This HTML5 document contains 33 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n18doi:10.1093/oxfordhb/
n15http://purl.org/ontology/bibo/status/
n21https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n4https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n11http://eprints.org/ontology/
n10http://www.loc.gov/loc.terms/relators/
bibohttp://purl.org/ontology/bibo/
n13https://kar.kent.ac.uk/id/org/
n8https://kar.kent.ac.uk/69501/
n19https://kar.kent.ac.uk/id/eprint/69501#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n12https://kar.kent.ac.uk/id/document/
n14https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n20https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n6https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:69501
rdf:type
bibo:BookSection bibo:Article n11:EPrint n11:BookSectionEPrint
rdfs:seeAlso
n8:
owl:sameAs
n18:9780198812746.013.36
n10:EDT
n6:ext-7064f44d8e9adf8cac097fb420d67a65 n6:ext-49bf22f8dbb32db7e5c6e8f80dbb8a5b n6:ext-7b4dfd67427b8997f8becc59dca6f15f n6:ext-6c35358c086d4062052530f910b3dde8
n11:hasAccepted
n12:3132569
n11:hasDocument
n12:3132569 n12:3132574 n12:3166806 n12:3166803 n12:3166804 n12:3166805
dc:hasVersion
n12:3132569
dcterms:title
The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
wdrs:describedby
n4:export_kar_RDFN3.n3 n20:export_kar_RDFN3.n3
dcterms:date
2019-01-01
dcterms:creator
n6:ext-2164faeb17940ce0bc68ba31325b3531 n6:ext-j.r.c.nurse@kent.ac.uk
bibo:status
n15:peerReviewed n15:published
dcterms:publisher
n13:ext-ffae441f908983694f410e3721f2491d
bibo:abstract
While cybercrime can often be an individual activity pursued by lone hackers, it has increasingly grown into a group activity, with networks across the world. This chapter critically examines the group element of cybercrime from several perspectives. It identifies the platforms that online groups - cybercriminal and otherwise - use to interact, and considers groups as both perpetrators and victims of cybercrime. A key novelty is the discovery of new types of online groups whose collective actions border on criminality. The chapter also analyzes how online cybercrime groups form, organize, and operate. It explores issues such as trust, motives, and means, and draws on several poignant examples, from Anonymous to LulzSec, to illustrate the arguments.
dcterms:isPartOf
n14:repository
dcterms:subject
n21:BF n21:QA75
bibo:authorList
n19:authors
bibo:editorList
n19:editors