 (DE-627)704643197 |0 (DE-576)167596403 |4 aut | |
109 | |a Holt, Thomas J. 1978- |a Holt, Thomas Jeffrey 1978- | ||
245 | 1 | 0 | |a Introducing and Exploring the Extremist Cybercrime Database (ECCD) |c Thomas J. Holt, Steven M. Chermak, Joshua D. Freilich, Noah Turner, Emily Greene-Colozzi |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This study uses open source, public information to examine nation-state and non-nation-state ideologically motivated cyberattacks performed against US targets from 1998 to 2018. We created the Extremist Cyber Crime Database (ECCD) that includes scheme, offender and target codebooks to address gaps in existing research and better inform policymakers. We describe our open source collection procedures, the type of information uncovered, and how we assessed their quality and reliability. We highlight our findings, compare these extremist cyber-crimes to extremist real world violence, and discuss their conceptual and policy implications. | ||
650 | 4 | |a Cybercrime | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Extremism | |
650 | 4 | |a Hacking | |
650 | 4 | |a Terrorism | |
700 | 1 | |a Chermak, Steven M. |d 1964- |e VerfasserIn |0 (DE-588)1127256297 |0 (DE-627)881706507 |0 (DE-576)171603303 |4 aut | |
700 | 1 | |a Freilich, Joshua D. |e VerfasserIn |0 (DE-588)1075831423 |0 (DE-627)833977083 |0 (DE-576)18457045X |4 aut | |
700 | 1 | |a Turner, Noah |e VerfasserIn |0 (DE-588)131364580X |0 (DE-627)1876224320 |4 aut | |
700 | 1 | |a Greene-Colozzi, Emily |e VerfasserIn |0 (DE-588)1313645869 |0 (DE-627)1876224517 |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Crime & delinquency |d Thousand Oaks, Calif. [u.a.] : Sage Publications, 1960 |g 69(2023), 12, Seite 2411-2436 |h Online-Ressource |w (DE-627)306655128 |w (DE-600)1499997-3 |w (DE-576)081985045 |x 1552-387X |7 nnns |
773 | 1 | 8 | |g volume:69 |g year:2023 |g number:12 |g pages:2411-2436 |
856 | 4 | 0 | |u https://doi.org/10.1177/00111287221083899 |x Resolving-System |z lizenzpflichtig |3 Volltext |
936 | u | w | |d 69 |j 2023 |e 12 |h 2411-2436 |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4401400402 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1869155238 | ||
LOK | |0 005 20231215151826 | ||
LOK | |0 008 231103||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21-110 |c DE-627 |d DE-21-110 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-21-110 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a krzo | ||
ORI | |a WA-MARC-krimdoka001.raw |