[HTML][HTML] Hacker types, motivations and strategies: A comprehensive framework

S Chng, HY Lu, A Kumar, D Yau - Computers in Human Behavior Reports, 2022 - Elsevier
Understanding and predicting cyber malfeasance is an emerging area of research with the
increase in cybercrimes and heightened awareness about cybersecurity in recent years. The …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Identifying the effects of co-authorship networks on the performance of scholars: A correlation and regression analysis of performance measures and social network …

A Abbasi, J Altmann, L Hossain - Journal of informetrics, 2011 - Elsevier
In this study, we develop a theoretical model based on social network theories and
analytical methods for exploring collaboration (co-authorship) networks of scholars. We use …

Growth and structure of authorship and co-authorship network in the strategic management realm: Evidence from the Strategic Management Journal

MA Koseoglu - BRQ Business Research Quarterly, 2016 - journals.sagepub.com
The main objective of this study is to investigate the intellectual structure and evolution of
author collaborations from articles published in the Strategic Management Journal between …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks

ER Leukfeldt, ER Kleemans… - The British Journal of …, 2017 - academic.oup.com
Online forums serve as offender convergence settings for cybercriminals, but it is unknown
whether all cybercriminal networks use forums. Important questions are how cybercriminals …

Profiling and classifying the behavior of malicious codes

M Alazab - Journal of Systems and Software, 2015 - Elsevier
Malware is a major security threat confronting computer systems and networks and has
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …

Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization

ER Leukfeldt - Cyberpsychology, Behavior, and Social Networking, 2014 - liebertpub.com
This article investigates phishing victims, especially the increased or decreased risk of
victimization, using data from a cybercrime victim survey in the Netherlands (n= 10,316) …

Understanding online consumers' purchase intentions: A contribution from social network theory

E Akar, T Dalgic - Behaviour & Information Technology, 2018 - Taylor & Francis
There is a dynamic and interconnected international setting shaped by the power of the
Internet and social media. To gain more consumers, understand their behaviours and …

Cybercrime and social ties: Phishing in Amsterdam

ER Leukfeldt - Trends in organized crime, 2014 - Springer
This paper presents a case study of phishing in Amsterdam, demonstrating that the current
literature on criminal phishing networks provides an incomplete picture of this form of …