Cybercriminal networks in the UK and Beyond: Network structure, criminal cooperation and external interactions

This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on t...

Full description

Saved in:  
Bibliographic Details
Main Author: Lusthaus, Jonathan 1984- (Author)
Contributors: Kleemans, Edward R. 1967- ; Leukfeldt, E. R. 1982- ; Levi, Michael ; Holt, Thomas
Format: Electronic Article
Language:English
Published: 2024
In: Trends in organized crime
Year: 2024, Volume: 27, Issue: 3, Pages: 364-387
Online Access: Volltext (kostenfrei)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway

MARC

LEADER 00000caa a22000002c 4500
001 1904143458
003 DE-627
005 20250109085931.0
007 cr uuu---uuuuu
008 241002s2024 xx |||||o 00| ||eng c
024 7 |a 10.1007/s12117-022-09476-9  |2 doi 
035 |a (DE-627)1904143458 
035 |a (DE-599)KXP1904143458 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Lusthaus, Jonathan  |d 1984-  |e VerfasserIn  |0 (DE-588)1172209626  |0 (DE-627)1040976476  |0 (DE-576)514414448  |4 aut 
109 |a Lusthaus, Jonathan 1984- 
245 1 0 |a Cybercriminal networks in the UK and Beyond: Network structure, criminal cooperation and external interactions 
264 1 |c 2024 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This article examines the network structure, criminal cooperation, and external interactions of cybercriminal networks. Its contribution is empirical and inductive. The core of this study involved carrying out 10 case analyses on closed cybercrime investigations – all with financial motivations on the part of the offenders - in the UK and beyond. Each analysis involved investigator interview and access to unpublished law enforcement files. The comparison of these cases resulted in a wide range of findings on these cybercriminal networks, including: a common division between the scam/attack components and the money components; the presence of offline/local elements; a broad, and sometimes blurred, spectrum of cybercriminal behaviour and organisation. An overarching theme across the cases that we observe is that cybercriminal business models are relatively stable. 
700 1 |a Kleemans, Edward R.  |d 1967-  |e VerfasserIn  |0 (DE-588)1144379520  |0 (DE-627)1680943863  |0 (DE-576)495230502  |4 aut 
700 1 |a Leukfeldt, E. R.  |d 1982-  |e VerfasserIn  |0 (DE-588)142549843  |0 (DE-627)63674664X  |0 (DE-576)326932488  |4 aut 
700 1 |a Levi, Michael  |e VerfasserIn  |4 aut 
700 1 |a Holt, Thomas  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Trends in organized crime  |d Getzville, NY : HeinOnline, 1995  |g 27(2024), 3, Seite 364-387  |h Online-Ressource  |w (DE-627)32051806X  |w (DE-600)2014206-7  |w (DE-576)098304852  |x 1936-4830  |7 nnas 
773 1 8 |g volume:27  |g year:2024  |g number:3  |g pages:364-387 
856 |u https://link.springer.com/content/pdf/10.1007/s12117-022-09476-9.pdf  |x unpaywall  |z Vermutlich kostenfreier Zugang  |h publisher [open (via crossref license)] 
856 4 0 |u https://doi.org/10.1007/s12117-022-09476-9  |x Resolving-System  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4585898522 
LOK |0 003 DE-627 
LOK |0 004 1904143458 
LOK |0 005 20241002043605 
LOK |0 008 241002||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2024-10-01#43705DEC1B7DD8B5351523695B216785706F22DD 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw