@inbook{4392535c86af44ffa092178fc8c024c8,
title = "Cybercrime classification and characteristics",
abstract = "Over the last two decades, businesses, consumers, and governments around the globe have moved into cyberspace and cloud environment in order to conduct their businesses. Many people spend a significant part of their daily life in cyberspace, creating and enjoying new types of social relationships which were not possible or financially affordable 20 years ago. However, criminals have identified rewards from online frauds therefore, the risks and threats have increased too.Securing the cyber space will be an enabler and will result in better use of the digital environment. Therefore, securing it requires a joint effort by all stakeholders which includes the law enforcement agencies, governments, the technology industries, and the individuals in the society.",
keywords = "Classifications, Criminology, Cyber-harassment, Cybercrime, Identity theft, Internet auction fraud, Phishing, Profiling",
author = "Hamid Jahankhani and Ameer Al-Nemrat and Amin Hosseinian-Far",
year = "2014",
month = jul,
day = "25",
doi = "10.1016/B978-0-12-800743-3.00012-8",
language = "English",
isbn = "9780128008119",
series = "Cyber Crime and Cyber Terrorism Investigator's Handbook",
publisher = "Elsevier",
pages = "149--164",
booktitle = "Cyber Crime and Cyber Terrorism Investigator's Handbook",
address = "Netherlands",
}