A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature
Abstract
:1. Introduction
1.1. Prior Systematic Reviews
1.2. Aim of the Review
2. Materials and Methods
2.1. Eligibility Criteria
2.2. Information Sources
2.3. Search Strategy
2.4. Selection Process
2.5. Data Collection Process
3. Results
3.1. Study Selection (Flow of Studies)
3.2. Contribution Themes
3.3. Cybercriminal/Hacker Typologies
3.4. Cybercriminal Motivations
3.5. Characteristics and Traits
3.6. Differentiating Cybercriminals from Non-Cybercriminals
3.7. Predicting Cybercrime
3.8. Criminal Profiling and Cybercrime
3.9. Approaches to Profiling Cybercrime
4. Discussion
4.1. Interpretation
4.2. Lack of a Standard Taxonomy
4.3. A Dearth of Specialists Working in the Field
4.4. Lack of Primary Data
4.5. Proposing a Comprehensive Framework for Cyber Behavioral Analysis (CBA)
4.6. A Comprehensive Framework for CBA
4.7. Limitations of Evidence
4.8. Limitations of Review Processes
4.9. Implications
4.10. Future Research Directions
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Erbschloe, M. Computer and Internet Crime; EBSCO Research Starters: Birmingham, AL, USA, 2020. [Google Scholar]
- Flath, T. Cybersecurity Experts Failing to Keep Pace with an Explosion in Cybersecurity Threats. LinkedIn. Available online: https://www.linkedin.com/pulse/cybersecurity-experts-failing-keep-pace-explosion-threats-tony-flath?trk=public_profile_article_view (accessed on 3 September 2017).
- Aiken, M.; Farr, R.; Witschi, D. Cyberchondria, Coronavirus, and Cybercrime: A Perfect Storm. In Handbook of Research on Cyberchondria, Health Literacy, and the Role of Media in Society’s Perception of Medical Information; IGI Global: Hershey, PA, USA, 2022; pp. 16–34. [Google Scholar] [CrossRef]
- Moloney, C.J.; Unnithan, N.P.; Zhang, W. Assessing Law Enforcement’s Cybercrime Capacity and Capability. Available online: https://leb.fbi.gov/articles/featured-articles/assessing-law-enforcements-cybercrime-capacity-and-capability- (accessed on 9 June 2023).
- SC Government of Canada. The Daily—Impact of Cybercrime on Canadian Businesses. 2021. Available online: https://www150.statcan.gc.ca/n1/daily-quotidien/221018/dq221018b-eng.htm (accessed on 12 February 2023).
- Canadian Centre for Cyber Security. National Cyber Threat Assessment 2023–2024. Communications Security Establishment, Threat Assessment, ISSN: 2816-9182. 2022. Available online: https://www.cyber.gc.ca/en/guidance/national-cyber-threat-assessment-2023-2024 (accessed on 9 June 2023).
- The White House. Executive Order on Improving the Nation’s Cybersecurity, Volume 13636. 2021. Available online: https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ (accessed on 9 June 2023).
- Federal Bureau of Investigation. Internet Crime Report 2021, Internet Crime Complaint Centre (IC3). 2021. Available online: https://www.documentcloud.org/documents.21504639-fbi-internet-crime-report-2021 (accessed on 9 June 2023).
- Morgan, S. Cybercrime to Cost the World 10.5 trillion Annually by 2025. Cybercrime Magazine. 2020. Available online: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/ (accessed on 12 February 2023).
- Chng, S.; Lu, H.Y.; Kumar, A.; Yau, D. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 2022, 5, 100167. [Google Scholar] [CrossRef]
- Cross, M.; Shinder, D.L. Scene of the Cybercrime, 2nd ed.; Syngress Pub: Burlington, MA, USA, 2008. [Google Scholar]
- Herman, M.; Iorga, M.; Salim, A.M.; Jackson, R.H.; Hurst, M.R.; Leo, R.; Lee, R.; Landreville, N.M.; Mishra, A.K.; Wang, Y.; et al. NIST IR 8006. NIST Cloud Computing Forensic Science Challenges; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [Google Scholar] [CrossRef]
- Proofpoint. What Is Social Engineering? Definition, Types & More. Available online: https://www.proofpoint.com/us/threat-reference/social-engineering (accessed on 26 June 2023).
- Turvey, B. Modus operandi, motive and technology. In Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet; Elsevier: Amsterdam, The Netherlands, 2011; pp. 285–304. [Google Scholar]
- Dimaggio, J. Ransomware-Centric Collection and Threat Profiling. Analyst1. 2023. Available online: https://analyst1.com/ransomware-centric-collection-and-threat-profiling/ (accessed on 13 March 2023).
- Dowden, C.; Bennell, C.; Bloomfield, S. Advances in Offender Profiling: A Systematic Review of the Profiling Literature Published Over the Past Three Decades. J. Police Crim. Psychol. 2007, 22, 44–56. [Google Scholar] [CrossRef]
- Fox, B.; Farrington, D.P. What have we learned from offender profiling? A systematic review and meta-analysis of 40 years of research. Psychol. Bull. 2018, 144, 1247–1274. [Google Scholar] [CrossRef] [PubMed]
- Bada, M.; Nurse, J.R.C. Profiling the Cybercriminal: A Systematic Review of Research. In Proceedings of the 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 14–18 June 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Phillips, K.; Davidson, J.C.; Farr, R.R.; Burkhardt, C.; Caneppele, S.; Aiken, M.P. Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sci. 2022, 2, 379–398. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Douglas, J.E.; Burgess, A.W.; Burgess, A.G.; Ressler, R.K. Crime Classification Manual: A Standard System for Investigating and Classifying Violent Crime; Wiley: Hoboken, NJ, USA, 2013; Available online: https://www.amazon.ca/Crime-Classification-Manual-Investigating-Classifying/dp/1118305051 (accessed on 12 February 2023).
- Mihas, P. Thematic Analysis—An overview. In International Encyclopedia of Education, 4th ed.; Elsevier: Amsterdam, The Netherlands, 2023; Available online: https://www.sciencedirect.com/topics/social-sciences/thematic-analysis (accessed on 15 July 2023).
- McHugh, M.L. Interrater reliability: The kappa statistic. Biochem. Medica 2012, 22, 276–282. [Google Scholar] [CrossRef]
- Coutourie, L. The computer criminal: An investigative assessment. FBI Law Enforc. Bull. 1989, 58, 18. [Google Scholar]
- Bongardt, S.A. An Introduction to the Behavioral Profiling of COMPUTER NETWORK iNTRUSiONS. Forensic Exam. 2010, 19, 20–25. [Google Scholar]
- Al-Mhiqani, M.N.; Ahmad, R.; Abidin, Z.Z.; Yassin, W.; Hassan, A.; Abdulkareem, K.H.; Ali, N.S.; Yunos, Z. A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations. Appl. Sci. 2020, 10, 5208. [Google Scholar] [CrossRef]
- Madarie, R. Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Values in a Sample of Hackers. Int. J. Cyber Criminol. 2017, 11, 78–97. [Google Scholar] [CrossRef]
- Kirwan, G.; Power, A. Cybercrime: The Psychology of Online Offenders; Cambridge University Press: New York, NY, USA, 2013; pp. 21–256. [Google Scholar] [CrossRef]
- Chiesa, R.; Ducci, S.; Ciappi, S. Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking, 1st ed.; Auerbach Publications: Boca Raton, FL, USA, 2008. [Google Scholar]
- Rogers, M.; Smoak, N.D.; Liu, J. Self-reported Deviant Computer Behavior: A Big-5, Moral Choice, and Manipulative Exploitive Behavior Analysis. Deviant Behav. 2006, 27, 245–268. [Google Scholar] [CrossRef]
- Bachmann, M. The Risk Propensity and Rationality of Computer Hackers. Int. J. Cyber Criminol. 2010, 4, 643–656. [Google Scholar]
- Nykodym, N.; Taylor, R.; Vilela, J. Criminal profiling and insider cyber crime. Comput. Law Secur. Rev. 2005, 21, 408–414. [Google Scholar] [CrossRef]
- Rogers, M.K. A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. Ph.D. Thesis, University of Manitoba, Winnipeg, MB, Canada, 2001. Available online: https://www.proquest.com/dissertations-theses/social-learning-theory-moral-disengagement/docview/304732918/se-2?accountid=44888 (accessed on 24 April 2023).
- Rogers, M. The role of criminal profiling in the computer forensics process. Comput. Secur. 2003, 22, 292–298. [Google Scholar] [CrossRef]
- Loper, K. The Criminology of Computer Hackers: A Qualitative and Quantitative Analysis—ProQuest. Unpublished Dissertation, Michigan State University, East Lansing, MI, USA, 2000. Available online: https://www.proquest.com/openview/3587c0a2d0d1a0b1c239fdd26d4e38f9/1?pq-origsite=gscholar&cbl=18750&diss=y (accessed on 9 June 2023).
- Rogers, M.K. A two-dimensional circumplex approach to the development of a hacker taxonomy. Digit. Investig. 2006, 3, 97–102. [Google Scholar] [CrossRef]
- Zhang, X.; Tsang, A.; Yue, W.T.; Chau, M. The classification of hackers by knowledge exchange behaviors. Inf. Syst. Front. 2015, 17, 1239–1251. [Google Scholar] [CrossRef]
- Warikoo, A. Proposed Methodology for Cyber Criminal Profiling. Inf. Secur. J. Glob. Perspect. 2014, 23, 172–178. [Google Scholar] [CrossRef]
- Becker, J. Who are the computer criminals? New Sci. 1980, 85, 1198. [Google Scholar] [CrossRef]
- Grimes, R.A. 11 Types of Hackers and How They Will Harm You. CSO Online. 2020. Available online: https://www.csoonline.com/article/3573780/11-types-of-hackers-and-how-they-will-harm-you.html (accessed on 9 June 2023).
- Barber, R. Hackers Profiled—Who Are They and What Are Their Motivations? Comput. Fraud. Secur. 2001, 2001, 14–17. [Google Scholar] [CrossRef]
- Shaw, E.D. The Role of Behavioral Research and Profiling in Malicious Cyber Insider Investigations. Digit. Investig. 2006, 3, 20–31. Available online: https://www.sciencedirect.com/science/article/pii/S1742287606000090 (accessed on 23 May 2023). [CrossRef]
- Bissett, A.; Shipton, G. Some human dimensions of computer virus creation and infection. Int. J. Human-Computer Stud. 2000, 52, 899–913. [Google Scholar] [CrossRef] [Green Version]
- McBrayer, J. Exploiting the Digital Frontier: Hacker Typology and Motivation. Master’s Thesis, University of Alabama, Tuscaloosa, AL, USA, 2014. Available online: https://www.proquest.com/dissertations-theses/exploiting-digital-frontier-hacker-typology/docview/1562270477/se-2?accountid=44888 (accessed on 24 April 2023).
- Back, S.; LaPrade, J.; Shehadeh, L.; Kim, M. Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal Profiling. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17–19 June 2019; pp. 410–413. [Google Scholar] [CrossRef]
- Preuß, J.; Furnell, S.M.; Papadaki, M. Considering the potential of criminal profiling to combat hacking. J. Comput. Virol. 2007, 3, 135–141. [Google Scholar] [CrossRef]
- Cayubit, R.; Rebolledo, K.; Kintanar, R.; Pastores, A.; Santiago, A.; Valles, P. A Cyber Phenomenon: A Q-Analysis on the Motivation of Computer Hackers. Psychol. Stud. 2017, 62, 386–394. [Google Scholar] [CrossRef]
- Woo, H.-J. The Hacker Mentality: Exploring the Relationship between Psychological Variables and Hacking Activities. Doctoral Dissertation, University of Georgia, Athens, GA, USA, 2003. Available online: https://esploro.libs.uga.edu/esploro/outputs/doctoral/The-hacker-mentality---exploring/9949334952002959 (accessed on 9 June 2023).
- Palmieri, M.J.H. Decrypting Personality: The Effects of Motivation, Social Power, and Anonymity on Cybercrime. Ph.D. Thesis, University of Massachusetts Lowell, Lowell, MA, USA, 2022. Available online: https://www.proquest.com/dissertations-theses/decrypting-personality-effects-motivation-social/docview/2724700785/se-2?accountid=44888 (accessed on 24 April 2023).
- Chiu, S.M. Self-Reported Criminal Computer Behavior among University Students in Hong Kong: A Study of Big-Five Personality Traits, Moral Choice, Exploitive Manipulative Behavior, and Addictive Tendencies. Ph.D. Thesis, Alliant International University, Alhambra, CA, USA, 2013. [Google Scholar]
- Seigfried-Spellar, K.C.; Villacís-Vukadinović, N.; Lynam, D.R. Computer criminal behavior is related to psychopathy and other antisocial behavior. J. Crim. Justice 2017, 51, 67–73. [Google Scholar] [CrossRef]
- Withers, K.L. A Psychosocial Behavioral Attribution Model: Examining the Relationship between the ‘Dark Triad’ and Cyber-Criminal Behaviors Impacting Social Networking Sites. Ph.D. Thesis, Nova Southeastern University, Fort Lauderdale, FL, USA, 2019. Available online: https://www.proquest.com/dissertations-theses/psychosocial-behavioral-attribution-model/docview/2208411493/se-2?accountid=44888 (accessed on 3 July 2023).
- Treadway, K.N. Comparing the Cognitive Abilities of Hackers and Non-Hackers Using a Self-Report Questionnaire. Master’s Thesis, Purdue University, West Lafayette, IN, USA, 2017. Available online: https://www.proquest.com/dissertations-theses/comparing-cognitive-abilities-hackers-non-using/docview/1947623946/se-2?accountid=44888 (accessed on 3 July 2023).
- Virgara, J.L.; Whitten, T. A systematic literature review of the longitudinal risk factors associated with juvenile cyber-deviance. Comput. Hum. Behav. 2023, 141, 107613. [Google Scholar] [CrossRef]
- Young, R.; Zhang, L.; Prybutok, V.R. Hacking into the Minds of Hackers. Inf. Syst. Manag. 2007, 24, 281–287. [Google Scholar] [CrossRef]
- Payne, K.-L.; Russell, A.; Mills, R.; Maras, K.; Rai, D.; Brosnan, M. Is There a Relationship Between Cyber-Dependent Crime, Autistic-Like Traits and Autism? J. Autism Dev. Disord. 2019, 49, 4159–4169. [Google Scholar] [CrossRef] [Green Version]
- Seigfried-Spellar, K.C.; Treadway, K.N. Differentiating Hackers, Identity Thieves, Cyberbullies, and Virus Writers by College Major and Individual Differences. Deviant Behav. 2014, 35, 782–803. [Google Scholar] [CrossRef]
- Kranenbarg, M.W.; Ruiter, S.; van Gelder, J.-L.; Bernasco, W. Cyber-Offending and Traditional Offending over the Life-Course: An Empirical Comparison. J. Dev. Life-Course Criminol. 2018, 4, 343–364. [Google Scholar] [CrossRef]
- Gordon, S.; Ma, Q. Convergence of Virus Writers and Hackers: Fact or Fantasy? Symantec Security Response, White Paper. 2003. Available online: https://silo.tips/download/inside-convergence-of-virus-writers-and-hackers-fact-or-fantasy-symantec-securit (accessed on 9 June 2023).
- Rogers, M.K.; Seigfried, K.; Tidke, K. Self-reported computer criminal behavior: A psychological analysis. Digit. Investig. 2006, 3, 116–120. [Google Scholar] [CrossRef]
- Preuss, J.; Furnell, S.M.; Lea, S.J. Research in Progress Short Paper: The Adoption of Criminal Profiling for Computer Crime. In Proceedings of the 2004 EICAR Conference, Luxemburg, 1–4 May 2004. [Google Scholar]
- Tompsett, B.C.; Marshall, A.M.; Semmens, N.C. Cyberprofiling: Offender profiling and geographic profiling of crime on the Internet. In Proceedings of the Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, 5–9 September 2005; pp. 21–24. [Google Scholar] [CrossRef]
- Casey, E. The value of behavioral analysis in digital investigations. Digit. Investig. 2006, 3, 57–58. [Google Scholar] [CrossRef]
- Kwan, L.; Ray, P.; Stephens, G. Towards a Methodology for Profiling Cyber Criminals. In Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, Big Island, HI, USA, 7–10 January 2008; p. 264. [Google Scholar] [CrossRef]
- Donato, L. An Introduction to How Criminal Profiling Could Be Used as a Support for Computer Hacking Investigations. J. Digit. Forensic Pract. 2009, 2, 183–195. [Google Scholar] [CrossRef]
- Casey, E.; Turvey, B. Investigative reconstruction with digital evidence. In Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet; Academic Press: London, UK, 2011; pp. 255–284. [Google Scholar]
- Lickiewicz, J. Cyber Crime Psychology-Proposal of an Offender Psychological Profile. Probl. Forensic Sci. 2011, 87, 239–252. Available online: https://arch.ies.gov.pl/images/PDF/2011/vol_87/87_Lickiewicz.pdf (accessed on 23 May 2023).
- Tennakoon, H. The Need for a Comprehensive Methodology for Profiling Cyber-Criminals. 2011. Available online: http://www.newsecuritylearning.com/index.php/archive/150-the-need-for-a-comprehensive-methodology-for-profiling-cyber-criminals (accessed on 13 May 2023).
- Long, L. Profiling Hackers | SANS Institute, SANS Institute, White Paper. 2012. Available online: https://www.sans.org/white-papers/33864/ (accessed on 9 June 2023).
- Donato, L. Profiling cyber offenders. Cybertalk Mag. 2014, 4, 30–31. [Google Scholar]
- Saroha, R. Profiling a cyber criminal. Int. J. Inf. Comput. Technol. 2014, 4, 253–258. [Google Scholar]
- Steel, C. Idiographic Digital Profiling: Behavioral Analysis Based on Digital Forensics. J. Digit. Forensics Secur. Law 2014, 9, 1. Available online: https://commons.erau.edu/jdfsl/vol9/iss1/1/ (accessed on 31 October 2022). [CrossRef] [Green Version]
- Rogers, M.K. Psychological profiling as an investigative tool for digital forensics. In Digital Forensics; Sammons, J., Ed.; Syngress: Boston, MA, USA, 2016; pp. 45–58. [Google Scholar] [CrossRef]
- Zuhri, F. The Profile of a Cybercriminal. Digital Forensic Magazine. Available online: https://digitalforensicsmagazine.com/blogs/wp-content/uploads/2017/05/The-Profile-of-Cybercriminal.pdf (accessed on 23 May 2023).
- Balogun, A.M.; Zuva, T. Open issues in cybercriminal profiling. In Proceedings of the 2017 1st International Conference on Next Generation Computing Applications (NextComp), Mauritius, 19–21 July 2017; pp. 141–145. [Google Scholar] [CrossRef]
- Garcia, N. The Use of Criminal Profiling in Cybercrime Investigations. Master’s Thesis, Utica College, New York, NY, USA, 2018. Available online: https://www.proquest.com/dissertations-theses/use-criminal-profiling-cybercrime-investigations/docview/2088464663/se-2?accountid=44888 (accessed on 24 April 2023).
- Kipane, A. Meaning of profiling of cybercriminals in the security context. SHS Web Conf. 2019, 68, 01009. [Google Scholar] [CrossRef] [Green Version]
- Georgiev, V. Profiling Human Roles in Cybercrime. Inf. Secur. Int. J. 2019, 43, 145–160. [Google Scholar] [CrossRef]
- Spicer, J. Cybercriminal Profiling. EDPACS 2019, 60, 1–17. [Google Scholar] [CrossRef]
- Sutter, O.W. The Cyber Profile: Determining Human Behavior through Cyber-Actions. Ph.D. Dissertation, Capitol Technology University, Laurel, MD, USA, 2020. Available online: https://www.proquest.com/dissertations-theses/cyber-profile-determining-human-behavior-through/docview/2702876139/se-2 (accessed on 24 April 2023).
- Donato, L.M. Computer Criminal Profiling Applied to Digital Investigations. Ph.D. Thesis, De Montfort University, Leicester, UK, 2021. Available online: https://www.proquest.com/dissertations-theses/computer-criminal-profiling-applied-digital/docview/2685242618/se-2?accountid=44888 (accessed on 22 May 2023).
- Bednarz, A. Profiling cybercriminals: A promising but immature science. Netw. World 2004, 21, 46–48. [Google Scholar]
- Turvey, B.E. Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 2nd ed.; Academic Press: San Diego, CA, USA, 2002. [Google Scholar]
- Crimmins, D.M. A Predictive Model for Self-reported Computer Criminal Behavior among College Students. Master’s Thesis, Purdue University, West Lafayette, IN, USA, 2015. Available online: https://www.proquest.com/dissertations-theses/predictive-model-self-reported-computer-criminal/docview/1728049327/se-2?accountid=44888 (accessed on 3 July 2023).
- Pahi, T.; Skopik, F. Cyber Attribution 2.0: Capture the False Flag. Eur. Conf. Cyber Warf. Secur. 2019, XVIII, 338–345. [Google Scholar]
- Aiken, M.P.; McMahon, C. The Cyberpsychology of Internet Facilitated Organized Crime. Europol Organized Crime Threat Assessment Report (iOCTA). 2014. Available online: https://www.europol.europa.eu/publications-events/main-reports/internet-organised-crime-threat-assessment-iocta-2014 (accessed on 26 June 2023).
- CC-Driver Project. CC-DRIVER. Available online: https://www.ccdriver-h2020.com/project (accessed on 26 June 2023).
- Frumento, E.; Freschi, F.; Andreoletti, D.; Consoli, A. Victim Communication Stack (VCS): A Flexible Model to Select the Human Attack Vector. In Proceedings of the 12th International Conference on Availability, Reliability and Security, in ARES ’17, Reggio Calabria, Italy, 29 August–1 September 2017; Association for Computing Machinery: New York, NY, USA, 2017. [Google Scholar] [CrossRef]
- Somer, T. Taxonomies of Cybercrime: An Overview and Proposal to be Used in Mapping Cyber Criminal Journeys. Eur. Conf. Cyber Warf. Secur. 2019, XIX, 475–483. [Google Scholar]
- The Council of Europe. The Council of Europe Cybercrime Convention; The Council of Europe: Strasbourg, France, 2001; Available online: https://www.coe.int/en/web/cybercrime/the-budapest-convention (accessed on 9 June 2023).
- Levy, S. Hackers: Heroes of the Computer Revolution, 25th ed.; O’Reilly Media: Sebastopol, CA, USA, 2010; Available online: https://www.amazon.ca/Hackers-Heroes-Computer-Revolution-Anniversary/dp/1449388396 (accessed on 12 February 2023).
- Wark, M. A Hacker Manifesto; Harvard University Press: Boston, MA, USA, 2004; Available online: https://www.amazon.ca/Hacker-Manifesto-McKenzie-Wark/dp/0674015436 (accessed on 12 February 2023).
- Europol, Europol Spotlight—The Cyber Blue Line. 2021. Available online: https://www.europol.europa.eu/publications-events/publications/europol-spotlight-cyber-blue-line (accessed on 26 June 2023).
- Davidson, J.; Aiken, M.P.; Phillips, K.; Farr, R. European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report; Institute for Connected Communities, University of East London: London, UK, 2022; Available online: https://www.ccdriver-h2020.com/_files/ugd/0ef83d_a8b9ac13e0cf4613bc8f150c56302282.pdf (accessed on 26 June 2023).
- Malin, C.H. C32.1Digital Behavioral Criminalistics to Elucidate the Cyber Pathway to Intended Violence. In International Handbook of Threat Assessment; Meloy, J.R., Hoffmann, J., Eds.; Oxford University Press: Oxford, UK, 2021. [Google Scholar] [CrossRef]
- INDRA. CyberRoad: Development of the CYBER Crime and CYBER Terrorism Research ROADmap. Indra. Available online: https://www.indracompany.com/en/indra/cyberroad-development-cyber-crime-cyber-terrorism-research-roadmap (accessed on 11 June 2023).
- Victimology Definition & Meaning—Merriam-Webster. Available online: https://www.merriam-webster.com/dictionary/victimology (accessed on 10 June 2023).
- What Is OSINT (Open-Source Intelligence?). SANS Institute. Available online: https://www.sans.org/blog/what-is-open-source-intelligence/ (accessed on 10 June 2023).
- Modus Operandi. Criminology. Britannica. Available online: https://www.britannica.com/topic/modus-operandi (accessed on 10 June 2023).
- MITRE ATT&CK®. Available online: https://attack.mitre.org/ (accessed on 10 June 2023).
- Connolly, I.; Palmer, M.; Barton, H.; Kirwan, G. An Introduction to Cyberpsychology; Routledge: Abingdon, UK, 2016. [Google Scholar] [CrossRef]
Item | Description | |
---|---|---|
Descriptive | Year of Publication | The year in which the item was published or submitted |
Publication Type | Book, book chapter, journal article, magazine article, dissertation, trade report, conference paper, LE bulletin | |
Authors | Authors | |
Discipline | Criminologist, psychologist, sociologist, law enforcement, computer science, multi-disciplinary | |
Country | Country of authors | |
Peer review status | Peer reviewed or non-peer reviewed | |
Study Type | Qualitative or quantitative | |
Emphasis | Case study, comparison study, discussion piece, evaluation, literature review, primary empirical, theoretical | |
Sample size | Number of participants in research | |
Sampling technique | Sampling technique employed in research | |
Method | Method used for data collection | |
Use of statistics | No statistics, descriptive statistics or inferential statistics | |
Number of citations | Number of citations according to Google Scholar | |
Profiling Approach | Inductive, deductive, mixed, none | |
In-Depth | Variables | List of the variables included in analysis |
Study Results | Summary of the study results | |
Theoretical frameworks | List of any theoretical frameworks identified as informing the study | |
Bias evaluation | Identification of any sources of bias |
Study Variables | Frequency | Percentage |
---|---|---|
Publication Decade | ||
1980–1989 | 2 | 2.8 |
1990–1999 | 0 | 0.0 |
2000–2009 | 24 | 33.3 |
2010–2019 | 40 | 55.6 |
2019–2023 | 6 | 8.3 |
No. of articles by author | ||
One article | 104 | 91.2 |
Two articles | 8 | 7 |
Three articles | 1 | 0.9 |
Six articles | 1 | 0.9 |
Discipline of Authors | ||
Computer Science/IT | 32 | 44.4 |
Criminology | 8 | 11.1 |
Law Enforcement | 3 | 4.2 |
Psychology | 7 | 9.7 |
Sociology | 1 | 1.4 |
Multidisciplinary | 13 | 18.1 |
Other (unspecified) | 8 | 11.1 |
Publication Type | ||
Book | 3 | 4.2 |
Book chapter | 3 | 4.2 |
Conference paper | 11 | 15.3 |
Dissertation | 12 | 16.7 |
Industry report | 3 | 4.2 |
Journal article | 32 | 44.4 |
LE bulletin | 1 | 1.4 |
Magazine article | 7 | 9.7 |
Review Status | ||
Peer reviewed | 33 | 45.8 |
Non-peer reviewed | 39 | 54.2 |
Type of Statistics | Tests & Statistics |
---|---|
Assumptions | Normality; Homogeneity of variance; Independence; correlations for regression; Homogeneity of regression |
Power and effect size | Statistical power |
Descriptive | Frequency count; Percentages; Cross-tabulation; Mean; Standard deviation; Standard error; Median |
Reliability | Cronbach’s alpha |
Correlational | Pearson’s correlation; zero-order correlation; Spearman’s correlation |
Regression | Logistic regression (LG); Linear regression; Multiple regression correlation (MRC); Stepwise multiple regression; Backward stepwise (Wald) logistic regression; Stepwise logic regression |
Model fit | Hosmer and Lemeshow |
Univariate | Independent samples t-test; One-way ANOVA; Seemingly unrelated estimation |
Multivariate | MANOVA |
Co-variate | ANCOVA, MANCOVA |
Probability distribution | Wilk’s lambda |
Non-parametric | Fisher’s exact; Likelihood Ratio Chi Square; Mann–Whitney U; Wilcoxon W |
Post-hoc | Bonferroni; Hochberg’s GT2; Games–Howell; Hotelling’s Trace; Hosmer and Lemeshow; Hosmer and Lemeshow’s Measure (RL2) |
Alpha levels | 0.001; 0.01; 0.02; 0.05; 0.10 |
Rank | Reference | Authors | Year | Total Citations | Impact Score |
---|---|---|---|---|---|
1 | [11] | Cross, M. | 2008 | 349 | 23.3 |
2 | [25] | Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Yassin, W., Hassan, A., Abdulkareem, K.H. Ali, N.S., & Yunos, Z. | 2020 | 40 | 13.3 |
3 | [26] | Madarie, R | 2017 | 67 | 11.2 |
4 | [27] | Kirwan, G. & Power, A | 2013 | 104 | 10.4 |
5 | [28] | Chiesa, R., Ducci, S., & Ciappi, S. | 2008 | 133 | 9.5 |
6 | [29] | Rogers, M.K., Smoak, N.D., & Liu, J. | 2006 | 160 | 9.4 |
7 | [30] | Bachmann, M. | 2010 | 115 | 8.8 |
8 | [31] | Nykodym, N., Taylor, R., & Vilela, J. | 2005 | 146 | 8.1 |
9 | [32] | Rogers, M.K. | 2001 | 177 | 8.0 |
10 | [33] | Rogers, M.K. | 2003 | 160 | 8.0 |
Typologies | Papers |
---|---|
Old school hackers/old guard hackers | [35,36] |
Bedroom hackers, casual hackers | [35,37] |
Larval hackers & newbies/novices | [35,36,37,38] |
WaRez D00dz | [39] |
Internet hackers | [39] |
Hacktivists/political activists | [35,36,38,40] |
Script kiddies | [35,41] |
Hackers | [35] |
Crackers/cyber-punks/cybercriminals | [36,38,41] |
Internals/disgruntled insiders | [36,42] |
Petty thieves/the bank robber | [36,40,42] |
Virus writers | [41] |
Professional criminals, cyber syndicates | [36,38,40] |
Information warriors | [41] |
Cyber terrorists | [37] |
Spies | [38,40] |
Guru hackers | [42] |
The accidental hacker | [38] |
The rogue gamer | [38] |
Nation state hacker | [38] |
Motive | Papers |
---|---|
Non-specific malice | [40] |
Revenge | [42,43,44,45] |
Ideological motives/the soapbox, hacktivism /fight for freedom | [29,39,41,43,45] |
Commercial sabotage, espionage | [41,43] |
Warfare/the war zone | [39,41,43] |
Playpen/for fun | [29,39,45,46] |
Monetary/cookie jar, extortion/fraud | [29,39,41,42,44,47] |
Curiosity | [27,41,46] |
Vandalism | [35] |
Intellectual challenge | [27,29] |
Power trip | [28] |
Escape from their physical life | [28] |
Notoriety/fame/peer recognition | [27,29,44,45,47] |
Addiction | [48] |
Mental health disorder | [44] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Martineau, M.; Spiridon, E.; Aiken, M. A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sci. 2023, 3, 452-477. https://doi.org/10.3390/forensicsci3030032
Martineau M, Spiridon E, Aiken M. A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sciences. 2023; 3(3):452-477. https://doi.org/10.3390/forensicsci3030032
Chicago/Turabian StyleMartineau, Melissa, Elena Spiridon, and Mary Aiken. 2023. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature" Forensic Sciences 3, no. 3: 452-477. https://doi.org/10.3390/forensicsci3030032
APA StyleMartineau, M., Spiridon, E., & Aiken, M. (2023). A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sciences, 3(3), 452-477. https://doi.org/10.3390/forensicsci3030032