Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/78507
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Sabillon, Regner | - |
dc.contributor.author | Cano M., Jeimy J. | - |
dc.contributor.author | cavaller, victor | - |
dc.contributor.author | Serra-Ruiz, Jordi | - |
dc.contributor.other | Universitat Oberta de Catalunya (UOC) | - |
dc.contributor.other | Universidad de los Andes | - |
dc.date.accessioned | 2018-05-18T10:02:01Z | - |
dc.date.available | 2018-05-18T10:02:01Z | - |
dc.date.issued | 2016-06 | - |
dc.identifier.citation | Sabillon, R., Cano, J., Cavaller Reyes, V. & Serra Ruiz, J. (2016). Cybercrime and Cybercriminals: A Comprehensive Study. International Journal of Computer Networks and Communications Security, 4(6), 165-176. | - |
dc.identifier.issn | 2410-0595MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/78507 | - |
dc.description.abstract | The increasing expansion and diversification in the strategies and practices of cybercrime has become a difficult obstacle in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions and agencies. The present study represents the most comprehensive review of the origin, typologies and developments of Cybercrime phenomenon over the past decade so far. By means of this detailed study, this paper tackles the issue first describing and discussing former different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is introduced and described. The proposal of a classification criterion is used in conjunction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets. | en |
dc.language.iso | eng | - |
dc.publisher | International Journal of Computer Networks and Communications Security | - |
dc.relation.ispartof | International Journal of Computer Networks and Communications Security, 2016, 4(6) | - |
dc.relation.uri | http://www.ijcncs.org/published/volume4/issue6/p1_4-6.pdf | - |
dc.rights | CC BY | - |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/es/ | - |
dc.subject | cybercrime | en |
dc.subject | cybercrime taxonomy | en |
dc.subject | network-level security and protection | en |
dc.subject | security and privacy protection | en |
dc.subject | abuse and crime involving computers | en |
dc.subject | delito informático | es |
dc.subject | delicte informàtic | ca |
dc.subject | taxonomía del delito informático | es |
dc.subject | taxonomia del delicte informàtic | ca |
dc.subject | seguridad y protección a nivel de red | es |
dc.subject | seguretat i protecció a nivell de xarxa | ca |
dc.subject | seguridad y protección de la privacidad | es |
dc.subject | seguretat i protecció de la privacitat | ca |
dc.subject | abuso y crimen con ordenadores | es |
dc.subject | abús i delicte amb ordinadors | ca |
dc.subject.lcsh | Computer crimes | en |
dc.title | Cybercrime and cybercriminals: A comprehensive study | - |
dc.type | info:eu-repo/semantics/article | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Delictes informàtics | ca |
dc.subject.lcshes | Delitos informáticos | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | - |
dc.gir.id | AR/0000004911 | - |
dc.type.version | info:eu-repo/semantics/publishedVersion | - |
Aparece en las colecciones: | Articles cientÍfics Articles |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
p1_4-6.pdf | 351,8 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons