{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2016-10-26T15:49:19.907555+00:00", "custom_fields": { "journal:journal": { "issue": "2", "pages": "147\u2013169", "title": "International Journal of Cyber Criminology", "volume": "10" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "Kigerlvol10issue2IJCC2016.pdf": { "checksum": "md5:baa9c997e57c15385a16c4e4f370e385", "ext": "pdf", "id": "911e5861-1af4-408a-b2f6-f5552c7983b2", "key": "Kigerlvol10issue2IJCC2016.pdf", "metadata": null, "mimetype": "application/pdf", "size": 289158 } }, "order": [], "total_bytes": 289158 }, "id": "163399", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/163399/access", "access_links": "https://zenodo.org/api/records/163399/access/links", "access_request": "https://zenodo.org/api/records/163399/access/request", "access_users": "https://zenodo.org/api/records/163399/access/users", "archive": "https://zenodo.org/api/records/163399/files-archive", "archive_media": "https://zenodo.org/api/records/163399/media-files-archive", "communities": "https://zenodo.org/api/records/163399/communities", "communities-suggestions": "https://zenodo.org/api/records/163399/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.163399", "draft": "https://zenodo.org/api/records/163399/draft", "files": "https://zenodo.org/api/records/163399/files", "latest": "https://zenodo.org/api/records/163399/versions/latest", "latest_html": "https://zenodo.org/records/163399/latest", "media_files": "https://zenodo.org/api/records/163399/media-files", "parent": "https://zenodo.org/api/records/657997", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/657997", "requests": "https://zenodo.org/api/records/163399/requests", "reserve_doi": "https://zenodo.org/api/records/163399/draft/pids/doi", "self": "https://zenodo.org/api/records/163399", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.163399", "self_html": "https://zenodo.org/records/163399", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:163399/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:163399/sequence/default", "versions": "https://zenodo.org/api/records/163399/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Raksha Shakti University" } ], "person_or_org": { "family_name": "K Jaishankar", "name": "K Jaishankar", "type": "personal" }, "role": { "id": "editor", "title": { "de": "EditorIn", "en": "Editor" } } } ], "creators": [ { "affiliations": [ { "name": "Washington State University, United States of America" } ], "person_or_org": { "family_name": "Kigerl", "given_name": "Alex", "name": "Kigerl, Alex", "type": "personal" } } ], "description": "
Cyber crime is a worldwide problem, with a global reach. Cyber crimes do not respect national boundaries, and so can be sent to and from anywhere in the world. Many reports, mostly by cyber security firms, regularly release information ranking the different nations in terms of top cyber crime output, broken down into varying cyber crime types. However, little has been done to classify nations according to separate cyber crime typologies using any multivariate methods. Instead, reporting is descriptive and unidimensional. \u00a0The present research sought to fill this gap by conducting K-means clustering analysis on a sample of 190 countries using seven dimensions of cyber crime ranging from malware, fraud, spam, and digital piracy, as well as measures of GDP and internet use. The findings determined that nations can be broken down into four distinct categories based on cyber crime activity: low cyber crime countries, non-serious cyber crime countries, advance fee fraud countries, and phishing scam countries. The implications of these findings and the directions for future research are discussed.
", "publication_date": "2016-10-26", "publisher": "Zenodo", "references": [ { "reference": "Aalsma, M. C., & Lapsley, D. K. (2001). A typology of adolescent delinquency: Sex differences and implications for treatment. Criminal Behaviour and Mental Health, 11(3), 173-191. Aaron & Rasmussen (2013). Global Phishing Survey: Trends and Domain Name Use in 2H2012. APWG, July-December 2012 report. Alt-N Technologies (2013). Internet threats trend report, April 2013. Retrieved from: http://static.altn.com/Collateral/Security-Threat-Trend-Reports/2013-Q1_Email-Threat-Trend-Report.pdf. APWG (2014). Phishing activity trends report. APWG, 2nd quarter 2014. Retrieved from: https://docs.apwg.org/reports/apwg_trends_report_q2_2014.pdf Bureau of Intelligence and Research (July 29, 2009). Independent states in the world. U.S. Department of State. Retrieved from http://www.state.gov/s/inr/rls/4250.htm. Cavusgil, S. T., Kiyak, T., & Yeniyurt, S. (2004). Complementary approaches to preliminary foreign market opportunity assessment: Country clustering and country ranking. Industrial Marketing Management, 33(7), 607-617. Choo, K. K. R. (2008). Organized crime groups in cyberspace: a typology. Trends in organized crime, 11(3), 270-295. Conway, D. & White, J. M. (2012). Machine Learning for Email. Sebastopol, CA: O'Reilly Media. Cormack, G. V., & Lynam, T. R. (2007). Online supervised spam filter evaluation. ACM Transactions on Information Systems (TOIS), 25(3), 11. Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., & Rejaie, R. (2010). Is content publishing in BitTorrent altruistic or profit-driven? Co-NEXT '10 Proceedings of the 6th International Conference. ACM New York, NY, USA. ISBN: 978-1-4503-0448-1. Cyveillance (October, 2008). The cost of phishing: Understanding the true cost dynamics behind phishing attacks. A Cyveillance report. Envisional (January, 2011). Technical report: An estimate of infringing use of the internet. Technical report. Fawcett, T. (2004). ROC graphs: Notes and practical considerations for researchers. Machine learning, 31, 1-38. Fossi, M., Turner, D., Johnson, E., Mack, T., Adams, T., Blackbird, J., Entwisle, S., Graveland, B., McKinney, D., Mulcahy, J. & Wueest, C. (April, 2010). Symantec global internet security threat report. Symantec, 15. Gazet, A. (2010). Comparative analysis of various ransomware virii. Journal in computer virology, 6(1), 77-90. Gudkova, D. (January, 2013). Kaspersky security bulletin: Spam evolution 2012. Securelist. Hartigan, J. A. (1975). Clustering algorithms. New York, NY: Wiley, 1975. Kigerl, A. (2012). Routine activity theory and the determinants of high cyber crime countries. Social Science Computer Review, 30(4), 470-486. Kigerl, A. (2013). Infringing nations: Predicting software piracy rates, BitTorrent tracker hosting, and p2p file sharing client downloads between countries. International Journal of Cyber Criminology, 7(1), 62. Kigerl, A. (2016). Routine Activity Theory and Malware, Fraud, and Spam at the National Level. Unpublished manuscript. Kindsight (2012). Malware report Q2 2012. Kindsight Security Labs. Retrieved from https://www.kindsight.net/sites/default/files/Kindsight_Security_Labs-Q212_Malware_Report-final.pdf. Kohavi, R. (1995, August). A study of cross-validation and bootstrap for accuracy estimation and model selection. Ijcai, 14(2), 1137-1145. Lachhwani, V., & Ghose, S. (2012). Online information seeking for prescription drugs. International Journal of Business and Systems Research, 6(1), 1-17. Leisch, F. (2005). flexclust: Flexible Cluster Algorithms. R package. Liaw, A., & Wiener, M. (2002). Classification and regression by random Forest. R news, 2(3), 18-22. Ponemon (2013). 2013 Cost of cyber crime study. United States. Ponemon Institute. Price, D. (2013). Sizing the piracy universe. NetNames Envisional, September, 2013. Project honey pot statistics (2016). Project Honey Pot. Retrieved from http://www.projecthoneypot.org/statistics.php on March 13, 2016. Rao, J. M., & Reiley, D. H. (2012). The economics of spam. The Journal of Economic Perspectives, 26(3), 87-110. Rosenberg, M. (June 14, 2010). The number of countries in the world. About.com. Retrieved from http://geography.about.com/cs/countries/a/numbercountries.htm. RSA (2014). 2013 A year in review: Fraud report. Spamhaus (2016). The World's Worst Botnet Countries. Spamhaus Blocklist database. Retrieved from https://www.spamhaus.org/statistics/botnet-cc. Stabek, A., Watters, P., & Layto, R. (2010, July). The seven scam types: mapping the terrain of cyber crime. In Cyber crime and Trustworthy Computing Workshop (CTC), 2010 Second (pp. 41-51). IEEE. Symantec (2014). Internet security threat report. 2013 Trends, 19. Terrill, W., Paoline, E. A., & Manning, P. K. (2003). Police culture and coercion. Criminology, 41(4), 1003-1034. Ultrascan (2013). 419 advance fee fraud statistics 2013. Ultrascan Advanced Global Investigations. Ultrascan (2014). 419 advance fee fraud statistics 2013. Ultrascan Advanced Global Investigations. PRE-Release 1.5 Amsterdam, 23 July, 2014. Retrieved from: http://www.ultrascan-agi.com/public_html/html/pdf_files/Pre-Release-419_Advance_Fee_Fraud_Statistics_2013-July-10-2014-NOT-FINAL-1.pdf. V.I. Labs (2014). Top 20 Countries for Software Piracy and License Misuse. Code Confidential: The V.i. Labs Blog. Retrieved from http://www.vilabs.com/news-section/code-confidential/top-20-countries-software-piracy-2014." } ], "related_identifiers": [ { "identifier": "http://cybercrimejournal.com/Kigerlvol10issue2IJCC2016", "relation_type": { "id": "isidenticalto", "title": { "de": "Ist identisch mit", "en": "Is identical to" } }, "scheme": "url" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "The Creative Commons Attribution license allows re-distribution and re-use of a licensed work on the condition that the creator is appropriately credited." }, "icon": "cc-by-icon", "id": "cc-by-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution 4.0 International" } } ], "subjects": [ { "subject": "Cyber crime, malware, Spam, Digital Piracy, Countries, Typologies." } ], "title": "Cyber Crime Nation Typologies: K-Means Clustering of Countries Based on Cyber Crime Rates" }, "parent": { "access": { "owned_by": { "user": 13663 } }, "communities": { "default": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2015-08-02T09:29:30+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "links": {}, "metadata": { "curation_policy": "", "page": "International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy.IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety and policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
\r\n\r\nhttp://www.cybercrimejournal.com
", "title": "International Journal of Cyber Criminology (ISSN: 0974 \u2013 2891) " }, "revision_id": 0, "slug": "cybercriminologyjournal", "updated": "2016-07-26T09:19:23+00:00" } ], "ids": [ "9dc977ce-8c52-41f6-b0a1-99d351310dd8" ] }, "id": "657997", "pids": { "doi": { "identifier": "", "provider": "legacy" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.163399", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:163399", "provider": "oai" } }, "revision_id": 6, "stats": { "all_versions": { "data_volume": 113349936.0, "downloads": 392, "unique_downloads": 341, "unique_views": 714, "views": 765 }, "this_version": { "data_volume": 113060778.0, "downloads": 391, "unique_downloads": 340, "unique_views": 704, "views": 754 } }, "status": "published", "updated": "2020-01-20T16:23:40.237325+00:00", "versions": { "index": 1, "is_latest": true } }