{"id":"https://openalex.org/W4404495713","doi":"https://doi.org/10.1093/cybsec/tyae020","title":"Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes","display_name":"Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002:2022 to prevent cybercrimes","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404495713","doi":"https://doi.org/10.1093/cybsec/tyae020"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae020","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae020","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyae020","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000334989","display_name":"Heemeng Ho","orcid":"https://orcid.org/0000-0002-5917-6532"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]},{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU","PK"],"is_corresponding":true,"raw_author_name":"Heemeng Ho","raw_affiliation_strings":["Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,"],"raw_orcid":"https://orcid.org/0000-0002-5917-6532","affiliations":[{"raw_affiliation_string":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","institution_ids":["https://openalex.org/I1323252656","https://openalex.org/I165143802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047816029","display_name":"Ryan K. L. Ko","orcid":"https://orcid.org/0000-0003-0804-1176"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]},{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU","PK"],"is_corresponding":false,"raw_author_name":"Ryan Ko","raw_affiliation_strings":["Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","institution_ids":["https://openalex.org/I1323252656","https://openalex.org/I165143802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011253399","display_name":"Lorraine Mazerolle","orcid":"https://orcid.org/0000-0002-3691-8644"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lorraine Mazerolle","raw_affiliation_strings":["School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,"],"raw_orcid":"https://orcid.org/0000-0002-3691-8644","affiliations":[{"raw_affiliation_string":"School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025921099","display_name":"John Gilmour","orcid":"https://orcid.org/0000-0003-1549-8772"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"John Gilmour","raw_affiliation_strings":["School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Social Science, Faculty of Humanities and Social Sciences, The University of Queensland , Brisbane, QLD 4072 ,","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106909000","display_name":"Cheng Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]},{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU","PK"],"is_corresponding":false,"raw_author_name":"Cheng Miao","raw_affiliation_strings":["Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Security, School of Electrical Engineering and Computer Science, Faculty of Engineering, Architecture and Information Technology, The University of Queensland , Brisbane, QLD 4072 ,","institution_ids":["https://openalex.org/I1323252656","https://openalex.org/I165143802"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000334989"],"corresponding_institution_ids":["https://openalex.org/I1323252656","https://openalex.org/I165143802"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.6673,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75452835,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12965","display_name":"Wildlife Conservation and Criminology Analyses","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2309","display_name":"Nature and Landscape Conservation"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12965","display_name":"Wildlife Conservation and Criminology Analyses","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2309","display_name":"Nature and Landscape Conservation"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6787203550338745},{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.4516531229019165},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37497374415397644},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3122698664665222},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.1159353256225586}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6787203550338745},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.4516531229019165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37497374415397644},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3122698664665222},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.1159353256225586}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyae020","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae020","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae020","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae020","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.800000011920929,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320984","display_name":"University of Queensland","ror":"https://ror.org/00rqy9422"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":113,"referenced_works":["https://openalex.org/W38756896","https://openalex.org/W45970454","https://openalex.org/W92675342","https://openalex.org/W342470145","https://openalex.org/W647554053","https://openalex.org/W925022644","https://openalex.org/W1480987230","https://openalex.org/W1531602039","https://openalex.org/W1620210400","https://openalex.org/W1965395943","https://openalex.org/W1972095110","https://openalex.org/W1988012743","https://openalex.org/W1999627326","https://openalex.org/W2000891179","https://openalex.org/W2003464762","https://openalex.org/W2003513364","https://openalex.org/W2003676537","https://openalex.org/W2004299139","https://openalex.org/W2010494621","https://openalex.org/W2047701443","https://openalex.org/W2052465695","https://openalex.org/W2053042108","https://openalex.org/W2053863515","https://openalex.org/W2054487483","https://openalex.org/W2058290272","https://openalex.org/W2070648774","https://openalex.org/W2074446075","https://openalex.org/W2082134125","https://openalex.org/W2085901425","https://openalex.org/W2095734447","https://openalex.org/W2101447615","https://openalex.org/W2114461248","https://openalex.org/W2138958508","https://openalex.org/W2142015454","https://openalex.org/W2147244358","https://openalex.org/W2148614922","https://openalex.org/W2151306275","https://openalex.org/W2154926941","https://openalex.org/W2159848560","https://openalex.org/W2163219045","https://openalex.org/W2171080494","https://openalex.org/W2181459745","https://openalex.org/W2188340366","https://openalex.org/W2224675285","https://openalex.org/W2329332155","https://openalex.org/W2340391868","https://openalex.org/W2586713344","https://openalex.org/W2603815119","https://openalex.org/W2604355063","https://openalex.org/W2614163802","https://openalex.org/W2617484064","https://openalex.org/W2727597540","https://openalex.org/W2735532453","https://openalex.org/W2743690308","https://openalex.org/W2752385193","https://openalex.org/W2778865020","https://openalex.org/W2796150676","https://openalex.org/W2801752116","https://openalex.org/W2809187455","https://openalex.org/W2886790303","https://openalex.org/W2888649826","https://openalex.org/W2891020776","https://openalex.org/W2895190647","https://openalex.org/W2895779664","https://openalex.org/W2896699409","https://openalex.org/W2902905378","https://openalex.org/W2920929998","https://openalex.org/W2957305577","https://openalex.org/W2963968228","https://openalex.org/W2970258663","https://openalex.org/W2971389188","https://openalex.org/W2972175050","https://openalex.org/W2979278733","https://openalex.org/W2983551967","https://openalex.org/W2994372850","https://openalex.org/W3000419227","https://openalex.org/W3002497212","https://openalex.org/W3005786557","https://openalex.org/W3036745110","https://openalex.org/W3039897437","https://openalex.org/W3047413032","https://openalex.org/W3049446947","https://openalex.org/W3080678984","https://openalex.org/W3083905568","https://openalex.org/W3091858445","https://openalex.org/W3103408102","https://openalex.org/W3118615836","https://openalex.org/W3137273165","https://openalex.org/W3160348042","https://openalex.org/W3172316909","https://openalex.org/W3180071942","https://openalex.org/W3193427831","https://openalex.org/W4205746881","https://openalex.org/W4214919957","https://openalex.org/W4225749771","https://openalex.org/W4230525572","https://openalex.org/W4231973689","https://openalex.org/W4234388477","https://openalex.org/W4238620540","https://openalex.org/W4244517009","https://openalex.org/W4249855545","https://openalex.org/W4280647194","https://openalex.org/W4308623323","https://openalex.org/W4328122043","https://openalex.org/W6600060661","https://openalex.org/W6601847906","https://openalex.org/W6603365846","https://openalex.org/W6603842959","https://openalex.org/W6624548514","https://openalex.org/W6651578511","https://openalex.org/W6687150322","https://openalex.org/W6703958747","https://openalex.org/W6736051330"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2012350746","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890"],"abstract_inverted_index":{"Abstract":[0],"Situational":[1],"Crime":[2],"Prevention":[3],"(SCP)":[4],"is":[5,27,43,143],"a":[6,16,113,197],"well-documented":[7],"crime":[8,37,55,83],"prevention":[9,38,84,175],"approach":[10],"that":[11],"reduces":[12],"criminal":[13,124],"opportunities":[14],"for":[15,82],"range":[17],"of":[18,63,116,139,151],"different":[19],"crimes.":[20],"However,":[21],"SCP":[22,106,155],"adoption":[23],"in":[24,53,173,192,196],"combating":[25],"cybercrimes":[26],"currently":[28],"limited.":[29],"Current":[30],"cybersecurity":[31,80,101,141],"controls":[32,49,81,102,142,153],"are":[33,50],"not":[34],"mapped":[35],"to":[36,45,69,76,154,169],"techniques,":[39],"and":[40,60,108,126,145,163,176,183],"consequently,":[41],"it":[42],"hard":[44],"gauge":[46],"if":[47],"existing":[48],"actually":[51],"effective":[52],"reducing":[54],"opportunities.":[56],"The":[57],"dynamic":[58],"environments":[59],"complex":[61],"nature":[62],"cybercrimes\u2014spanning":[64],"from":[65,89],"human-centric":[66],"cyber-enabled":[67],"crimes":[68],"highly":[70],"technical":[71],"cyber-focused":[72],"crimes\u2014exacerbate":[73],"the":[74,90,104,130,146,149],"inability":[75],"apply":[77],"or":[78],"measure":[79],"effectiveness.":[85],"Using":[86],"best":[87],"practices":[88],"globally":[91],"adopted":[92],"ISO/IEC":[93,152],"27002:2022":[94],"standard,":[95],"our":[96,136,159,180],"paper":[97],"aligns":[98],"industry":[99],"best-practice":[100],"with":[103],"five":[105],"strategies":[107],"25":[109],"techniques.":[110],"We":[111,133,157],"conduct":[112],"comprehensive":[114],"review":[115],"1788":[117],"peer-reviewed":[118],"academic":[119],"articles":[120],"across":[121],"computer":[122],"science,":[123],"justice,":[125],"criminology":[127],"literature":[128],"using":[129],"PRISMA":[131],"method.":[132],"elucidate":[134],"how":[135,179],"common":[137,184],"inventory":[138,185],"SCP-based":[140],"developed":[144],"rationale":[147],"behind":[148],"mapping":[150],"classification.":[156],"propose":[158],"SCP-C3":[160,181],"(Concentrate,":[161],"Comprehend,":[162],"Consider)":[164],"cycle":[165,182],"as":[166],"an":[167],"instrument":[168],"facilitate":[170],"multi-disciplinary":[171,198],"research":[172],"cybercrime":[174,193],"illustrate":[177],"conceptually":[178],"can":[186],"be":[187],"applied":[188],"at":[189],"intervention":[190],"points":[191],"modelling":[194],"techniques":[195],"environment.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
