IDEAS home Printed from https://ideas.repec.org/a/cwf/netart/net202469.html

Criminal Behavior Analysis of Cybercriminals: Profiles, Motivations, and Trends in Cybersecurity

Author

Listed:
  • Checchia, Cecilia Elizabeth
  • Bolzan, Francisco Gabriel

Abstract

Within the vast territory of the digital world, a challenge has emerged in recent years, that of the cybercriminal. This agent, with perplexing technical skills, transcends physical borders, threatening the security and privacy of individuals, businesses, and institutions alike. In this context, the need to unravel the mysteries surrounding their behavior becomes evident. Thus, this research becomes a source of knowledge in the midst of this complex digital environment by addressing the modus operandi of these malicious actors and, in doing so, aspiring to understand their psychological profiles, motivations, and patterns of action within the broad field of cybersecurity.Through the exploration of cases that have occurred in our country and the analysis of literature, this study aims to provide a comprehensive overview of how these figures maneuver in the virtual space. The goal is not only to observe their actions but also to decipher the background of their intentions. As we investigate this scenario, the need to implement both preventive and corrective approaches that are effective in mitigating their impact becomes evident.This research represents a commitment to expanding the spectrum of knowledge regarding criminal behavior in the digital realm. The objective is undoubtedly to strengthen the sphere of cybersecurity through the substantial contribution it makes to the understanding of these actors and, consequently, to the development of mitigation strategies. However, its implications go beyond lines of code and security protocols. By providing a solid foundation of understanding, the aim is to protect not only systems but also individuals, organizations, and institutions facing these digital threats.The convergence of psychology, criminology, and cybersecurity provides us with a more comprehensive view that goes beyond the purely technical and delves into underlying motivations. This union, at its core, aims to establish a robust defense in this ongoing digital battlefield.This study presents itself as a concrete effort to explore the most enigmatic aspects of the interaction between humans and machines, where malice, intention, and vulnerability intertwine. Through this research, we embark on a journey toward understanding and, consequently, toward preparing for a safer coexistence in the digital environment.

Suggested Citation

Handle: RePEc:cwf:netart:net202469
DOI: 10.62486/net202469
as

Download full text from publisher

File URL: https://southam.pub/journals/files/net/net202469en.pdf
Download Restriction: no

File URL: https://southam.pub/journals/files/net/net202469es.pdf
Download Restriction: no

File URL: https://libkey.io/10.62486/net202469?utm_source=ideas
LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
---><---

More about this item

Statistics

Access and download statistics

Corrections

All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:cwf:netart:net202469. See general information about how to correct material in RePEc.

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

We have no bibliographic references for this item. You can help adding them by using this form .

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: South American Publishing Journals Manager (email available below). General contact details of provider: https://www.southam.pub/ .

Please note that corrections may take a couple of weeks to filter through the various RePEc services.

IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.