{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:19:23Z","timestamp":1758809963232,"version":"3.41.2"},"reference-count":130,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":323,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001794","name":"University of Queensland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001794","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Situational Crime Prevention (SCP) is a well-documented crime prevention approach that reduces criminal opportunities for a range of different crimes. However, SCP adoption in combating cybercrimes is currently limited. Current cybersecurity controls are not mapped to crime prevention techniques, and consequently, it is hard to gauge if existing controls are actually effective in reducing crime opportunities. The dynamic environments and complex nature of cybercrimes\u2014spanning from human-centric cyber-enabled crimes to highly technical cyber-focused crimes\u2014exacerbate the inability to apply or measure cybersecurity controls for crime prevention effectiveness. Using best practices from the globally adopted ISO\/IEC 27002:2022 standard, our paper aligns industry best-practice cybersecurity controls with the five SCP strategies and 25 techniques. We conduct a comprehensive review of 1788 peer-reviewed academic articles across computer science, criminal justice, and criminology literature using the PRISMA method. We elucidate how our common inventory of SCP-based cybersecurity controls is developed and the rationale behind the mapping of ISO\/IEC controls to SCP classification. We propose our SCP-C3 (Concentrate, Comprehend, and Consider) cycle as an instrument to facilitate multi-disciplinary research in cybercrime prevention and illustrate conceptually how our SCP-C3 cycle and common inventory can be applied at intervention points in cybercrime modelling techniques in a multi-disciplinary environment.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae020","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T15:57:07Z","timestamp":1732031827000},"source":"Crossref","is-referenced-by-count":1,"title":["Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO\/IEC 27002:2022 to prevent cybercrimes"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5917-6532","authenticated-orcid":false,"given":"Heemeng","family":"Ho","sequence":"first","affiliation":[{"name":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","place":["Australia"]}]},{"given":"Ryan","family":"Ko","sequence":"additional","affiliation":[{"name":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","place":["Australia"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3691-8644","authenticated-orcid":false,"given":"Lorraine","family":"Mazerolle","sequence":"additional","affiliation":[{"name":"School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,","place":["Australia"]}]},{"given":"John","family":"Gilmour","sequence":"additional","affiliation":[{"name":"School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,","place":["Australia"]}]},{"given":"Cheng","family":"Miao","sequence":"additional","affiliation":[{"name":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","place":["Australia"]}]}],"member":"286","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"volume-title":"Digital 2023: Global Overview Report","year":"2023","author":"Kemp","key":"2024121909122435900_bib1"},{"volume-title":"Internet Crime Report 2021","year":"2021","author":"FBI's Internet Crime Complaint Center","key":"2024121909122435900_bib2"},{"volume-title":"IFCC 2001 Internet Fraud Report","year":"2002","author":"National White Collar Crime Center and Federal Bureau of Investigation (FBI)","key":"2024121909122435900_bib3"},{"key":"2024121909122435900_bib4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-1-4419-0245-0_14","article-title":"Situational crime prevention: theoretical background and current practice","volume-title":"Handbook on Crime and Deviance","author":"Clarke","year":"2009"},{"volume-title":"Opportunities, precipitators and criminal decisions: A reply to Wortley's critique of situational crime prevention","year":"2003","author":"Cornish","key":"2024121909122435900_bib5"},{"key":"2024121909122435900_bib6","doi-asserted-by":"crossref","first-page":"588","DOI":"10.2307\/2094589","article-title":"Social change and crime rate trends: a routine activity approach","volume":"44","author":"Cohen","year":"1979","journal-title":"Am Sociol Rev"},{"key":"2024121909122435900_bib7","first-page":"79","article-title":"Police problems: the complexity of problem theory, research and evaluation (problem-oriented policing: from innovation to mainstream)","volume":"15","author":"Eck","year":"2003"},{"key":"2024121909122435900_bib8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4073\/csr.2008.17","article-title":"Effects of closed circuit television surveillance on crime","volume":"4","author":"Welsh","year":"2008","journal-title":"Campbell Syst Rev"},{"key":"2024121909122435900_bib9","doi-asserted-by":"publisher","first-page":"68","DOI":"10.4324\/9781315207094-3","article-title":"Wildlife crime","volume-title":"Routledge International Handbook of Green Criminology","author":"Burton","year":"2020"},{"key":"2024121909122435900_bib10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s40163-017-0066-0","article-title":"Wildlife crime: a conceptual integration, literature review, and methodological critique","volume":"6","author":"Kurland","year":"2017","journal-title":"Crime Sci"},{"key":"2024121909122435900_bib11","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1002\/9781119376866.ch3","article-title":"Deterrence, legitimacy, and wildlife crime in protected areas","volume-title":"Conservation Criminology","author":"Moreto","year":"2017"},{"key":"2024121909122435900_bib12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1177\/0022427810397950","article-title":"Are parrots CRAVED? An analysis of parrot poaching in Mexico","volume":"49","author":"Pires","year":"2011","journal-title":"J Res Crime Delinq"},{"key":"2024121909122435900_bib13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1017\/CBO9780511581199.006","article-title":"Reducing the opportunities for terrorism: applying the principles of situational crime prevention","volume-title":"Terrorism and Torture","author":"Clarke","year":"2009"},{"key":"2024121909122435900_bib14","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1177\/0887403418805142","article-title":"Situational crime prevention and terrorism: an assessment of 10 years of research","volume":"30","author":"Freilich","year":"2019","journal-title":"Crim Justice Policy Rev"},{"key":"2024121909122435900_bib15","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1177\/0011128717718488","article-title":"Disrupting terrorist assassinations through situational crime prevention","volume":"64","author":"Mandala","year":"2018","journal-title":"Crime Delinq"},{"key":"2024121909122435900_bib16","doi-asserted-by":"publisher","first-page":"102611","DOI":"10.1016\/j.cose.2022.102611","article-title":"Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: a focused systematic review","volume":"115","author":"Ho","year":"2022","journal-title":"Comput Secur"},{"key":"2024121909122435900_bib17","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-030-31069-1_2","article-title":"Situational crime prevention","volume-title":"Cybercrime Prevention","author":"Brewer","year":"2019"},{"key":"2024121909122435900_bib18","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1146\/annurev-criminol-032317-092057","article-title":"Cyber-dependent crimes: an interdisciplinary review","volume":"2","author":"Maimon","year":"2019","journal-title":"Annu Rev Criminol"},{"key":"2024121909122435900_bib19","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1177\/00111287221092713","article-title":"Risk avoidance behavior on darknet marketplaces","volume":"70","author":"Howell","year":"2022","journal-title":"Crime Delinq"},{"key":"2024121909122435900_bib20","doi-asserted-by":"crossref","unstructured":"Howell CJ, Burruss GW. Datasets for analysis of cybercrime. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Cham: Springer International Publishing, 2020, 207\u201319. 10.1007\/978-3-319-78440-3_15.","DOI":"10.1007\/978-3-319-78440-3_15"},{"article-title":"ISO\/IEC 27002:2022 Information security, cybersecurity and privacy protection\u2014information security controls","year":"2022","author":"ISO\/IEC","key":"2024121909122435900_bib21"},{"key":"2024121909122435900_bib22","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.04162018","volume-title":"Cybersecurity Framework v1.1","author":"National Institute of Standards and Technology","year":"2018"},{"volume-title":"COBIT 2019 Framework: Introduction and Methodology","year":"2018","author":"ISACA","key":"2024121909122435900_bib23"},{"article-title":"Essential eight explained","year":"2019","author":"Australian Cyber Security Centre","key":"2024121909122435900_bib24"},{"key":"2024121909122435900_bib25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/NCETSTEA48365.2020.9119914","article-title":"A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard","volume-title":"2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA)","author":"Roy","year":"2020"},{"article-title":"BSI Standards Publication\u2014ISO27001\u2013Security techniques\u2014Information security management systems\u2014Requirements (ISO\/IEC 27001:2013)","year":"2017","author":"ISO\/IEC","key":"2024121909122435900_bib26"},{"key":"2024121909122435900_bib27","first-page":"259","article-title":"Environment, routine and situation: toward a pattern theory of crime","volume-title":"Advances in Criminological Theory","author":"Brantingham","year":"1993"},{"key":"2024121909122435900_bib28","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1086\/449106","article-title":"Modeling offenders\u2019 decisions: a framework for research and policy","volume":"6","author":"Clarke","year":"1985","journal-title":"Crim Justice"},{"key":"2024121909122435900_bib29","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-8625-4","article-title":"Research in criminology","volume-title":"The Reasoning Criminal: Rational Choice Perspectives on Offending","author":"Cornish","year":"1986"},{"key":"2024121909122435900_bib30","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1057\/palgrave.sj.8340098","article-title":"A classification of techniques for controlling situational precipitators of crime","volume":"14","author":"Wortley","year":"2001","journal-title":"Secur J"},{"key":"2024121909122435900_bib31","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1093\/oxfordhb\/9780195398823.013.0015","article-title":"Situational crime prevention: classifying techniques using \u201cGood Enough\u201d theory","volume-title":"The Oxford Handbook of Crime Prevention","author":"Smith","year":"2012"},{"key":"2024121909122435900_bib32","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199747238.013.0029","article-title":"Crime places and place management","volume-title":"The Oxford handbook of criminological theory","author":"Madensen","year":"2012"},{"key":"2024121909122435900_bib33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41284-023-00371-8","article-title":"Utilizing cyberplace managers to prevent and control cybercrimes: a vignette experimental study","volume":"37","author":"Ho","year":"2023","journal-title":"Secur J"},{"key":"2024121909122435900_bib34","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1108\/eb025940","article-title":"Understanding and addressing criminal opportunity: the application of situational crime prevention to IS security","volume":"7","author":"Willison","year":"2000","journal-title":"J Financ Crime"},{"key":"2024121909122435900_bib35","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1562164.1562198","article-title":"Overcoming the insider: reducing employee computer crime through Situational Crime Prevention","volume":"52","author":"Willison","year":"2009","journal-title":"Commun ACM"},{"key":"2024121909122435900_bib36","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.infoandorg.2006.08.001","article-title":"Understanding the perpetration of employee computer crime in the organisational context","volume":"16","author":"Willison","year":"2006","journal-title":"Inf Organ"},{"key":"2024121909122435900_bib37","first-page":"1","article-title":"Using situational crime prevention theory to explain the effectiveness of information systems security","volume-title":"Proceedings of the 2005 SoftWars Conference","author":"Beebe","year":"2005"},{"key":"2024121909122435900_bib38","first-page":"329","article-title":"Improving organizational information security strategy via meso-level application of situational crime prevention to the risk management process","volume":"26","author":"Beebe","year":"2010","journal-title":"Commun Assoc Inf Syst"},{"key":"2024121909122435900_bib39","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/2656434.2656436","article-title":"Insider hacking: applying Situational Crime Prevention to a New White-Collar Crime","volume-title":"RIIT \u201914 Proceedings of the 3rd Annual Conference on Research in Information Technology","author":"Stockman","year":"2014"},{"key":"2024121909122435900_bib40","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.future.2019.03.024","article-title":"Deterrence and prevention-based model to mitigate information security insider threats in organisations","volume":"97","author":"Safa","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"2024121909122435900_bib41","first-page":"822","article-title":"Situational crime prevention and insider threat\u202f: countermeasures and ethical considerations","volume-title":"8th International Conference Computer Ethics: Philosophical Enquiry","author":"Theoharidou","year":"2009"},{"key":"2024121909122435900_bib42","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.jisa.2017.11.001","article-title":"Motivation and opportunity based model to reduce information security insider threats in organisations","volume":"40","author":"Safa","year":"2018","journal-title":"J Inf Secur Appl"},{"key":"2024121909122435900_bib43","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-78816-6_16","article-title":"Situational crime prevention and the mitigation of cloud computing threats","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST","author":"Vidal","year":"2018"},{"article-title":"The relationship between situational crime prevention theory and campus employee computer misuse","year":"2010","author":"Santiago","key":"2024121909122435900_bib44"},{"volume-title":"Cyber-crime Science = Crime Science + Information Security","year":"2010","author":"Hartel","key":"2024121909122435900_bib45"},{"key":"2024121909122435900_bib46","doi-asserted-by":"crossref","first-page":"44","DOI":"10.52306\/02020419TEGR1675","article-title":"Blockchain security: situational crime prevention theory and distributed cyber systems","volume":"2","author":"Blasco","year":"2019","journal-title":"Int J Cybersecur Intel Cybercrime"},{"key":"2024121909122435900_bib47","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1057\/s41284-020-00270-2","article-title":"Situational awareness and public Wi-Fi users\u2019 self-protective behaviors","volume":"35","author":"Maimon","year":"2022","journal-title":"Secur J"},{"key":"2024121909122435900_bib48","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1057\/cpcs.2009.22","article-title":"A situational crime prevention approach to cyberstalking victimization: preventive tactics for Internet users and online place managers","volume":"12","author":"Reyns","year":"2010","journal-title":"Crime Prev Community Saf"},{"key":"2024121909122435900_bib49","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1145\/3550356.3561600","article-title":"Situational crime prevention for automotive cybersecurity","volume-title":"MODELS '22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings","author":"Polanco","year":"2022"},{"key":"2024121909122435900_bib50","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-1-4419-7133-3_3","article-title":"Insider Threat and Information Security Management","volume-title":"Insider Threats in Cyber Security","author":"Coles-Kemp","year":"2010"},{"key":"2024121909122435900_bib51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISSA.2015.7335064","article-title":"A framework of opportunity-reducing techniques to mitigate the insider threat","volume-title":"2015 Information Security for South Africa\u2014Proceedings of the ISSA 2015 Conference","author":"Padayachee","year":"2015"},{"key":"2024121909122435900_bib52","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1057\/sj.2013.25","article-title":"Curtailing cyber and information security vulnerabilities through situational crime prevention","volume":"26","author":"Hinduja","year":"2013","journal-title":"Secur J"},{"key":"2024121909122435900_bib53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3442480","article-title":"Cybersecurity standards in the context of operating system","volume":"54","author":"Hamdani","year":"2022","journal-title":"ACM Comput Surv"},{"key":"2024121909122435900_bib54","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.im.2008.12.007","article-title":"Information security management standards: problems and solutions","volume":"46","author":"Siponen","year":"2009","journal-title":"Inf Manag"},{"key":"2024121909122435900_bib55","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-642-03547-0_20","article-title":"Secured communication for business process outsourcing using optimized arithmetic cryptography protocol based on virtual parties","volume-title":"Contemporary Computing","author":"Pathak","year":"2009"},{"author":"Fitzgerald","key":"2024121909122435900_bib56"},{"year":"2021","author":"ISO\/IEC","key":"2024121909122435900_bib57"},{"author":"ITGovernance","key":"2024121909122435900_bib58"},{"key":"2024121909122435900_bib59","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.procs.2018.07.197","article-title":"A novel approach for optimizing governance, risk management and compliance for enterprise information security using DEMATEL and FoM","volume":"134","author":"Ramalingam","year":"2018","journal-title":"Procedia Comput Sci"},{"key":"2024121909122435900_bib60","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.procs.2021.11.070","article-title":"A customizable web platform to manage standards compliance of information security and cybersecurity auditing","volume":"196","author":"Antunes","year":"2022","journal-title":"Procedia Comput Sci"},{"key":"2024121909122435900_bib61","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.cose.2005.05.002","article-title":"The insider threat to information systems and the effectiveness of ISO17799","volume":"24","author":"Theoharidou","year":"2005","journal-title":"Comput Secur"},{"author":"ISO\/IEC","key":"2024121909122435900_bib62","article-title":"ISO\u2014ISO\/IEC 17799:2005\u2013information technology\u2014security techniques\u2014code of practice for information security management"},{"key":"2024121909122435900_bib63","doi-asserted-by":"publisher","first-page":"n71","DOI":"10.1136\/bmj.n71","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"author":"PRISMA","key":"2024121909122435900_bib64"},{"author":"Clarivate Analytics","key":"2024121909122435900_bib65","article-title":"Web of Science Journal Citation Reports 2022 Infographic"},{"author":"Computer Research and Education","key":"2024121909122435900_bib66","article-title":"CORE Rankings Portal\u2014Computing Research and Education"},{"key":"2024121909122435900_bib67","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-030-20779-3_18","article-title":"Situational crime prevention: theory, practice and evidence BT","volume-title":"Handbook on Crime and Deviance","author":"Eck","year":"2019"},{"key":"2024121909122435900_bib68","first-page":"139","article-title":"Understanding target suitability in cyberspace: an international comparison of cyber victimization processes","volume":"14","author":"Mir\u00f3-Llinares","year":"2020","journal-title":"I J Cyber Criminol"},{"key":"2024121909122435900_bib69","doi-asserted-by":"publisher","DOI":"10.1145\/1577222.1577283","article-title":"A keyless facility access control system with wireless enabled personal devices","volume-title":"The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops","author":"Zhang","year":"2007"},{"key":"2024121909122435900_bib70","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/HICSS.2004.1265446","article-title":"Understanding the offender\/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context","volume-title":"Proceedings of the 37th Annual Hawaii International Conference on System Sciences","author":"Willison","year":"2004"},{"key":"2024121909122435900_bib71","first-page":"151","article-title":"The procedural analysis of offending and its relevance for situational prevention","volume":"3","author":"Cornish","year":"1994","journal-title":"Crime Prev Stud"},{"key":"2024121909122435900_bib72","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1080\/17440570802254379","article-title":"\u201cBogies in the wire\u201d: is there a need for legislative control of cyber weapons?","volume":"9","author":"Prunckun","year":"2008","journal-title":"Global Crime"},{"key":"2024121909122435900_bib73","doi-asserted-by":"publisher","DOI":"10.7249\/CF163","volume-title":"Research on Mitigating the Insider Threat to Information Systems\u2014#2: Proceedings of a Workshop Held August, 2000","author":"Anderson","year":"2000"},{"key":"2024121909122435900_bib74","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1177\/0734016818813693","article-title":"Guardianship in the digital age","volume":"44","author":"Reynald","year":"2019","journal-title":"Crim Justice Rev"},{"key":"2024121909122435900_bib75","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1109\/AINA.2003.1192973","article-title":"Combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity","volume-title":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003","author":"David","year":"2003"},{"key":"2024121909122435900_bib76","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2808128.2808134","article-title":"Anonymity vs. trust in cyber-security collaboration","volume-title":"Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security","author":"Murdoch","year":"2015"},{"key":"2024121909122435900_bib77","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/ISI.2017.8004908","article-title":"Criminal intelligence surveillance and monitoring on social media: cases of cyber-trafficking","volume-title":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"Chung","year":"2017"},{"key":"2024121909122435900_bib78","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s11416-019-00338-7","article-title":"A Cyber-Kill-Chain based taxonomy of crypto-ransomware features","volume":"15","author":"Dargahi","year":"2019","journal-title":"J Comp Virol Hacking Tech"},{"key":"2024121909122435900_bib79","first-page":"22","article-title":"Disgruntled employees and systems security: the enemy within","volume":"31","author":"Nelson","year":"2005","journal-title":"Law Prac"},{"key":"2024121909122435900_bib80","doi-asserted-by":"publisher","first-page":"e06522","DOI":"10.1016\/j.heliyon.2021.e06522","article-title":"Human factor, a critical weak point in the information security of an organization's Internet of things","volume":"7","author":"Hughes-Lartey","year":"2021","journal-title":"Heliyon"},{"key":"2024121909122435900_bib81","doi-asserted-by":"crossref","first-page":"395","DOI":"10.34190\/iccws.17.1.51","article-title":"Human errors: a cybersecurity concern and the weakest link to small businesses","volume":"17","author":"Ncubukezit","year":"2022","journal-title":"ICCWS"},{"key":"2024121909122435900_bib82","doi-asserted-by":"publisher","DOI":"10.1184\/R1\/6572639.v1","article-title":"Common Sense Guide to Mitigating Insider Threats","author":"Silowash","year":"2012"},{"key":"2024121909122435900_bib83","doi-asserted-by":"publisher","DOI":"10.1093\/acrefore\/9780190264079.013.4","article-title":"Crime science","volume-title":"Oxford Research Encyclopedia of Criminology and Criminal Justice","author":"Cockbain","year":"2017"},{"key":"2024121909122435900_bib84","first-page":"225","article-title":"Risky facilities: crime concentration in homogeneous sets of establishments and facilities","volume":"21","author":"Eck","year":"2007","journal-title":"Crime Prev Stud"},{"key":"2024121909122435900_bib85","first-page":"2","article-title":"Foundation and history of the PDSA cycle","volume-title":"Associates in Process Improvement","author":"Moen","year":"2009"},{"key":"2024121909122435900_bib86","first-page":"92","article-title":"ISO\/IEC 27000, 27001 and 27002 for information security management","volume":"4","author":"Disterer","year":"2013","journal-title":"J Inf Secur"},{"key":"2024121909122435900_bib87","first-page":"113","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume-title":"6th International Conference on Information Warfare and Security, ICIW 2011","author":"Hutchins","year":"2011"},{"volume-title":"Essential Business Process Modeling","year":"2005","author":"Havey","key":"2024121909122435900_bib88"},{"key":"2024121909122435900_bib89","doi-asserted-by":"publisher","DOI":"10.2824\/324797","article-title":"ENISA Threat Landscape 2021","author":"ENISA","year":"2021"},{"author":"Australian Cyber Security Centre","key":"2024121909122435900_bib90","article-title":"Essential Eight"},{"article-title":"MITRE ATT&CK: design and Philosophy","year":"2018","author":"Strom","key":"2024121909122435900_bib91"},{"article-title":"Technology Risk Management Guidelines","year":"2021","author":"Monetary Authority of Singapore","key":"2024121909122435900_bib92"},{"key":"2024121909122435900_bib93","first-page":"400","article-title":"On-line activities, guardianship, and malware infection: an examination of routine activities theory","volume":"3","author":"Bossler","year":"2009","journal-title":"Int J Cyber Criminol"},{"key":"2024121909122435900_bib94","first-page":"156","article-title":"Australian internet users and guardianship against cyber abuse: an empirical analysis","volume":"8","author":"Vakhitova","year":"2014","journal-title":"Int J Cyber Criminol"},{"key":"2024121909122435900_bib95","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1177\/1043986215621378","article-title":"Guardians of the cyber galaxy:\u00a0an empirical and theoretical analysis of the guardianship concept\u00a0from routine activity theory as it applies to online forms of victimization","volume":"32","author":"Reyns","year":"2016","journal-title":"J Contemp Crim Justice"},{"key":"2024121909122435900_bib96","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1057\/s41300-018-0049-4","article-title":"Changing perspectives on guardianship against crime: an examination of the importance of micro-level factors","volume":"20","author":"Reynald","year":"2018","journal-title":"Crime Prev Community Saf"},{"key":"2024121909122435900_bib97","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/JFC-12-2018-0140","article-title":"Capable guardianship against identity theft: demographic insights based on a national sample of US adults","volume":"27","author":"Ylang","year":"2020","journal-title":"J Financ Crime"},{"key":"2024121909122435900_bib98","doi-asserted-by":"crossref","first-page":"597","DOI":"10.3138\/cjccj.46.5.597","article-title":"Watching the web: thoughts on expanding police surveillance opportunities under the cyber-crime convention","volume":"46","author":"Huey","year":"2004","journal-title":"Can J Criminol Crim Justice"},{"key":"2024121909122435900_bib99","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1057\/sj.2014.19","article-title":"Tackling cyber-terrorism: balancing surveillance with counter-communication","volume":"30","author":"Palasinski","year":"2017","journal-title":"Secur J"},{"key":"2024121909122435900_bib100","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ISIAS.2010.5604080","article-title":"A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids","volume-title":"2010 Sixth International Conference on Information Assurance and Security","author":"Sn\u00e1\u0161el","year":"2010"},{"key":"2024121909122435900_bib101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3465481.3470047","article-title":"The stress as adversarial factor for cyber decision making","volume-title":"The 16th International Conference on Availability, Reliability and Security in ARES 21","author":"Sandoval\u00a0Rodr\u00edguez-Bermejo","year":"2021"},{"key":"2024121909122435900_bib102","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.intcom.2005.05.003","article-title":"Empathic agents to reduce user frustration: the effects of varying agent characteristics","volume":"18","author":"Hone","year":"2006","journal-title":"Interact Comput"},{"key":"2024121909122435900_bib103","first-page":"240","article-title":"Dispute prevention and dispute resolution in networked health information technology","volume-title":"dg.o \u201909 Proceedings of the 10th Annual International Conference on Digital Government Research: Social Networks: Making Connections between Citizens, Data and Government","author":"Sondheimer","year":"2009"},{"key":"2024121909122435900_bib104","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1145\/1753326.1753542","article-title":"Understanding Dispute Resolution Online: using Text to Reflect Personal and Substantive Issues in Conflict","volume-title":"CHI \u201910 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Billings","year":"2010"},{"key":"2024121909122435900_bib105","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/1882362.1882418","article-title":"Supporting Negotiation and Dispute Resolution with Computing and Communication Technologies","volume-title":"FoSER \u201910 Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research","author":"Osterweil","year":"2010"},{"key":"2024121909122435900_bib106","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1057\/s41300-020-00098-3","article-title":"Examining the influence of emotional arousal and scam preventive messaging on susceptibility to scams","volume":"22","author":"Lu","year":"2020","journal-title":"Crime Prev Community Saf"},{"key":"2024121909122435900_bib107","doi-asserted-by":"publisher","first-page":"9","DOI":"10.23919\/CyCon51939.2021.9468306","article-title":"Covid-19 and the Cyber Pandemic: a Plea for International Law and the Rule of Sovereignty in Cyberspace","volume-title":"2021 13th International Conference on Cyber Conflict (CyCon)","author":"Delerue","year":"2021"},{"key":"2024121909122435900_bib108","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1023\/B:CRIM.0000037565.32355.10","article-title":"New challenges for international rules against cyber-crime","volume":"10","author":"Pocar","year":"2004","journal-title":"Eur J Crim Pol Res"},{"key":"2024121909122435900_bib109","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558667","article-title":"External monitoring of endpoint configuration compliance","volume-title":"CSIIRW \u201909 Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies","author":"Kienzle","year":"2009"},{"key":"2024121909122435900_bib110","doi-asserted-by":"publisher","DOI":"10.1145\/2799979.2800007","article-title":"An analytical processing approach to supporting cyber security compliance assessment","volume-title":"ACM International Conference Proceeding Series","author":"Buccafurri","year":"2015"},{"key":"2024121909122435900_bib111","doi-asserted-by":"publisher","DOI":"10.1145\/3351108.3351143","article-title":"SAICSIT \u201919 Guidelines for data privacy compliance: a focus on cyber-physical systems and internet of things","volume-title":"Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019","author":"Baloyi","year":"2019"},{"key":"2024121909122435900_bib112","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/3384941.3409592","article-title":"DecIED: scalable k-Anonymous deception for IEC61850-Compliant Smart Grid Systems","volume-title":"CPSS \u201920 Proceedings of the 6th ACM on Cyber-Physical System Security Workshop","author":"Yang","year":"2020"},{"key":"2024121909122435900_bib113","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1111\/lsi.12303","article-title":"Data breach, privacy, and cyber insurance: how insurance companies act as \u201cCompliance Managers\u201d for businesses","volume":"43","author":"Talesh","year":"2018","journal-title":"Law Soc Inq"},{"key":"2024121909122435900_bib114","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/UEMCON47517.2019.8993090","article-title":"CSAT: a User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management","volume-title":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","author":"Huang","year":"2019"},{"key":"2024121909122435900_bib115","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/CloudTech.2016.7847700","article-title":"Requirements specification of a cloud service for Cyber Security compliance analysis","volume-title":"2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)","author":"Furfaro","year":"2016"},{"key":"2024121909122435900_bib116","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDC.2018.8440380","article-title":"Keyless Signature Blockchain Infrastructure: facilitating NERC CIP Compliance and Responding to Evolving Cyber Threats and Vulnerabilities to Energy Infrastructure","volume-title":"2018 IEEE\/PES Transmission and Distribution Conference and Exposition (T&D)","author":"Mylrea","year":"2018"},{"key":"2024121909122435900_bib117","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/GIOTS.2019.8766363","article-title":"Compliance verification of a cyber security standard for Cloud-connected SCADA","volume-title":"2019 Global IoT Summit (GIoTS)","author":"Kulik","year":"2019"},{"key":"2024121909122435900_bib118","doi-asserted-by":"publisher","first-page":"4.2.2","DOI":"10.1049\/cp.2014.0982","article-title":"Governance, risk and compliance: impediments and opportunities for managing operational technology risk in industrial cyber security and safety","volume-title":"9th IET International Conference on System Safety and Cyber Security (2014)","author":"Piggin","year":"2014"},{"key":"2024121909122435900_bib119","doi-asserted-by":"publisher","first-page":"4476","DOI":"10.1109\/HICSS.2013.488","article-title":"Social Factors in Policy Compliance\u2014Evidence Found in Literature to Assist the Development of Policies in Information Security Management","volume-title":"2013 46th Hawaii International Conference on System Sciences","author":"Milicevic","year":"2013"},{"key":"2024121909122435900_bib120","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1145\/2370216.2370354","article-title":"Phone-based gait analysis to detect alcohol usage","volume-title":"UbiComp \u201912 Proceedings of the 2012 ACM Conference on Ubiquitous Computing -UbiComp \u201912","author":"(Cindy)\u00a0Kao","year":"2012"},{"key":"2024121909122435900_bib121","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1037\/vio0000130","article-title":"Cyber abuse among men arrested for domestic violence: cyber monitoring moderates the relationship between alcohol problems and intimate partner violence","volume":"9","author":"Brem","year":"2019","journal-title":"Psychol Violence"},{"key":"2024121909122435900_bib122","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCSEA49143.2020.9132932","article-title":"Drowsiness alert, alcohol detect and collision control for vehicle acceleration","volume-title":"2020 International Conference on Computer Science, Engineering and Applications (ICCSEA)","author":"Patnaik","year":"2020"},{"key":"2024121909122435900_bib123","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3264936","article-title":"Al-light","volume":"2","author":"Matsui","year":"2018","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"2024121909122435900_bib124","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3173574.3173808","article-title":"Drunk user interfaces: determining blood alcohol level through everyday smartphone tasks","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Mariakakis","year":"2018"},{"key":"2024121909122435900_bib125","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s00779-017-1042-0","article-title":"SVM-based classification method to identify alcohol consumption using ECG and PPG monitoring","volume":"22","author":"Wang","year":"2018","journal-title":"Pers Ubiquit Comput"},{"key":"2024121909122435900_bib126","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/ISS1.2017.8389255","article-title":"Safety helmet with alcohol detection and theft control for bikers","volume-title":"2017 International Conference on Intelligent Sustainable Systems (ICISS)","author":"Preetham","year":"2017"},{"key":"2024121909122435900_bib127","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3344384","article-title":"Enabling personal alcohol tracking using transdermal sensing wristbands: benefits and challenges","volume-title":"MobileHCI \u201919 Proceedings of the 21st International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"You","year":"2019"},{"key":"2024121909122435900_bib128","doi-asserted-by":"publisher","DOI":"10.1145\/3372938.3372944","article-title":"IOT based intelligent alcohol detection system for vehicles","volume-title":"BDIoT\u201919 Proceedings of the 4th International Conference on Big Data and Internet of Things","author":"Sarkar","year":"2019"},{"key":"2024121909122435900_bib129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3411837","article-title":"An automated mobile game-based screening tool for patients with alcohol dependence","volume":"4","author":"Intarasirisawat","year":"2020","journal-title":"Proc\u00a0ACM\u00a0Interact Mob\u00a0Wearable\u00a0Ubiquitous\u00a0Technol"},{"key":"2024121909122435900_bib130","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/INCET49848.2020.9154093","article-title":"Vehicle tracking with alcohol detection & seat belt control system","volume-title":"2020 International Conference for Emerging Technology (INCET)","author":"Mandal","year":"2020"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae020\/61182405\/tyae020.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae020\/61182405\/tyae020.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:12:47Z","timestamp":1734599567000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae020\/7904693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":130,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae020","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2024]]},"published":{"date-parts":[[2024]]},"article-number":"tyae020"}}