{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:33Z","timestamp":1771661073304,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_65","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"986-1002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cybercrime in the Context of COVID-19"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Chawki","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"crossref","unstructured":"Alzahrani, A.: Coronavirus social engineering attacks: issues and recommendations. Int. J. Adv. Comput. Sci. Appl. IJACSA 11(5) (2020)","DOI":"10.14569\/IJACSA.2020.0110523"},{"key":"65_CR2","unstructured":"Anscombe, T.: Beware Scams Exploiting Coronavirus Fears (2020). www.welivesecurity.com, Accessed 5 Dec 2020"},{"key":"65_CR3","unstructured":"Arsene, L.: Coronavirus Phishing Scams Exploit Misinformation (2020). www.hotforsecurity.bitdefender.com, Accessed 2 Dec 2020"},{"key":"65_CR4","unstructured":"Azzara, M.: Coronavirus Phishing Attacks Speed up Globally (2020). www.mimecast.com, Accessed 4 Apr 2020"},{"key":"65_CR5","unstructured":"Basquill, J.: Fraud, money laundering and cybercrime: how Covid-19 has changed the threat to banks (2020). www.gtreview.com, Accessed 9 Sept (2020)"},{"issue":"5","key":"65_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-019-1507-y","volume":"44","author":"SS Bhuyan","year":"2020","unstructured":"Bhuyan, S.S., et al.: Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J. Med. Syst. 44(5), 1\u20139 (2020). https:\/\/doi.org\/10.1007\/s10916-019-1507-y","journal-title":"J. Med. Syst."},{"key":"65_CR7","unstructured":"Blanco, A.: The impact of COVID-19 on the spread of cybercrime. www.bbva.com, Accessed 16 Sept 2020"},{"key":"65_CR8","unstructured":"Bogdandy, A., Villarreal, P.: International Law on Pandemic Response: The First Stocktaking in Light of the coronavirus Crisis, p. 1. Max Planck Institute for Comparative Public Law and International Law (MPILM.P.I.L.search paper no. 2020\u201307 (2006)"},{"key":"65_CR9","unstructured":"Circulus, L.: Hackers, use fake WHO emails to exploit coronavirus fears (2020). www.politico.eu, Accessed 1 Apr 2020"},{"key":"65_CR10","unstructured":"Chawki, M.: Nigeria tackles advance fee fraud. JILT (1) (2009)"},{"key":"65_CR11","unstructured":"Chawki, M., Wahab, M.: Identity theft in cyberspace: issues and solutions in lex electronica. 11(1) (2006)"},{"key":"65_CR12","unstructured":"Grimes, R.: Why It's So Hard to Prosecute Cybercriminals (2016). www.csoonline.com, Accessed 2 Apr (2020)"},{"key":"65_CR13","unstructured":"Guirakhoo, A.: How Cybercriminals Are Taking Advantage of COVID-19: Scams, Fraud, and Misinformation. www.digitalshadows.com, Accessed 2 Apr 2020"},{"key":"65_CR14","doi-asserted-by":"crossref","unstructured":"Lallie, H., et al.: Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic (2020). www.researchgate.net, Accessed 6 Dec (2020)","DOI":"10.1016\/j.cose.2021.102248"},{"key":"65_CR15","unstructured":"Mellone, P.: Coronavirus and Phishing: All You Need to Know (2020). www.increasily.com, Accessed 2 Apr 2020"},{"issue":"3","key":"65_CR16","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/0960085X.2020.1771222","volume":"29","author":"R Naidoo","year":"2020","unstructured":"Naidoo, R.: A multi-level influence model of COVID-19 themed cybercrime. Eur. J. Inf. Syst. 29(3), 306\u2013321 (2020). https:\/\/doi.org\/10.1080\/0960085X.2020.1771222","journal-title":"Eur. J. Inf. Syst."},{"key":"65_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-030-00979-3_3","volume-title":"Intelligent Computing & Optimization","author":"H Rehman","year":"2019","unstructured":"Rehman, H., Yafi, E., Nazir, M., Mustafa, K.: Security assurance against cybercrime ransomware. In: Vasant, P., Zelinka, I., Weber, G.-W. (eds.) ICO 2018. AISC, vol. 866, pp. 21\u201334. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-00979-3_3"},{"key":"65_CR18","unstructured":"Rosenbaum, E.: Phishing scams: Spam spikes as hackers use coronavirus to prey on remote workers, stressed I.T. sI.T.tems (2020). www.cnbc.com, Accessed 1 Apr 2020"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Singh, C.: Meenu phishing website detection based on machine learning: a survey. In: 2020 6th International Conference on Advanced Computing and Communication Systems, ICACI.C.A.C.C.S.0, pp. 398\u2013404 (2020)","DOI":"10.1109\/ICACCS48705.2020.9074400"},{"key":"65_CR20","unstructured":"Stevens, G.: Popular Techniques used by cybercriminals amid covid-19 (2020). www.carbonblack.com, Accessed 12 Dec 2020"},{"issue":"3","key":"65_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MITP.2020.2988330","volume":"22","author":"T Weil","year":"2020","unstructured":"Weil, T., Murugesan, S.: IT risk and resilience\u2014cybersecurity response to COVID-19. IT Prof. 22(3), 4\u201310 (2020). https:\/\/doi.org\/10.1109\/MITP.2020.2988330","journal-title":"IT Prof."},{"issue":"3","key":"65_CR22","doi-asserted-by":"publisher","first-page":"216","DOI":"10.2345\/0899-8205-54.3.216","volume":"54","author":"A Wirth","year":"2020","unstructured":"Wirth, A.: Cyberinsights: COVID-19 and what it means for cybersecurity. Biomed. Instrum. Technol. 54(3), 216\u2013219 (2020)","journal-title":"Biomed. Instrum. Technol."},{"key":"65_CR23","unstructured":"www.europol.europa.eu, Accessed 9 Apr 2020"},{"key":"65_CR24","unstructured":"www.ifcc.org, Accessed 10 Apr 2020"},{"key":"65_CR25","unstructured":"www.securitymagazine.com, Accessed 2 Apr 2020"},{"key":"65_CR26","unstructured":"www.trendmicro.com, Accessed 13 Apr 2020"},{"key":"65_CR27","unstructured":"www.worldmeters.info, Accessed 10 Apr 2020"},{"key":"65_CR28","unstructured":"www.freshbooks.com, Accessed 9 May 2020"},{"key":"65_CR29","unstructured":"www.privacy-europe.com, Accessed 2 June 2020"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:56Z","timestamp":1771658036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_65","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}