10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

innovation networks to facilitate close cooperation between customers and product<br />

developers. In the cybercrime industry ‘swarms’ can be born online – similar to what we<br />

call below the ‘Internet community business model’ – but in most cases they combine<br />

physical and online means for communication (online collaboration among individuals<br />

who also meet in person). One distinct feature <strong>of</strong> the model is that swarms generate for<br />

a specific purpose and for a limited period <strong>of</strong> time, until the goal is achieved (unlike the<br />

Internet-based model). Although it is based on commitment and loyalty to achieve a<br />

specific goal, this business model also lacks managerial hierarchy or the proprietary<br />

ownership <strong>of</strong> ideas that is a feature <strong>of</strong> the loyalty model. Whilst there may well be a<br />

swarm-type interaction that requires the major stakeholders to physically meet from<br />

time to time, pure cybercriminals have no need for this business model as they have<br />

built up anonymous and highly effective channels <strong>of</strong> communication that do not require<br />

and even eschew face-to-face meetings and the negotiation <strong>of</strong> common cause beyond<br />

cyberspace.<br />

2.3.3 Internet-based business models<br />

The growth <strong>of</strong> Internet-based businesses in the legitimate world has resulted in many<br />

classifications and methods <strong>of</strong> conducting business over the Internet. E-commerce has<br />

given rise to new kinds <strong>of</strong> business model. The benefits for customers and suppliers<br />

<strong>of</strong>fered by online businesses over physical channels have been highlighted by many<br />

commentators, and include reduced operational and overhead costs, scale and scope,<br />

access to wider markets, lower inventory and building costs, flexibility in sourcing<br />

inputs, improved transaction automation and the ability to bypass intermediaries.<br />

Cybercriminals benefit from all these advantages as well as enjoying anonymity. The<br />

Internet provides criminals with a favourable environment to disguise their identity,<br />

even amongst trusted colleagues, making them hard for law enforcement agencies to<br />

locate.<br />

Some models identified in our initial search include:<br />

Advertising-based models: This model is used quite legally by companies that provide<br />

content or services to visitors and sell advertising to businesses that want to reach those<br />

visitors. The advertising based model is widely used by IRCs and web forum operators.<br />

In the underground economy, advertised items include bundles <strong>of</strong> credit card numbers,<br />

identity theft information, online banking information and skilled labour, where discounts<br />

Page 76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!