Exploring Cybercriminal Activities, Behaviors and Profiles
- URL: http://arxiv.org/abs/2308.15948v1
- Date: Wed, 30 Aug 2023 10:57:19 GMT
- Title: Exploring Cybercriminal Activities, Behaviors and Profiles
- Authors: Maria Bada and Jason R. C. Nurse
- Abstract summary: This article explores cybercriminal activities and behavior from a psychology and human aspects perspective.
We examine motivations, psychological and other interdisciplinary concepts as they may impact/influence cybercriminal activities.
- Score: 2.7195102129095003
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: While modern society benefits from a range of technological advancements, it
also is exposed to an ever-increasing set of cybersecurity threats. These
affect all areas of life including business, government, and individuals. To
complement technology solutions to this problem, it is crucial to understand
more about cybercriminal perpetrators themselves, their use of technology,
psychological aspects, and profiles. This is a topic that has received little
socio-technical research emphasis in the technology community, has few concrete
research findings, and is thus a prime area for development. The aim of this
article is to explore cybercriminal activities and behavior from a psychology
and human aspects perspective, through a series of notable case studies. We
examine motivations, psychological and other interdisciplinary concepts as they
may impact/influence cybercriminal activities. We expect this paper to be of
value and particularly insightful for those studying technology, psychology,
and criminology, with a focus on cybersecurity and cybercrime.
Related papers
- Different Cybercrimes and their Solution for Common People [0.0]
This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities.
We present a list of 31 technical as well as non-technical solutions considering that a "common man" may not be technologically aware.
arXiv Detail & Related papers (2024-10-08T04:23:11Z) - Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features [0.741787275567662]
We explore the potential of psychological profiling techniques, particularly focusing on the utilization of Large Language Models (LLMs) and psycholinguistic features.
Our research underscores the importance of integrating psychological perspectives into cybersecurity practices to bolster defense mechanisms against evolving threats.
arXiv Detail & Related papers (2024-06-26T23:04:52Z) - Cyberbully and Online Harassment: Issues Associated with Digital Wellbeing [0.0]
This research synthesizes empirical findings from diverse studies to evaluate how innovative technological interventions contribute to reducing the prevalence of cyberbullying.
The study focuses on the effectiveness of these interventions in various settings, highlighting the need for adaptive strategies that respond to the dynamic digital landscape.
arXiv Detail & Related papers (2024-04-29T17:49:49Z) - PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety [70.84902425123406]
Multi-agent systems, when enhanced with Large Language Models (LLMs), exhibit profound capabilities in collective intelligence.
However, the potential misuse of this intelligence for malicious purposes presents significant risks.
We propose a framework (PsySafe) grounded in agent psychology, focusing on identifying how dark personality traits in agents can lead to risky behaviors.
Our experiments reveal several intriguing phenomena, such as the collective dangerous behaviors among agents, agents' self-reflection when engaging in dangerous behavior, and the correlation between agents' psychological assessments and dangerous behaviors.
arXiv Detail & Related papers (2024-01-22T12:11:55Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Towards Effective Cybercrime Intervention [1.179179628317559]
We propose to build a systematic framework through the lens of a cyber threat actor.
We explore the motivation factors behind the crimes and the crime stages of the threat actors.
We then formulate intervention plans so as to discourage the act of committing malicious cyber activities and also aim to integrate ex-cyber offenders back into society.
arXiv Detail & Related papers (2022-11-17T13:40:53Z) - Coordinated Science Laboratory 70th Anniversary Symposium: The Future of
Computing [80.72844751804166]
In 2021, the Coordinated Science Laboratory CSL hosted the Future of Computing Symposium to celebrate its 70th anniversary.
We summarize the major technological points, insights, and directions that speakers brought forward during the symposium.
Participants discussed topics related to new computing paradigms, technologies, algorithms, behaviors, and research challenges to be expected in the future.
arXiv Detail & Related papers (2022-10-04T17:32:27Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Intelligent interactive technologies for mental health and well-being [70.1586005070678]
The paper critically analyzes existing solutions with the outlooks for their future.
In particular, we:.
give an overview of the technology for mental health,.
critically analyze the technology against the proposed criteria, and.
provide the design outlooks for these technologies.
arXiv Detail & Related papers (2021-05-11T19:04:21Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.