The seven scam types: Mapping the terrain of cybercrime

Amber Stabek*, Paul Watters, Robert Layton

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

33 Citations (Scopus)

Abstract

Threat of cybercrime is a growing danger to the economy. Industries and businesses are targeted by cyber-criminals along with members of the general public. Since cybercrime is often a symptom of more complex criminological regimes such as laundering, trafficking and terrorism, the true damage caused to society is unknown. Dissimilarities in reporting procedures and non-uniform cybercrime classifications lead international reporting bodies to produce incompatible results which cause difficulties in making valid comparisons. A cybercrime classification framework has been identified as necessary for the development of an inter-jurisdictional, transnational, and global approach to identify, intercept, and prosecute cyber-criminals. Outlined in this paper is a cybercrime classification framework which has been applied to the incidence of scams. Content analysis was performed on over 250 scam descriptions stemming from in excess of 35 scamming categories and over 80 static features derived. Using hierarchical cluster and discriminant function analysis, the sample was reduced from over 35 ambiguous categories into 7 scam types and the top four scamming functions - identified as scamming business processes, revealed. The results of this research bear significant ramifications to the current state of scam and cybercrime classification, research and analysis, as well as offer significant insight into the business processes and applications adopted by scammers and cyber-criminals.

Original languageEnglish
Title of host publicationProceedings - 2nd Cybercrime and Trustworthy Computing Workshop, CTC 2010
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages41-51
Number of pages11
ISBN (Print)9780769541860
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2nd Cybercrime and Trustworthy Computing Workshop, CTC - 2010 - Ballarat, Australia
Duration: 19 Jul 201020 Jul 2010

Other

Other2nd Cybercrime and Trustworthy Computing Workshop, CTC - 2010
Country/TerritoryAustralia
CityBallarat
Period19/07/1020/07/10

Keywords

  • Agglomerative
  • Business process
  • Classification
  • Cybercrime
  • Cyberscam
  • Divisive
  • Framework
  • Static feature

Fingerprint

Dive into the research topics of 'The seven scam types: Mapping the terrain of cybercrime'. Together they form a unique fingerprint.

Cite this