- Copyright Page
- List of Contributors
- Volume Introduction
- Cyberpsychology Research Methods
- The Online Self
- Impression Management and Self-Presentation Online
- Personality and Internet Use: The Case of Introversion and Extroversion
- Adolescent and Emerging Adult Perception and Participation in Problematic and Risky Online Behavior
- The Myth of the Digital Native and What It Means for Higher Education
- Technology Interference in Couple and Family Relationships
- Older Adults and Digital Technologies
- Textese: Language in the Online World
- Cultural Considerations on Online Interactions
- Online Romantic Relationships
- The Social Consequences of Online Interaction
- Online Support Communities
- Digital Inclusion for People with an Intellectual Disability
- The Psychology of Online Lurking
- Conceptualizing Online Groups as Multidimensional Networks
- Uses and Gratifications of Social Media: Who Uses It and Why?
- Image Sharing on Social Networking Sites: Who, What, Why, and So What?
- Social Media and Cyberactivism
- Socially Connecting Through Blogs and Vlogs: A Social Connections Approach to Blogging and Vlogging Motivation
- Positive Aspects of Social Media
- Managing Your Health Online: Issues in the Selection, Curation, and Sharing of Digital Health Information
- A Psychological Overview of Gaming Disorder
- Mourning and Memorialization on Social Media
- The Therapeutic and Health Benefits of Playing Video Games
- Video Games and Behavior Change
- Game Transfer Phenomena: Origin, Development, and Contributions to the Video Game Research Field
- Psychosocial Effects of Gaming
- Enacting Immorality Within Gamespace: Where Should We Draw the Line, and Why?
- Gaming Classifications and Player Demographics
- The Rise of Cybercrime
- Policing Cybercrime through Law Enforcement and Industry Mechanisms
- Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit
- The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations
Abstract and Keywords
Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued.
Jason R. C. Nurse, School of Computing, University of Kent, UK
Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.