Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks

Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By co...

Full description

Saved in:
Bibliographic Details
Main Authors: Renushka Madarie, Marleen Weulen Kranenbarg, Christianne de Poot
Format: Article
Language:English
Published: Elsevier 2025-03-01
Series:Computers in Human Behavior Reports
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2451958824001817
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850229178607075328
author Renushka Madarie
Marleen Weulen Kranenbarg
Christianne de Poot
author_facet Renushka Madarie
Marleen Weulen Kranenbarg
Christianne de Poot
author_sort Renushka Madarie
collection DOAJ
description Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.
format Article
id doaj-art-9d36a9e7cbfa49998b3552d32535b20c
institution OA Journals
issn 2451-9588
language English
publishDate 2025-03-01
publisher Elsevier
record_format Article
series Computers in Human Behavior Reports
spelling doaj-art-9d36a9e7cbfa49998b3552d32535b20c2025-08-20T02:04:18ZengElsevierComputers in Human Behavior Reports2451-95882025-03-011710054810.1016/j.chbr.2024.100548Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networksRenushka Madarie0Marleen Weulen Kranenbarg1Christianne de Poot2Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands; Research Group Forensic Science, Faculty of Technology, Amsterdam University of Applied Sciences, Tafelbergweg 51, 1105 BD, Amsterdam, the Netherlands; Corresponding author. Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands.Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the NetherlandsDepartment of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands; Research Group Forensic Science, Faculty of Technology, Amsterdam University of Applied Sciences, Tafelbergweg 51, 1105 BD, Amsterdam, the NetherlandsPrior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.http://www.sciencedirect.com/science/article/pii/S2451958824001817HackingSystem trespassingStolen dataCrime script analysisCybercrime
spellingShingle Renushka Madarie
Marleen Weulen Kranenbarg
Christianne de Poot
Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
Computers in Human Behavior Reports
Hacking
System trespassing
Stolen data
Crime script analysis
Cybercrime
title Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
title_full Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
title_fullStr Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
title_full_unstemmed Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
title_short Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
title_sort examining the cyclical nature of crimes a looped crime script of data theft from organizational networks
topic Hacking
System trespassing
Stolen data
Crime script analysis
Cybercrime
url http://www.sciencedirect.com/science/article/pii/S2451958824001817
work_keys_str_mv AT renushkamadarie examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks
AT marleenweulenkranenbarg examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks
AT christiannedepoot examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks