Need help?

HS7020 Cyber Criminology Research Report Sample

HS7020 Cyber Criminology Research Report

Assignment Details

This assessment relates to the unit learning outcomes as in the Unit of Study Guide. This assessment is designed to give students skills to explore tactics, techniques and procedures cyber criminals use to evade detection and evidence.

In this individual research paper, you will explore a contemporary issue in the people, processes, and technology used in committing crimes as well as the investigation processes used by law enforcement. You will integrate academic research with practical real-world applications. This assignment will deepen your knowledge in the following areas:

• Assess and articulate the methodologies cybercriminals use to undertake and complete cyber and internet-enabled crimes

• The human, societal, environmental elements of cybercrime and global security threats and
preventative measures.

You will critically analyse your chosen issue, apply relevant methodologies to a real-world or hypothetical scenario, and propose preventative measures to address the challenges it presents.

1. Issue selection:

• What You’ll Do: Continuing from your class facilitation topic you will write a research paper which explores a cybercrime, and the criminal evasion techniques criminals use to avoid getting caught. You will also research how law enforcement tackles these issues along with other technologies that are available.

2. Research and practical application:

• What You’ll Do: Start by conducting a literature review on your chosen issue. Look for academic articles, industry reports, law enforcement and case studies that discuss the issue in depth. Then, apply the insights from your research to a practical scenario.

• You will need to find at least twenty (20) articles for your literature review.

We expect the following as a bare minimum:

• Article Link

• Year

• Brief Description

• Research objective

• Methodology

• Outcome researchers obtained

• Literature gaps or further research required.

3. Impact and Solution Analysis:

• What you will do: Analyse how the selected issue impacts law enforcement evasion. Discuss how the issue affects society and victims and other stakeholders. Then, propose solutions or methodologies that could address these challenges.

4. Documentation and Communication:

• What You’ll Do: Compile your findings, analysis, and proposed solutions into a well-organised research paper. Your paper should clearly articulate both the theoretical research and the practical application. Ensure your writing is accessible to both technical and non-technical audiences, using clear explanations and supporting your arguments with evidence from your research and application.

The report submission structure is as follows:

1. Cover Page

2. Executive Summary

3. Table of Contents

4. Introduction

5. Literature Review

6. Analysis of the Issue

7. Practical Application

8. Proposed Solutions

9. Conclusion

10. Recommendations

11. References

Solution

1. Introduction

Cybercrime and offline criminal behavior are interconnected. Unethical behavior sometimes triggers a criminal mindset in disgruntled individuals. Different sociological and psychological perspectives are analyzed throughout the study. All the elements that impact criminal acts, social engineering tactics, and social media victimization are also analyzed in this study. The purpose of the study is to understand factors that contribute to criminal tendencies. Identification of common triggers and understanding cyberspace help to comprehend criminology. The scope of the research includes understanding specific cybercrimes such as hacking, phishing, online fraud, and visual dissemination that occur because of the disgruntled human psyche. In the report, a comprehensive literature review of 20 different literature is done to understand the theoretical background and current research relevance. After that, an analysis of issues and practical applications is done.

2. Literature Review

Theoretical Background:

Cybercrime frameworks specifically focus on attackers and the technical aspects. In the current research, the primary focus is on understanding victimology by analyzing the human factors involved in cybercrime. Mandal (2024, p157(1)) integrated theories of victimology to present a comprehensive view of cybercrime. The article considered human motives and social engineering tactics. In contrast with Akdemir & Lawless (2020, p3(1)) “Lifestyle-Exposure Theory” and “Routine Activities theory” examine lifestyle choices and the daily routines of exposure to criminal opportunities. According to the view of Brewer et al (2020, p (3)), the theoretical framework surrounding adolescent cyber-deviance enhances the effect of digital environments on behavior.

Cybercrimes and offline criminal behavior disregard victims and create unethical harm. The expectancy-value theory of motivation influences the cybercriminal mindset to do unethical works (Martineau et al, 2023, P462 (3)). As per the research, intellectual challenges and curiosity are the major factors that influence hackers. Peer recognition among the hacker community is also a significant motivation factor. The researchers also analyze that money is the least factor in making a change in hackers' mindsets. Different hacker activities are triggered by self-transcendence and openness values.

Crimes directly target computers and computers play a significant role in crimes. Routine activity theory posits three elements converging in the vast array of suitable targets to reduce the perceived risk of offenders (Jaishankar, 2020, p4(2)). Social learning theory explains that criminals' behaviours are learned through interaction with others, and offenders copy techniques from peers that facilitate their spread of knowledge about committing cyber offences. Cybercrime includes malware attacks, phishing, and SQL to trafficking in financial crimes. Australian Cyber Security Centre (ACSC) measures cyber threats by understanding the necessity of national security and public safety.

Current Research:

The present studies, including Mandal (2024, p158(2)), propose novel victimology-based ontologies, and they focus on comprehensive classifications to integrate human and societal effects. This approach acknowledges gaps in the previous models to incorporate victim profiles and other responses. On the other hand, Akdemir & Lawless (2020, p (2)) present cybercrime aspects and reveal that exposure to online perpetrators, weak target protection and insufficient guardianship have increased victimization risk.

Figure 1: Cyber incident breakdown
(Source: Oaic, 2024)

Ways criminals obtain personally identifiable information: Criminals use scammers' emails as a trick to gather information. They also target victims via text messages and phone calls. Fake websites legitimate victims by providing information. With the use of the dark web, criminals scan and search email addresses, social security numbers, personal information and credit or debit card details to commit fraudulent activities. According to the diagram, human error breaches primarily stem from sending personal information to the wrong recipient (38%), unauthorized disclosures (24%), and failure to use BCC in emails (10%), highlighting the need for improved data handling practices (Oaic, 2024). Factors such as social engineering, disgruntled individuals, and increased use of social media develop the potential for cyber-enabled crimes including identity theft and online fraud. As per the view of Brewer et al (2020, 10 (2)), the present study highlights a rise in different forms of cyber-deviance among adolescents, with significant engagement in behaviours such as cyber-bullying and digital privacy for MBA assignment expert.

Data crime and network crime are different categories of cybercrimes. In cybercrime, various unethical procedures are present. In the diverse types of hacking, virus dissemination, logic bombs, phishing, web-jacking, denial-of-service attacks, identity threats, credit card fraud, and software piracy different crimes occur for unethical human motives (Goni et al, 2022, p27(1)). Social media, Social engineering, and online and offline behaviours create a significant gap between normal users and criminals. As per the article of legal aid (2024), identity offence victims can get a "Section 309A Certificate" as per the "Part 4AB of the Crimes Act 1900". As per the research of Cybermagazine (2023), identity-based attack techniques increased by 583%, and management and monitoring exploits increased by 312% in 2024.

The article Definitions and Perspectives on Cybercrime delves into defining cybercrime in various interpretations as a mere extension of traditional crime (AIC, 2024). Unique characteristics of distinct classifications categorise cybercrime into four types, cyber-trespass, cyber-deceptions, cyber-pornography, and cyber-violence. Cyber victimization and restorative justice also explore traditional crimes by shedding light on victimization and anonymity to emphasize the understanding of cybercrime's nature to address the legal framework of Australia (Robalo & Abdul Rahim, 2024, p7(2)). Current research on Social Engineering Attacks in Remote Work analyses the rise of social engineering attacks in remote environments which include link listing attacks and impersonators through Microsoft Teams.

Ways criminals are evading detection: The anonymity of the internet allows cybercriminals to operate anywhere in the globe that poses a significant threat. Criminals use malicious software that helps them to change their appearance each time it infects the system. Also, they use encryptions, and packers for antivirus programs to hide themself from detection. The use of AI and machine learning makes it difficult for the government to identify the location of the criminals. They use anomaly-based detection systems to distinguish between real users and malicious users (Sarker, 2023). The use of domain generation algorithms helps to create multiple domains in a short period based on which criminals are evading themself with DGSAs, and the government can not predict their activities.

Relevance to Business Information Systems:

Cyber victimology is a vital approach for businesses to develop effective cybersecurity measures. Incorporating victim perspectives is essential in crafting strategies to measure risks associated with social engineering, cyber threats, and fraud. In the study of Akdemir & Lawless (2020, p3(1)), businesses face heightened risks from cybercriminals exploiting system vulnerabilities and disgruntled insiders. Effective guardianship measures robust cybersecurity strategies that can measure these risks to protect sensitive data reducing exposure to threats. In contrast with Brewer et al. (2020, p12(3)), adolescent cyber-evidence is a vital factor for business information systems, specifically in developing a secure online platform. Insights into user behaviour and the associated risk factors can inform the design of systems that promote safe digital interactions from potential online harm.

In the technological era, the continuous threat of cyber security is increasing. Cyber (2022), describes the strategic competition and cybercrime reporting that create a threat picture among common people. Best cybercrime and defense systems are being built to cover all the concerned areas. Legal Aid (2024) describes the Commonwealth Victims' Certificate as can prepend the investigation time to solve the identity threat problem. Fbi (2024), says the issues can be mitigated by staying vigilant and multi-factor authentication implementation.

Online crimes have devastating effects on sensitive materials which leads to secondary victimization from societal judgment and inadequate police responses (Arp, 2024). The practice of cybersecurity protects remote workers from threats, Microsoft takes steps to mitigate risks and create awareness for the users to respond effectively to the attacks.

Identification of Knowledge Gaps:

The existing frameworks often overlook the human aspects of cybercrime, such as societal impacts and emotional factors. Mandal (2024, p158(3)) identifies a need for more holistic models that account for both individual and systematic victimization, to offer a more basic understanding of cybercrime dynamics. Though LRAT is widely applied to cybercrime, the relationship between digital factors and cybercrime victimization remains under-researched (Akdemir & Lawless 2020, p (2)). In a study of preset literature on specific adolescent behaviors in different digital contexts. There is a basic need for more targeted research on the unique risk factors to influence cyber-deviance, specifically concerning the effect of digital exposure on existing prevention strategies Brewer et al (2020, p12(2)).

The research can be improved by enhancing cybercrime frameworks in cybersecurity. Caution in internet presence and understanding clear terms can improve cybersecurity (Goni et al, 2022, p41(1)). In addition, cyber profiling and pragmatic applications can improve cyber profiling to control security and their working process (Martineau et al, 2023, p472(2)).

The research can explore cyberspace differently from traditional crimes to highlight offenders (Anomali, 2023). Also pointing out the connection between cybercrime and criminal activities can enhance the understanding of cyber threats with protective measures.

3. Analysis of the Issue

Description of the Issue

The rise of cybercrime significantly poses challenges for law enforcement agencies worldwide. The Rapidly evolving nature of the technology allows criminals to commit offences more anonymously (Provin & Pitt, 2024, p4(2)). Cybercriminals operate from different countries with the advantage of the internet’s anonymity. Jurisdictional challenges lead to frustration and ineffectiveness in addressing crimes widely across borders. Cybercriminals continuously innovate with advanced tactics such as social engineering, and phishing schemes. Rapid evolving techniques OutSpace law enforcement by making it difficult to prevent incidents effectively. The lack of necessary resources and expertise to manage cybercrimes effectively leads to inadequate responses to cyber incidents. Victims of cybercrimes hesitate to report incidents due to the fear of embarrassment that skews statistics and hampers the development of effective strategies for prevention (Shukhratovna, 2024, p5(2)). The traditional nature of cybercrime necessitates collaboration between law enforcement agencies and international organizations to establish partnerships to share intelligence. Lack of proactive measures and public education about cybersecurity enhances the risk of cyber-attacks.
Evasion of detection by law enforcement:

Law Enforcement Strategies for Detecting Cybercrime

Law enforcement agencies employ a range of strategies to combat cybercrime and detect evasion tactics. They utilize advanced cyber forensic tools to analyze data and trace activities despite anonymization techniques. Collaborative efforts with international agencies enhance information sharing and intelligence gathering. Key laws guiding these efforts include the Computer Fraud and Abuse Act (CFAA), Digital Millennium Copyright Act (DMCA), and Cybersecurity Information Sharing Act (CISA), which provide frameworks for prosecution and prevention. The Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized access to computer systems, enabling prosecution of hackers. The Digital Millennium Copyright Act (DMCA) protects digital content, allowing law enforcement to act against copyright infringement (Brewer et al, 2020, p12(4). The Cybersecurity Information Sharing Act (CISA) promotes sharing of cyber threat intelligence, enhancing collective defense against cybercrime. Cybercriminals often employ sophisticated techniques to set the detection by law enforcement. One of the primary methods is the base use of anonymizing tools such as virtual private Networks (VPNs) and Tor, that analyze their IP addresses and online activities, making tracing difficult (Mandal, 2024, p157 (3)). Moreover, they can utilize encryption to safeguard communications and the data service, complicating forensic investigations Goni et al, (2022, p 28 (2)). Cybercriminals also frequently operate from the core jurisdictions with lax laws or weak enforcement and shield themselves from other prosecution. The diverse nature of the internet allows these offenders to rapidly change some tactics and techniques, exploiting the slow pace of the legislative updates to justify the new cyber threats (Brewer et al, 2020, p10(3)). The Australian cybercrime survey highlights that a considerable number of the respondents around 78% use the internet multiple times, these details highlight the extensive online presence that criminals can navigate (Aic, 2024). This pervasive internet use complicates law enforcement efforts to make it more challenging to track offenders effectively.

Figure 2: Sources of data breaches
(Source: Oaic, 2024)

According to the diagram, Data breaches in the Australian Government stem mainly from social engineering and impersonation (42%), with significant delays in incident identification and notification (87% and 78%, respectively) (Oaic, 2024). TheatConnect’s TI Ops platform 7.7 develops security teams' efficiency in threat detection and core analysis. The key features such as developed search improve precision by signifying relevant matches and offer advanced filtering options (ThreatConnect, 2024). Cybercriminals exploit the vulnerabilities in various organizations such as "Medibank Private Limited and Australian Clinical Labs Limited" as highlighted around 38% of the data breaches are linked to cyber incidents, including ransomware (Oaic, 2024). The current breaches affect over 10 million Australians who must prioritize cybersecurity measures to safeguard personal details and comply with privacy regulations.

Technologies to Assist in Countering Cybercrime

â—Ź Digital forensics: This method involves preserving, collecting, and analyzing the electronic data to uncover the evidence of the cybercrime. Digital forensics experts recover the deleted files, analyze logs, and easily trace malicious activities back to their source, and it helps law enforcement build a case against all offenders (Goni et al., 2022, p28 (2)).

â—Ź Threat intelligence sharing: Collaboration between the organizations develops the ability to detect and respond to cyber threats. The data regarding emerging threats and vulnerabilities, entities can build a collective defense against cyber-criminal activities. This proactive strategy allows for quicker identification of patterns and potential attacks.

â—Ź Monitoring and Analyzing Network Traffic: Continuous monitoring of network traffic helps to identify unusual patterns that indicate a cyber-attack. With data packets and user behavior, security teams can detect breaches in real-time, allowing for immediate response and mitigation of damage (Aic, 2024).

â—Ź Machine Learning and AI: These technologies analyze vast amounts of data to identify anomalies and predict potential threats. Machine learning algorithms can adapt to new cybercriminals' tactics, develop the accuracy of threat detection, and improve overall cybersecurity measures (ThreatConnect, 2024).

â—Ź Undercover Operations: Undercover operations in cybersecurity involve law enforcement agents infiltrating cybercriminals networks to gather intelligence. As an example, authorities might pose as buyers of stolen data services to identify key players (cybersixgill, 2024). This method navigates proactive disruption of cybercrime activities, leading to arrests and prevention of future attacks.

4. Practical Application

Scenario Description:

A hypothetical scenario revolves around a large healthcare organization that faces a cyber-attack by a disgruntled ex-employee. The employee was fired over ethical violations at his workplace. The former staff opts for a phishing attack where he sends emails to the current employees with links that are threatening. Social engineering is done for some of the employees. With the help of fake emails from former employees, the employees are manipulated to open the links, thereby permitting the attacker into the hospital’s network.

In addition to the cyber-attacks, the disgruntled person tries to tamper with physical IT assets. They break into the organization’s premise posing as individuals with the intent of picking personal belongings. Along with that, he intends to compromise servers and interfere with crucial healthcare services. This particular situation describes the connected use of cybercrime together with offline criminal activities, which results in a complex threat that needs more sophisticated approaches to counter cybersecurity.

Application of Methodologies:

The healthcare organization has a multi-hazard approach that engages various methods to deal with this two-fold issue of cyber as well as offline criminal activities. The following strategies are put in place as measures to minimize the risks in the apprehension of the attacker.

Digital Forensics: Phishing attack source is traced and this brings digital forensics experts into the picture. They are then able to move along the email chain studying the headers, and metadata, and track the malicious activity of the former employee. As part of this investigation, one will have to look at the precise techniques that were employed to deliver the malware to potential targets (Wilson-Kovacs, 2021, p9(4)). This process also describes how deeply the organization was infiltrated and what kind of data could have been stolen.

Threat Intelligence Sharing: The healthcare organization is also involved in a wider cyber security network where it can exchange information with other hospitals, healthcare institutions, and the police. This partnership enables the organization to learn how other organizations responded to such attacks and at the same time, get updates on fresh threats in cyberspace (Saeed et al, 2023, p2(2)).

Undercover Operations: This tactic is used by attackers through social engineering. To deal with the challenge cybersecurity experts hire a new person in the IT department and interact with other employees. In this process trust based vulnerabilities, and knowledge gaps are analyzed. By social engineering manipulation, information on further attacks can be analyzed.

Monitoring and Analyzing Network Traffic: Real-time monitoring of abnormal patterns, unauthorized file transfers, and unusual login patterns helps to identify different IP addresses that can cause further damage.

Machine Learning and AI: Machine learning algorithms can help to analyze user behavior, and unusual activities from normal patterns and can cause future attacks (Sarkar, 2023, p1474(1)).

Outcome:

Application of the different methodologies can improve the overall situation while some challenges can be created. Enhanced threat protection, security protocol strengthening, and successful attribution can be achieved through all the processes. In the challenge complexity of social engineering, resource allocation, and evolving tactics are present. These challenges require continuous adaptation of security systems to maintain effectiveness.

5. Proposed Solutions

Solution Description: The organization needs to implement robust cybersecurity protocols to strengthen defense by recognizing phishing attempts and social engineering tactics. The utilization of advanced analytics and machine learning tools helps to identify unusual patterns of user behavior and network traffic. Proactive monitoring enables quicker detection of potential data breaches which allows for immediate response. Additionally, public awareness campaigns can engage the public by disseminating information to recognize phishing scams (Rangaraju & Dharmalingam, p4(1)). Development of legal framework to nuance cybercrime by facilitating quicker response to incidents and international cooperations across borders. The establishment of law enforcement units on cybercrime ensures officers are equipped to handle evolving threats.

Justification: Enhancement of cybersecurity measures indicates organizations have strong cybersecurity protocols to reduce vulnerabilities. Multi-Factor authentication equips employees to identify threats with potential resistance with frequent training and updates (parlinfo, 2020). Real-time monitoring and analytics detect anomalies and signals of cyber threats. Public awareness campaigns show informed users promote safe online practices to build resilience against attack. Collaboration among agencies such as law enforcement and the private sector is significant in combating cybercrime. The ability to collect digital evidence underscores forensic capabilities against cybercriminals. Fast-paced technological evolution updates the legal framework to encompass legislative processes for timely responses to emerging threats.

Implementation Plan:

â—Ź Assessment and planning

Key steps: Conduct comprehensive risk assessment helps to identify vulnerabilities by developing strategic plans about cybersecurity initiatives and organizational goals.

Resource required: Cybersecurity consultants, risk assessment tools, and stakeholder involvement (Abuabid & Aldeij, 2024, p4(1)).

Potential risk: Resistance to change

â—Ź Enhancing Cybersecurity Measures

Key steps: multifactor authentication and regular cybersecurity training enable software authentication and IT personal implementations which enhance the potential of risk identification.

Resource required: software authentication, training materials, and IT personnel

Potential risk: User resistance

6. Conclusion

Summary of Findings:

Cybercrime can trigger disgruntled humans for different reasons. Intellectual challenges, curiosity, and Peer recognition are some influencing factors that integrate unethical behaviors. To deal with the challenging situation, different methods can be applied to the existing system.
Investing in advanced monitoring tools can help in analyzing real-time threats to mitigate the risk of data breaches. Launch campaigns through social media and community outreach can educate the public about cyber safety. The connection between cybercrime and offline criminal behavior signifies disgruntled individuals are often motivated by factors such as curiosity and peer recognition.

Implications:

Effective cybersecurity protocols can properly mitigate the risks that are posed by disgruntled insiders and external threats. Organizations must focus on a culture of awareness and vigilance to ensure employees recognize potential cyber threats properly.

Future Research:

Future studies should focus on the psychological profiles of cybercriminals and explore how their motivations correlate with the specific cyber offense. Moreover, research on innovative detection methods and legal frameworks that will be vital to developing global cybercrime prevention efforts.

7. Recommendations

Actionable Steps:

Best Practices:

Adopting a multi-layered cybersecurity strategy is vital for organizations to effectively analyze cybercrime. Robust cybersecurity protocols should be implemented, including multifactor authentication and continuous employee training to enhance defenses against phishing and social engineering attacks (Kemp, 2023, p5(2)). A culture of awareness can be developed through public education campaigns, empowering individuals to recognize various activities. Collaboration with law enforcement will enable a collective response to emerging threats. Regular assessments of cybersecurity measures are necessary to ensure adaptability to the evolving tactics used by cybercriminals and to maintain public trust. 

References

1. Abuabid, A. & Aldeij, A., 2024. Cyber Security Incident Response: The Effectiveness of Open-Source Detection Tools in DLL Injection Detection. Journal of Information Security and Cybercrimes Research, 7(1), pp.29-50. https://journals.nauss.edu.sa/index.php/JISCR/article/download/2819/1350

2. AFP, 2024 Cybercrime Combatting a serious criminal threat to Australia and Australians Available at: https://www.afp.gov.au/crimes/cybercrime

3. Aic, 2024 Cybercrime in Australia 2023https://www.aic.gov.au/sites/default/files/2023-06/sr43_cybercrime_in_australia_2023.pdf [Accessed on: 20.9.2024]

4. Akdemir, N. & Lawless, C.J., 2020. Exploring the human factor in cyber-enabled and cyber-dependent crime victimization: A lifestyle routine activities approach. Internet Research, 30(6), pp.1665-1687. https://durham-repository.worktribe.com/preview/1299436/31118.pdf

5. Anomali, 2023 A Deep Dive into Different Types of Threat Intelligence Available at: https://www.anomali.com/blog/different-types-of-threat-intelligence [Accessed on: 20-09-2024]

6. as, 2023 Cybercrime in Australia 2023 Available at: https://www.aic.gov.au/publications/sr/sr43 [Accessed on: 20-09-2024]

7. Brewer, R., Whitten, T., Sayer, M. & Langos, C., 2020. Identifying risk factors associated with adolescent cyber-deviance in Australia: Implications for policy and practice. https://researchoutput.csu.edu.au/files/238032206/CYBER_CRC_REPORT_2020.pdf

8. Cyber, 2022. ASD's ACSC Annual Cyber Threat Report, July 2021 to June 2022. Available at:https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/acsc-annual-cyber-threat-report-july-2021-june-2022 [Accessed on: 20-09-2024]

9. Cybermagazine, 2023. Crowdstrike report reveals an increase in identity attacks. Available at:https://cybermagazine.com/articles/crowdstrike-report-reveals-increase-in-identity-attacks [Accessed on: 20-09-2024]

10. Cybersixgill, 2024 Personalization in Cyber Threat Intelligence: Cutting Through the Noise Available at: https://cybersixgill.com/news/articles/personalization-in-cyber-threat-intelligence-cutting-through-the-noise [Accessed on: 20.9.2024]

11. Fbi, 2024. FBI Warns of Increasing Threat of Cyber Criminals Utilizing Artificial Intelligence. Available at: https://www.fbi.gov/contact-us/field-offices/sanfrancisco/news/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence [Accessed on: 20-09-2024]

12. Goni, O., Ali, M. H., Alam, M. M., & Shameem, M. A. 2022. The basic concept of cybercrime. Journal of Technology Innovations and Energy, 1(2), 16-24. https://ijemt.com/wp-content/uploads/2023/01/GSV-August-04-IJEMT.pdf

13. Jaishankar, K., 2020. Cyber victimology: A new sub-discipline of the twenty-first century victimology. An international perspective on contemporary developments in victimology: A festschrift in honor of Marc Groenhuijsen, pp.3-19. https://www.researchgate.net/profile/Jaishankar-Karuppannan/publication/342542851_Cyber_Victimology_A_New_Sub-Discipline_of_the_Twenty-First_Century_Victimology/links/62aa5cef40d84c1401ad6eec/Cyber-Victimology-A-New-Sub-Discipline-of-the-Twenty-First-Century-Victimology.pdf

14. Kemp, S., 2023. Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers & Security, 127, p.103089. https://pdf.sciencedirectassets.com/271887/1-s2.0-S0167404823X00029/1-s2.0-S0167404822004813/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEDkaCXVzLWVhc3QtMSJHMEUCIAsb%2FMQzXEmDWjqhzyerH6CsHRtD%2Fika

x6CTCXcpK2NcAiEA5OB3ijzXaetmyH3vM0zGCtS9Hz7R7yXkzPyp9%2FntYFcqsgUIchAF

15. Legal aid, 2024. Victims of cybercrime. Available at: https://www.legalaid.nsw.gov.au/my-problem-is-about/cyber-safety/victims-of-cybercrime [Accessed on: 20-09-2024]

16. Mandal, S., 2024, March. Cybercrime Classification: A Victimology-based approach. In International Conference on Cyber Warfare and Security (Vol. 19, No. 1, pp. 156-167). https://papers.academic-conferences.org/index.php/iccws/article/download/2199/1939

17. Martineau, M., Spiridon, E., & Aiken, M. 2023. A comprehensive framework for cyber behavioral analysis based on a systematic review of cyber profiling literature. Forensic Sciences, 3(3), 452-477.https://www.mdpi.com/2673-6756/3/3/32/pdf

18. Microsoft, 2024 Threat actors misusing Quick Assist in social engineering attacks leading to ransomware Available at: https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/ [Accessed on: 20-09-2024]

19. Oaic, 2024 Notifiable Data Breaches Report: January to June 2024. Available at: https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-january-to-june- [Accessed on: 20.9.2024]

20. OMOTOSHO, O., AROYEHUN, A., OGUNWALE, Y., LALA, O. & ONAMADE, O., 2023. DESIGN AND IMPLEMENTATION OF MULTIFACTOR AUTHENTICATION IN CURBING AUTOMATED TELLER MACHINE CYBERCRIME. Information Technology, 2(2). https://www.researchgate.net/profile/Oluwadamilare-Omotosho/publication/378706827_DESIGN_AND_IMPLEMENTATION_OF_MULTIFACTOR_AUTHENTICATION

_IN_CURBING_AUTOMATED_TELLER_MACHINE_CYBERCRIME/links/65e5f76ac3b52a117015dd27/DESIGN-AND-IMPLEMENTATION-OF-MULTIFACTOR-AUTHENTICATION-IN-CURBING-AUTOMATED-TELLER-MACHINE-CYBERCRIME.pdf

21. park info, 2020 Cybercrime 2.0 Available at: https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id:%22library/prspub/BLZV6%22 [Accessed on: 20-09-2024]

22. Provin, T. L., & Pitt, J. L. (2024). Description of water analysis parameters. SCS-2002-10. https://oaktrust.library.tamu.edu/bitstream/handle/1969.1/202511/WaterAnalysisParameters.pdf?sequence=1

23. Rangaraju, S. & Dharmalingam, R., 2024. AI-based solutions for improving cybersecurity and its significance in defending evolving cyber threats in enterprises. Asian Journal of Multidisciplinary Research & Review, 5(1), pp.1-19. https://ajmrr.org/journal/article/download/177/152

24. Robalo, T.L.A. & Abdul Rahim, R.B.B., 2023. Cyber victimization, restorative justice, and victim-offender panels. Asian Journal of Criminology, 18(1), pp.61-74. https://link.springer.com/content/pdf/10.1007/s11417-023-09396-9.pdf

25. Saeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M. 2023. A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience. Sensors, 23(16), 7273.https://www.mdpi.com/1424-8220/23/16/7273/pdf

26. Sarker, I. H. (2023). Machine learning for intelligent data analysis and automation in cybersecurity: current and prospects. Annals of Data Science, 10(6), 1473-1498.https://link.springer.com/content/pdf/10.1007/s40745-022-00444-2.pdf

27. Shukhratovna, I.D., 2024. THE DESCRIPTION OF TRUTH AND ISSUES SHAKESPEARE'S HISTORIES. SUSTAINABILITY OF EDUCATION, SOCIO-ECONOMIC SCIENCE THEORY, 2(18), pp.41-44. https://interoncof.com/index.php/finland/article/download/1301/1229

28. ThreatConnect, 2024 ThreatConnect TI Ops Platform 7.7: Boost Your Security Team’s Efficiency. Available at: https://threatconnect.com/blog/threatconnect-ti-ops-platform-7-7-boost-your-security-teams-efficiency[Accessed on: 20.9.2024]

29. Wilson-Kovacs, D. 2021. Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales. Policing: An International Journal, 44(4), 669-682.https://ore.exeter.ac.uk/repository/bitstream/handle/10871/125904/Wilson-Kovacs%20March%202021%20DMI.pdf?sequence=4

 

Fill the form to continue reading

Still in Dilemma? See what our users have to say about our services.

student rating
Management

Essay: 10 Pages, Deadline: 2 days

They delivered my assignment early. They also respond promptly. This is excellent. Tutors answer my questions professionally and courteously. Good job. Thanks!

flag User ID: 9***95 United States

student rating
Accounting

Report: 10 Pages, Deadline: 4 days

After sleeping for only a few hours a day for the entire week, I was very weary and lacked the motivation to write anything or think about any suggestions for the writer to include in the paper. I am glad I chose your service and was pleasantly pleased by the quality. The paper is complete and ready for submission to the professor. Thanks!

flag User ID: 9***85 United States

student rating
Finance

Assignment: 8 Pages, Deadline: 3 days

I resorted to the MBA assignment Expert in the hopes that they would provide different outcomes after receiving unsatisfactory results from other assignment writing organizations, and they genuinely are fantastic! I received exactly what I was looking for from this writing service. I'm grateful.

flag User ID: 9***55

student rating
HR Rrecruiter

Assignment: 13 Pages, Deadline: 3 days

Incredible response! I could not believe I had received the completed assignment so far ahead of the deadline. Their expert team of writers effortlessly provided me with high-quality content. I only received an A because of their assistance. Thank you very much!

flag User ID: 6***15 United States

student rating
Management

Essay: 8 Pages, Deadline: 3 days

This expert work was very nice and clean.expert did the included more words which was very kind of them.Thank you for the service.

flag User ID: 9***95 United States

student rating
Thesis

Report: 15 Pages, Deadline: 5 days

Cheers on the excellent work, which involved asking questions to clarify anything they were unclear about and ensuring that any necessary adjustments were made promptly.

flag User ID: 9***95 United States

student rating
Economics

Essay: 9 Pages, Deadline: 5 days

To be really honest, I can't bear writing essays or coursework. I'm fortunate to work with a writer who has always produced flawless work. What a wonderful and accessible service. Satisfied!

flag User ID: 9***95

student rating
Taxation

Essay: 12 Pages, Deadline: 4 days

My essay submission to the university has never been so simple. As soon as I discovered this assignment helpline, however, everything improved. They offer assistance with all forms of academic assignments. The finest aspect is that there is also an option for escalation. We will get a solution on time.

flag User ID: 9***95 United States

student rating
Management

Essay: 15 Pages, Deadline: 3 days

This is my first experience with expert MBA assignment expert. They provide me with excellent service and complete my project within 48 hours before the deadline; I will attempt them again in the future.

flag User ID: 9***95 United States

GET A FREE ASSISTANCE

Still Finding MBA Assignment Help? You’ve Come To The Right Place!