Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This st...
Guardado en:
Autores principales: | , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Elsevier
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/5658aea0a0ee46c2b211a6ee5bdd32de |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:5658aea0a0ee46c2b211a6ee5bdd32de |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:5658aea0a0ee46c2b211a6ee5bdd32de2021-12-01T05:04:19ZHeterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements2451-958810.1016/j.chbr.2021.100113https://doaj.org/article/5658aea0a0ee46c2b211a6ee5bdd32de2021-08-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S2451958821000610https://doaj.org/toc/2451-9588Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally.Steve G.A. van de WeijerThomas J. HoltE. Rutger LeukfeldtElsevierarticleCybercrimeWeb defacementsHackingTrajectoriesZone-HElectronic computers. Computer scienceQA75.5-76.95PsychologyBF1-990ENComputers in Human Behavior Reports, Vol 4, Iss , Pp 100113- (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Cybercrime Web defacements Hacking Trajectories Zone-H Electronic computers. Computer science QA75.5-76.95 Psychology BF1-990 |
spellingShingle |
Cybercrime Web defacements Hacking Trajectories Zone-H Electronic computers. Computer science QA75.5-76.95 Psychology BF1-990 Steve G.A. van de Weijer Thomas J. Holt E. Rutger Leukfeldt Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
description |
Longitudinal criminological studies greatly improved our understanding of the longitudinal patterns of criminality. These studies, however, focused almost exclusively on traditional types of offending and it is therefore unclear whether results are generalizable to online types of offending. This study attempted to identify the developmental trajectories of active hackers who perform web defacements. The data for this study consisted of 2,745,311 attacks performed by 66,553 hackers and reported to Zone-H between January 2010 and March 2017. Semi-parametric group-based trajectory models were used to distinguish six different groups of hackers based on the timing and frequency of their defacements. The results demonstrated some common relationships to traditional types of crime, as a small population of defacers accounted for the majority of defacements against websites. Additionally, the methods and targeting practices of defacers differed based on the frequency with which they performed defacements generally. |
format |
article |
author |
Steve G.A. van de Weijer Thomas J. Holt E. Rutger Leukfeldt |
author_facet |
Steve G.A. van de Weijer Thomas J. Holt E. Rutger Leukfeldt |
author_sort |
Steve G.A. van de Weijer |
title |
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
title_short |
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
title_full |
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
title_fullStr |
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
title_full_unstemmed |
Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements |
title_sort |
heterogeneity in trajectories of cybercriminals: a longitudinal analyses of web defacements |
publisher |
Elsevier |
publishDate |
2021 |
url |
https://doaj.org/article/5658aea0a0ee46c2b211a6ee5bdd32de |
work_keys_str_mv |
AT stevegavandeweijer heterogeneityintrajectoriesofcybercriminalsalongitudinalanalysesofwebdefacements AT thomasjholt heterogeneityintrajectoriesofcybercriminalsalongitudinalanalysesofwebdefacements AT erutgerleukfeldt heterogeneityintrajectoriesofcybercriminalsalongitudinalanalysesofwebdefacements |
_version_ |
1718405541143773184 |