[PDF] Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit | Semantic Scholar Skip to search formSkip to main content> Semantic Scholar's Logo Search Sign InCreate Free Account You are currently offline. Some features of the site may not work correctly. DOI:10.1093/oxfordhb/9780198812746.013.35 Corpus ID: 53669814Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit @article{Nurse2018CybercrimeAY, title={Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit}, author={Jason R. C. Nurse}, journal={ArXiv}, year={2018}, volume={abs/1811.06624} } Jason R. C. Nurse Published 2018 Computer Science, Political Science ArXiv Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online… Expand View PDF on arXiv Save to Library Create Alert Cite Launch Research Feed Share This Paper 11 CitationsBackground Citations 9 Methods Citations 1 View All Figures, Tables, and Topics from this paper figure 1 table 1 Cybercrime Human factors and ergonomics Phishing Malware Social engineering (security) Cyberbullying Doxing Phone hacking Revenge porn Denial-of-service attack Internet troll Paper Mentions News Article Working from home risks online security and privacy: How to stay protected Tech Xplore 27 March 2020 News Article MIL-OSI Global: Working from home risks online security and privacy – how to stay protected Foreign Affairs New Zealand 26 March 2020 News Article Working from home risks online security and privacy – how to stay protected Yahoo! News 26 March 2020 News Article Working from home risks online security and privacy – how to stay protected Yahoo! News 26 March 2020 News Article Working from home risks online security and privacy – how to stay protected The Conversation 26 March 2020 News Article Working from home risks online security and privacy – how to stay protected Yahoo! Finance USA 26 March 2020 11 Citations Citation Type Citation Type All Types Cites Results Cites Methods Cites Background Has PDF Publication Type Author More Filters More Filters Filters Sort by Relevance Sort by Most Influenced Papers Sort by Citation Count Sort by Recency Cybersecurity Awareness Jason R. C. Nurse Computer Science ArXiv 2021 1 PDF Save Alert Research Feed The Social and Psychological Impact of Cyber-Attacks Maria Bada, Jason R. C. Nurse Psychology, Computer Science ArXiv 2019 PDF View 7 excerpts, cites background Save Alert Research Feed The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations Jason R. C. Nurse, Maria Bada Computer Science, Sociology ArXiv 2019 6 PDF View 2 excerpts, cites background and methods Save Alert Research Feed Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement Mariam Nouh, Jason R. C. Nurse, Helena Webb, M. Goldsmith Computer Science NDSS 2019 2019 6 PDF View 2 excerpts, cites background Save Alert Research Feed Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse Computer Science WISA 2019 6 PDF View 1 excerpt, cites background Save Alert Research Feed Cybercrime in Online Dating Site: Pornography Business in the Virtual World Rizki Briandana, Irmawati Oktavianingtyas, R. Marta Political Science 2020 View 2 excerpts, cites background Save Alert Research Feed The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes Jason R. C. Nurse, Louise Axon, Arnau Erola, Ioannis Agrafiotis, M. Goldsmith, S. Creese Business, Computer Science 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 2020 1 PDF View 1 excerpt, cites background Save Alert Research Feed An application of cyberpsychology in business email compromise Shadrack Awah Buo Business, Computer Science ArXiv 2020 PDF View 1 excerpt, cites background Save Alert Research Feed Developing cybersecurity education and awareness programmes for Small and medium-sized enterprises (SMEs) Maria Bada, Jason R. C. Nurse Business, Computer Science Inf. Comput. Secur. 2019 11 PDF Save Alert Research Feed (Smart)Watch Out! encouraging privacy-protective behavior through interactive games Meredydd Williams, Jason R. C. Nurse, S. Creese Psychology, Computer Science Int. J. Hum. Comput. Stud. 2019 1 PDF View 1 excerpt, cites background Save Alert Research Feed ... 1 2 ... References SHOWING 1-10 OF 83 REFERENCES SORT BYRelevance Most Influenced Papers Recency Cyberstalking, a New Crime: Evaluating the Effectiveness of Current State and Federal Laws Naomi Harlin Goodno Political Science 2006 34 View 1 excerpt, references background Save Alert Research Feed The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations Jason R. C. Nurse, Maria Bada Computer Science, Sociology ArXiv 2019 6 PDF View 1 excerpt, references background Save Alert Research Feed The Internet as a Conduit for Criminal Activity D. Wall Political Science 2015 59 View 2 excerpts, references background Save Alert Research Feed Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace D. Wall Political Science, Psychology 2007 104 PDF View 2 excerpts, references background Save Alert Research Feed Trustworthy and effective communication of cybersecurity risks: A review Jason R. C. Nurse, S. Creese, M. Goldsmith, K. Lamberts Computer Science 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) 2011 41 PDF View 3 excerpts, references background Save Alert Research Feed Baiting the hook: factors impacting susceptibility to phishing attacks Cristian Iuga, Jason R. C. Nurse, Arnau Erola Computer Science Human-centric Computing and Information Sciences 2016 47 PDF View 1 excerpt, references background Save Alert Research Feed On the definition and classification of cybercrime Sarah Gordon, R. Ford Computer Science Journal in Computer Virology 2006 151 PDF View 2 excerpts, references background Save Alert Research Feed The online dating romance scam: The psychological impact on victims – both financial and non-financial M. Whitty, T. Buchanan Psychology 2016 50 PDF View 1 excerpt, references background Save Alert Research Feed Cyberstalking versus off-line stalking in a forensic sample Cristina Cavezza, T. McEwan Psychology 2014 34 View 1 excerpt, references background Save Alert Research Feed Cyberbullying: another main type of bullying? Robert Slonje, P. Smith Psychology, Medicine Scandinavian journal of psychology 2008 1,325 View 1 excerpt, references background Save Alert Research Feed ... 1 2 3 4 5 ... Related Papers Abstract Figures, Tables, and Topics Paper Mentions 11 Citations 83 References Related Papers Stay Connected With Semantic Scholar Sign Up About Semantic Scholar Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI. Learn More → Resources DatasetsSupp.aiAPIOpen Corpus Organization About UsResearchPublishing PartnersData Partners   FAQContact Proudly built by AI2 with the help of our Collaborators Terms of Service•Privacy Policy The Allen Institute for AI By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License ACCEPT & CONTINUE