IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v6y2013i1p28-38.html
   My bibliography  Save this article

Crimeware-as-a-service—A survey of commoditized crimeware in the underground market

Author

Listed:
  • Sood, Aditya K.
  • Enbody, Richard J.

Abstract

Crimeware-as-a-service (CaaS) has become a prominent component of the underground economy. CaaS provides a new dimension to cyber crime by making it more organized, automated, and accessible to criminals with limited technical skills. This paper dissects CaaS and explains the essence of the underground economy that has grown around it. The paper also describes the various crimeware services that are provided in the underground market.

Suggested Citation

  • Sood, Aditya K. & Enbody, Richard J., 2013. "Crimeware-as-a-service—A survey of commoditized crimeware in the underground market," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(1), pages 28-38.
  • Handle: RePEc:eee:ijocip:v:6:y:2013:i:1:p:28-38
    DOI: 10.1016/j.ijcip.2013.01.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548213000036
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2013.01.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Susan W. Brenner, 2004. "U.S. Cybercrime Law: Defining Offenses," Information Systems Frontiers, Springer, vol. 6(2), pages 115-132, June.
    2. Steigerwald, Douglas & Vigna, Giovanni & Kruegel, Christopher & Kemmerer, Richard & Abman, Ryan & Stone-Gross, Brett, 2011. "The Underground Economy of Fake Antivirus Software," University of California at Santa Barbara, Economics Working Paper Series qt7p07k0zr, Department of Economics, UC Santa Barbara.
    3. Tyler Moore & Richard Clayton & Ross Anderson, 2009. "The Economics of Online Crime," Journal of Economic Perspectives, American Economic Association, vol. 23(3), pages 3-20, Summer.
    4. Anderson, David A., 2012. "The Cost of Crime," Foundations and Trends(R) in Microeconomics, now publishers, vol. 7(3), pages 209-265, September.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Gauguier, Jean-Jacques, 2009. "L’industrialisation de l’Open Source," Economics Thesis from University Paris Dauphine, Paris Dauphine University, number 123456789/4388 edited by Toledano, Joëlle.
    2. Seo-Young Cho, 2016. "A crime 2.0 - cybercrime, e-talent, and institutions," MAGKS Papers on Economics 201608, Philipps-Universität Marburg, Faculty of Business Administration and Economics, Department of Economics (Volkswirtschaftliche Abteilung).
    3. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    4. Kjell Hausken, 2017. "Security Investment, Hacking, and Information Sharing between Firms and between Hackers," Games, MDPI, vol. 8(2), pages 1-23, May.
    5. Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
    6. Kjell Hausken, 2018. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 20(01), pages 1-30, March.
    7. Dan Kovenock & Brian Roberson & Roman M. Sheremeta, 2019. "The attack and defense of weakest-link networks," Public Choice, Springer, vol. 179(3), pages 175-194, June.
    8. Tyler MOORE & Richard CLAYTON, 2011. "The Impact of Public Information on Phishing Attack and Defense," Communications & Strategies, IDATE, Com&Strat dept., vol. 1(81), pages 45-68, 1st quart.
    9. Cloos, Janis & Mohr, Svenja, 2022. "Acceptance of data sharing in smartphone apps from key industries of the digital transformation: A representative population survey for Germany," Technological Forecasting and Social Change, Elsevier, vol. 176(C).
    10. Lam, Wing Man Wynne, 2016. "Attack-prevention and damage-control investments in cybersecurity," Information Economics and Policy, Elsevier, vol. 37(C), pages 42-51.
    11. Schmidt, Andreas, 2012. "At the boundaries of peer production: The organization of Internet security production in the cases of Estonia 2007 and Conficker," Telecommunications Policy, Elsevier, vol. 36(6), pages 451-461.
    12. Wickramasekera, Nyantara & Wright, Judy & Elsey, Helen & Murray, Jenni & Tubeuf, Sandy, 2015. "Cost of crime: A systematic review," Journal of Criminal Justice, Elsevier, vol. 43(3), pages 218-228.
    13. Giacomo Battiston & Gianmarco Daniele & Marco Le Moglie & Paolo Pinotti, 2022. "Fueling Organized Crime: The Mexican War on Drugs and Oil Thefts," "Marco Fanno" Working Papers 0286, Dipartimento di Scienze Economiche "Marco Fanno".
    14. Moghaddam, M.R., 2003. "Improving Iran's Domestic Energy Basket," Other publications TiSEM 6af748d0-216c-4ca2-ac35-b, Tilburg University, School of Economics and Management.
    15. Lam, Wing Man Wynne, 2014. "Ex Ante and Ex Post Investments in Cybersecurity," TSE Working Papers 14-519, Toulouse School of Economics (TSE).
    16. Milena Dinkova & Ramy El-Dardiry & Bastiaan Overvest, 2020. "Cyber incidents, security measures and financial returns: Empirical evidence from Dutch firms," CPB Discussion Paper 411.rdf, CPB Netherlands Bureau for Economic Policy Analysis.
    17. Reurink, Arjan, 2016. "Financial fraud: A literature review," MPIfG Discussion Paper 16/5, Max Planck Institute for the Study of Societies.
    18. Jacob Vogler, 2020. "Access to Healthcare and Criminal Behavior: Evidence from the ACA Medicaid Expansions," Journal of Policy Analysis and Management, John Wiley & Sons, Ltd., vol. 39(4), pages 1166-1213, September.
    19. Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
    20. Brushwood, James & Dhaliwal, Dan & Fairhurst, Douglas & Serfling, Matthew, 2016. "Property crime, earnings variability, and the cost of capital," Journal of Corporate Finance, Elsevier, vol. 40(C), pages 142-173.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:6:y:2013:i:1:p:28-38. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.