Cybercrime classification and characteristics

Citations of this article
Mendeley users who have this article in their library.
Get full text


Over the last two decades, businesses, consumers, and governments around the globe have moved into cyberspace and cloud environment in order to conduct their businesses. Many people spend a significant part of their daily life in cyberspace, creating and enjoying new types of social relationships which were not possible or financially affordable 20 years ago. However, criminals have identified rewards from online frauds therefore, the risks and threats have increased too.Securing the cyber space will be an enabler and will result in better use of the digital environment. Therefore, securing it requires a joint effort by all stakeholders which includes the law enforcement agencies, governments, the technology industries, and the individuals in the society.




Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber Crime and Cyber Terrorism Investigator’s Handbook (pp. 149–164). Elsevier Inc.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free