Cybercrime classification and characteristics

Hamid Jahankhani, Ameer Al-Nemrat, Amin Hosseinian-Far

Research output: Chapter in Book/Report/Conference proceedingChapter


Over the last two decades, businesses, consumers, and governments around the globe have moved into cyberspace and cloud environment in order to conduct their businesses. Many people spend a significant part of their daily life in cyberspace, creating and enjoying new types of social relationships which were not possible or financially affordable 20 years ago. However, criminals have identified rewards from online frauds therefore, the risks and threats have increased too.Securing the cyber space will be an enabler and will result in better use of the digital environment. Therefore, securing it requires a joint effort by all stakeholders which includes the law enforcement agencies, governments, the technology industries, and the individuals in the society.
Original languageEnglish
Title of host publicationCyber Crime and Cyber Terrorism Investigator's Handbook
Place of PublicationUnited States
Number of pages16
ISBN (Print)9780128008119
Publication statusPublished - 25 Jul 2014

Publication series

NameCyber Crime and Cyber Terrorism Investigator's Handbook
PublisherElsevier Inc.


  • Classifications
  • Criminology
  • Cyber-harassment
  • Cybercrime
  • Identity theft
  • Internet auction fraud
  • Phishing
  • Profiling


Dive into the research topics of 'Cybercrime classification and characteristics'. Together they form a unique fingerprint.

Cite this