Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Utilising journey crime mapping and scripting to combat cyber ​​crime

Tools
- Tools
+ Tools

Somer, T., Hallaq, Bilal and Watson, Tim (2016) Utilising journey crime mapping and scripting to combat cyber ​​crime. In: 15th European Conference on Cyber ​​Warfare and Security, Munich, Germany, 7-8 Jul 2016. Published in: Proceedings of The 15th European Conference on Cyber Warfare and Security - ECCWS 2016 ISBN 9781910810934. ISSN 2049-9870.

[img]
Preview
PDF
WRAP-utilising-journey-mapping-cyber-crime-Watson-2017.pdf - Accepted Version - Requires a PDF viewer.

Download (565Kb) | Preview
Official URL: http://www.academic-bookshop.com/ourshop/prod_5121...

Request Changes to record.

Abstract

Modern societies are now reliant on digital communication and networks for conducting a wide array of tasks, ranging from simple acts such as browsing the web through to mission critical tasks such as the management of critical infrastructure and industrial controls. This reliance shows a growing emphasis on strategic importance of cyberspace (Sharma, 2010). While organisations and individuals are keenly exploiting the benefits of cyberspace, these same platforms have also opened new avenues for nefarious actors in the pursuit of their criminal activities to attack, disrupt, or steal from organisations and individuals. Criminal organisations and lone criminals worldwide have access to powerful, evolving capabilities which they use to identify and target their victims allowing for the perpetration of a wide variety of cyber crimes. This paper discusses ways in which utilising methods from typically non-cyber disciplines – business and criminology – can successfully be applied to the cyber domain in order to help in the fight against and prevention of cyber crime. Through the provision of a visual representation, this paper clarifies how journey mapping and crime scripting can help in building an understanding of the steps criminals undertake during execution of a cyber crime. In essence, within our work we have deconstructed the lifecycle of a crime events and translated these into a visualisation map to show the full event process, highlighting key steps as well as positive and negative events. Such work is useful to several roles and organisation types as it can aid in their decision processes when undertaking steps in pursuit, prevention, preparation and protection.

Item Type: Conference Item (Paper)
Subjects: H Social Sciences > HV Social pathology. Social and public welfare
Divisions: Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group)
Library of Congress Subject Headings (LCSH): Computer crimes -- Prevention, Criminology
Journal or Publication Title: Proceedings of The 15th European Conference on Cyber Warfare and Security - ECCWS 2016
Publisher: Academic Conferences and Publishing International
ISBN: 9781910810934
ISSN: 2049-9870
Official Date: 2016
Dates:
DateEvent
2016Available
23 May 2016Accepted
Status: Peer Reviewed
Publication Status: Published
Date of first compliant deposit: 29 June 2016
Date of first compliant Open Access: 3 May 2017
Funder: Seventh Framework Programme (European Commission) (FP7)
Conference Paper Type: Paper
Title of Event: 15th European Conference on Cyber ​​Warfare and Security
Type of Event: Conference
Location of Event: Munich, Germany
Date(s) of Event: 7-8 Jul 2016
Related URLs:
  • Organisation

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us