Authors
Al-Khater, Wadha AbdullahAl-Ma’adeed, Somaya
Ahmed, Abdulghani Ali
Al-Shakarchi, Ali
Khan, Muhammad Khurram
Issue Date
2020-07-22
Metadata
Show full item recordAbstract
Cybercrimes describe cases of indictable offences and misdemeanours in which computer or any communication tools are involved as targets, commission instruments, incidental to, or that cases are associated with the prevalence of computer technology. Common forms of cybercrimes could be child pornography, cyberstalking, identity theft, cyber laundering, credit card theft, cyber terrorism, drug sale, data leakage, sexually explicit content, phishing and other cyber hacking. These kinds of cybercrimes are mostly leading to breaching users’ privacy, security violation, business loss, financial fraud, or damage in public as well as government properties. Hence, this paper intensively reviews cybercrime detection and prevention methods. It first explores the different types of cybercrimes then discusses their threats against privacy and security in computer systems. It also describes the strategies that cybercriminals might utilize in committing these crimes against individuals, organizations, and societies. The paper then reviews the existing techniques of cybercrime detection and prevention. It objectively discusses the strengths and critically analyses the vulnerabilities of each technique. As a future study, the paper provides recommendations for the development of cybercrime detection model in which it is capable to effectively detect cybercrime in comparison to the existing techniques.Citation
W. A. Al-Khater, S. Al-Ma’adeed, A. A. Ahmed, A. S. Sadiq and M. K. Khan, Comprehensive review of cybercrime detection techniques, IEEE Access, 8, pp. 137293-137311 doi: 10.1109/ACCESS.2020.3011259.Publisher
IEEEJournal
IEEE AccessAdditional Links
https://ieeexplore.ieee.org/document/9146148Type
Journal articleLanguage
enDescription
© 2020 The Authors. Published by IEEE. This is an open access article available under a Creative Commons licence. The published version can be accessed at the following link on the publisher’s website: https://doi.org/10.1109/ACCESS.2020.3011259ISSN
2169-3536Sponsors
This publication was made by NPRP grant # NPRP12S-0312-190332 from the Qatar National Research Fund (a member of the Qatar Foundation). The statements made herein are solely the responsibility of the authors.ae974a485f413a2113503eed53cd6c53
10.1109/ACCESS.2020.3011259
Scopus Count
Collections
Except where otherwise noted, this item's license is described as http://creativecommons.org/licenses/by/4.0/