{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:03:35Z","timestamp":1762340615091,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2013,2,11]],"date-time":"2013-02-11T00:00:00Z","timestamp":1360540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With an increasing pervasiveness, prevalence and severity of cybercrimes, various metrics, measures and statistics have been developed and used to measure various aspects of this phenomenon. Cybercrime-related data, metrics, and information, however, pose important and difficult dilemmas regarding the issues of reliability, validity, comparability and practical utility. While many of the issues of the cybercrime economy are similar to other underground and underworld industries, this economy also has various unique aspects. For one thing, this industry also suffers from a problem partly rooted in the incredibly broad definition of the term \u201ccybercrime\u201d. This article seeks to provide insights and analysis into this phenomenon, which is expected to advance our understanding into cybercrime-related information.<\/jats:p>","DOI":"10.3390\/info4010117","type":"journal-article","created":{"date-parts":[[2013,2,11]],"date-time":"2013-02-11T11:00:01Z","timestamp":1360580401000},"page":"117-123","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reliability, Validity, Comparability and Practical Utility of Cybercrime-Related Data, Metrics, and Information"],"prefix":"10.3390","volume":"4","author":[{"given":"Nir","family":"Kshetri","sequence":"first","affiliation":[{"name":"Bryan School of Business and Economics, The University of North Carolina at Greensboro, P.O. Box 26165, Greensboro, NC 27402-6165, USA"}]}],"member":"1968","published-online":{"date-parts":[[2013,2,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kshetri, N. (2013). Cybercrime and Cybersecurity in the Global South, Palgrave Macmillan.","DOI":"10.1057\/9781137021946"},{"key":"ref_2","first-page":"131","article-title":"The Rise and Fall of the Underground Economy","volume":"11","author":"Naylor","year":"2005","journal-title":"BJWA"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1610252.1610288","article-title":"Positive externality, increasing returns and the rise in cybercrimes","volume":"52","author":"Kshetri","year":"2009","journal-title":"CACM"},{"key":"ref_4","unstructured":"Moore, R. (2011). Cybercrime: Investigating High-Technology Computer Crime, Anderson Publishing."},{"key":"ref_5","unstructured":"McDonald, T. Report: Year\u2019s Hack Attacks To Cost $1.6 Trillion. Available online:http:\/\/www.ecommercetimes.com\/story\/3741.html?wlc=1257274891."},{"key":"ref_6","unstructured":"(2007). Winning at eBay: How to bid smart & play safe. Consumer Reports, 72, 12\u201314."},{"key":"ref_7","first-page":"133","article-title":"Online auction fraud and eBay","volume":"19","author":"Bauerly","year":"2009","journal-title":"Mark. Manag. J."},{"key":"ref_8","unstructured":"Internet Fraud Crime Report, 1 January 2006-31 December 2006; National White Collar Crime Center and the Federal Bureau of Investigation, 2007. Available online:www.ic3.gov\/media\/annualreport\/2006_IC3Report.pdf."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSP.2010.88","article-title":"The economics of click fraud","volume":"8","author":"Kshetri","year":"2010","journal-title":"IEEE Secur. Priv."},{"key":"ref_10","unstructured":"Roush, W. (2003). The internet reborn: The internet has transformed the way we find information, shop, and do business. But it is a dumb network built for a bygone age. A university-industry coalition is designing a vastly smarter and more secure Internet: PlanetLab. Technol. Rev., 28\u201337."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1257\/aer.89.5.1116","article-title":"Endogenous Lobby formation and endogenous protection: A long-run model of trade policy determination","volume":"89","author":"Mitra","year":"1999","journal-title":"Am. Econ. Rev."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1111\/j.1745-9133.2010.00622.x","article-title":"Building the infrastructure of anti-trafficking: Information, funding, responses","volume":"9","author":"David","year":"2010","journal-title":"Criminol. Pub. Policy"},{"key":"ref_13","first-page":"953","article-title":"Development of international norms for insurance regulation","volume":"34","author":"Brown","year":"2008","journal-title":"Brook. J. Int\u2019l L."},{"key":"ref_14","first-page":"695","article-title":"Blackbeards of the twenty-first century: Holding cybercriminals liable under the alien tort statute","volume":"7","author":"Rho","year":"2007","journal-title":"Chi. J. Int\u2019l L."},{"key":"ref_15","unstructured":"Kshetri, N. (2010). The Global Cyber-Crime Industry: Economic,Institutional and Strategic Perspectives, Springer-Verlag."},{"key":"ref_16","unstructured":"(2007). GAO Reports."},{"key":"ref_17","unstructured":"Kirk, J. Countries Move Forward on Cybercrime Treaty. PC World, 11 March 2009. Available online:http:\/\/www.pcworld.com\/article\/161067\/countries_move_forward_on_cybercrime_treaty.html."},{"key":"ref_18","unstructured":"Saad, L. Two in three Americans worry about identity theft. Gallup; 16 October 2009. Available online:http:\/\/www.gallup.com\/poll\/123713\/Two-in-Three-Americans-Worry-About-Identity-Theft.aspx."},{"key":"ref_19","unstructured":"(Christian Science Monitor, 2006). When the Law Chases the Internet, Christian Science Monitor."},{"key":"ref_20","unstructured":"Dawkins, R. (1982). The Extended Phenotype, Oxford University Press."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/4\/1\/117\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:44:57Z","timestamp":1760219097000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/4\/1\/117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,11]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2013,3]]}},"alternative-id":["info4010117"],"URL":"https:\/\/doi.org\/10.3390\/info4010117","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2013,2,11]]}}}