|
|
|
|
LEADER |
00000cam a2200000 4500 |
001 |
87141077X |
003 |
DE-627 |
005 |
20210222151130.0 |
007 |
tu |
008 |
161029s2016 ne ||||| m 00| ||eng c |
020 |
|
|
|a 9462367086
|9 94-6236-708-6
|
020 |
|
|
|a 9789462367081
|9 978-94-6236-708-1
|
035 |
|
|
|a (DE-627)87141077X
|
035 |
|
|
|a (DE-599)BSZ47858007X
|
035 |
|
|
|a (OCoLC)962108695
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-NL
|
050 |
|
0 |
|a HV6773
|
082 |
0 |
|
|a 364.16/8
|2 23
|
084 |
|
|
|a 2,1
|a 2
|2 ssgn
|
084 |
|
|
|a 86.41
|2 bkl
|
100 |
1 |
|
|a Leukfeldt, E. R.
|d 1982-
|e VerfasserIn
|0 (DE-588)142549843
|0 (DE-627)63674664X
|0 (DE-576)326932488
|4 aut
|
109 |
|
|
|a Leukfeldt, E. R. 1982-
|a Leukfeldt, Rutger 1982-
|a Leukfeldt, E. Rutger 1982-
|a Leukfeldt, Eric Rutger 1982-
|
245 |
1 |
0 |
|a Cybercriminal networks
|b origin, growth and criminal capabilities
|c E.R. Leukfeldt
|
264 |
|
1 |
|a The Hague, The Netherlands
|b Eleven International Publishing
|c [2016]
|
300 |
|
|
|a 230 pages
|b Diagramme
|c 24 cm
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
502 |
|
|
|b Dissertation
|c Rijksuniversiteit Groningen
|d 2016
|
520 |
|
|
|a This book is about cybercriminal networks that make use of digital means, such as phishing, malware or hacking, to steal money from customers of financial institutions. The author analyzes the processes of origin and growthand criminal capabilities, and puts forward several explanations for the differences found between traditional criminal networks and cybercriminal networks.His most important findings are that although the majority of these cybercriminal networks still rely on real-world social ties for their origin and growth, some networks make full use of the advantages that digitization provides. As a new kind of offender convergence setting, forums provide a fluid form of cooperation, making dependency relationships seen in traditional criminal networks less important. Furthermore, examples were found of prolonged, repeated interaction through online communities, which raises the question to what extent digital social ties differ from their real-world counterparts.This study forms an important evidence-based contribution to the criminological knowledge about cybercriminal networks. Furthermore, based on the empirical results, the author outlines possibilities for situational crime prevention against cybercriminal networks. This book will therefore be of interest both to academics and practitioners in the field of cybercrime and cyber security
|
546 |
|
|
|a Zusammenfassung auf Englisch und Niederländisch
|
650 |
|
0 |
|a Computer crimes
|
650 |
|
0 |
|a Phishing
|
650 |
|
0 |
|a Malware (Computer software)
|
650 |
|
0 |
|a Hacking
|
655 |
|
7 |
|a Hochschulschrift
|0 (DE-588)4113937-9
|0 (DE-627)105825778
|0 (DE-576)209480580
|2 gnd-content
|
689 |
0 |
0 |
|d s
|0 (DE-588)7864395-8
|0 (DE-627)700634487
|0 (DE-576)363213635
|a Internetkriminalität
|2 gnd
|
689 |
0 |
1 |
|d s
|0 (DE-588)4171529-9
|0 (DE-627)105394157
|0 (DE-576)20993753X
|a Netzwerk
|2 gnd
|
689 |
0 |
2 |
|d s
|0 (DE-588)4066464-8
|0 (DE-627)106113437
|0 (DE-576)209164719
|a Wirtschaftskriminalität
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
776 |
1 |
|
|z 9789462746138
|
856 |
4 |
2 |
|u http://www.gbv.de/dms/spk/sbb/toc/87141077X.pdf
|m V:DE-601
|m B:DE-1
|q application/pdf
|v 2017-03-30
|x Verlag
|y Inhaltsverzeichnis
|3 Inhaltsverzeichnis
|
936 |
b |
k |
|a 86.41
|j Kriminologie
|0 (DE-627)181572001
|
951 |
|
|
|a BO
|
ELC |
|
|
|b 1
|
ORI |
|
|
|a SA-MARC-krimdok_oa001.raw
|