Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks
Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By co...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-03-01
|
| Series: | Computers in Human Behavior Reports |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2451958824001817 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850229178607075328 |
|---|---|
| author | Renushka Madarie Marleen Weulen Kranenbarg Christianne de Poot |
| author_facet | Renushka Madarie Marleen Weulen Kranenbarg Christianne de Poot |
| author_sort | Renushka Madarie |
| collection | DOAJ |
| description | Prior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies. |
| format | Article |
| id | doaj-art-9d36a9e7cbfa49998b3552d32535b20c |
| institution | OA Journals |
| issn | 2451-9588 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | Elsevier |
| record_format | Article |
| series | Computers in Human Behavior Reports |
| spelling | doaj-art-9d36a9e7cbfa49998b3552d32535b20c2025-08-20T02:04:18ZengElsevierComputers in Human Behavior Reports2451-95882025-03-011710054810.1016/j.chbr.2024.100548Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networksRenushka Madarie0Marleen Weulen Kranenbarg1Christianne de Poot2Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands; Research Group Forensic Science, Faculty of Technology, Amsterdam University of Applied Sciences, Tafelbergweg 51, 1105 BD, Amsterdam, the Netherlands; Corresponding author. Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands.Department of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the NetherlandsDepartment of Criminology, Faculty of Law, Vrije Universiteit (VU) Amsterdam, De Boelelaan 1105, 1081 HV, Amsterdam, the Netherlands; Research Group Forensic Science, Faculty of Technology, Amsterdam University of Applied Sciences, Tafelbergweg 51, 1105 BD, Amsterdam, the NetherlandsPrior research on network attacks is predominantly technical, yet little is known about behavioral patterns of attackers inside computer systems. This study adopts a criminological perspective to examine these patterns, with a particular focus on data thieves targeting organizational networks. By conducting interviews with cybersecurity experts and applying crime script analysis, we developed a comprehensive script that describes the typical progression of attackers through organizational systems and networks in order to eventually steal data. This script integrates phases identified in previous academic literature and expert-defined phases that resemble phases from industry threat models. However, in contrast to prior cybercrime scripts and industry threat models, we did not only identify sequential phases, but also illustrate the circular nature of network attacks. This finding challenges traditional perceptions of crime as a linear process. In addition, our findings underscore the importance of considering both successful and failed attacks in cybercrime research to develop more effective cybersecurity strategies.http://www.sciencedirect.com/science/article/pii/S2451958824001817HackingSystem trespassingStolen dataCrime script analysisCybercrime |
| spellingShingle | Renushka Madarie Marleen Weulen Kranenbarg Christianne de Poot Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks Computers in Human Behavior Reports Hacking System trespassing Stolen data Crime script analysis Cybercrime |
| title | Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks |
| title_full | Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks |
| title_fullStr | Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks |
| title_full_unstemmed | Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks |
| title_short | Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks |
| title_sort | examining the cyclical nature of crimes a looped crime script of data theft from organizational networks |
| topic | Hacking System trespassing Stolen data Crime script analysis Cybercrime |
| url | http://www.sciencedirect.com/science/article/pii/S2451958824001817 |
| work_keys_str_mv | AT renushkamadarie examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks AT marleenweulenkranenbarg examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks AT christiannedepoot examiningthecyclicalnatureofcrimesaloopedcrimescriptofdatatheftfromorganizationalnetworks |