{"id":"https://openalex.org/W4399665649","doi":"https://doi.org/10.1109/msec.2024.3407859","title":"The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement","display_name":"The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement","publication_year":2024,"publication_date":"2024-06-14","ids":{"openalex":"https://openalex.org/W4399665649","doi":"https://doi.org/10.1109/msec.2024.3407859"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2024.3407859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2024.3407859","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.tilburguniversity.edu/en/publications/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056162524","display_name":"Giuseppe Cascavilla","orcid":"https://orcid.org/0000-0002-0724-3772"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Giuseppe Cascavilla","raw_affiliation_strings":["Eindhoven University of Technology, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5056162524"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":7.6344,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.97181518,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"23","issue":"1","first_page":"17","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.953196108341217},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.7413067817687988},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4700079560279846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46004489064216614},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.4406222701072693},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40414270758628845},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.37806257605552673},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3358665108680725},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.23069730401039124},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1988767385482788},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.15770277380943298},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.05409836769104004}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.953196108341217},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.7413067817687988},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4700079560279846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46004489064216614},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.4406222701072693},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40414270758628845},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.37806257605552673},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3358665108680725},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.23069730401039124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1988767385482788},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.15770277380943298},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.05409836769104004}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1109/msec.2024.3407859","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2024.3407859","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},{"id":"pmh:oai:tilburguniversity.edu:openaire/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","is_oa":true,"landing_page_url":"https://research.tilburguniversity.edu/en/publications/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","pdf_url":null,"source":{"id":"https://openalex.org/S4406923027","display_name":"Tilburg University Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cascavilla, G 2024, 'The rise of cybercrime and cyber-threat intelligence : Perspectives and Challenges From Law Enforcement', IEEE security & privacy, pp. 2-11. https://doi.org/10.1109/MSEC.2024.3407859","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/8613f82c-0351-4d37-8f83-1a642401fc6b","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/8613f82c-0351-4d37-8f83-1a642401fc6b","pdf_url":"https://pure.tue.nl/ws/files/351892539/The_Rise_of_Cybercrime_and_Cyber-Threat_Intelligence_Perspectives_and_Challenges_From_Law_Enforcement.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascavilla, G 2025, 'The Rise of Cybercrime and Cyber-Threat Intelligence : Perspectives and Challenges From Law Enforcement', IEEE Security and Privacy, vol. 23, no. 1, 10558720, pp. 17-26. https://doi.org/10.1109/MSEC.2024.3407859","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:tilburguniversity.edu:publications/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","is_oa":true,"landing_page_url":"https://repository.tilburguniversity.edu/bitstreams/e683b9da-6e56-45be-a849-d3b8b1851c56/download","pdf_url":null,"source":{"id":"https://openalex.org/S4306401490","display_name":"Research portal (Tilburg University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193700539","host_organization_name":"Tilburg University","host_organization_lineage":["https://openalex.org/I193700539"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascavilla, G 2024, 'The rise of cybercrime and cyber-threat intelligence : Perspectives and Challenges From Law Enforcement', IEEE security & privacy, pp. 2-11. https://doi.org/10.1109/MSEC.2024.3407859","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:figshare.com:article/24317020","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/The_Rise_of_Cybercrime_and_Cyber-Threat_Intelligence_Perspectives_and_Challenges_from_Law-Enforcement/24317020","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:pure.tue.nl:publications/8613f82c-0351-4d37-8f83-1a642401fc6b","is_oa":true,"landing_page_url":"https://research.tue.nl/files/351892539/The_Rise_of_Cybercrime_and_Cyber-Threat_Intelligence_Perspectives_and_Challenges_From_Law_Enforcement.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascavilla, G 2025, 'The Rise of Cybercrime and Cyber-Threat Intelligence : Perspectives and Challenges From Law Enforcement', IEEE Security and Privacy, vol. 23, no. 1, 10558720, pp. 17-26. https://doi.org/10.1109/MSEC.2024.3407859","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"doi:10.6084/m9.figshare.24317020.v2","is_oa":true,"landing_page_url":"https://doi.org/10.6084/m9.figshare.24317020.v2","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:tilburguniversity.edu:openaire/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","is_oa":true,"landing_page_url":"https://research.tilburguniversity.edu/en/publications/5ccfc879-064b-4beb-af5b-c82cb9b41ae7","pdf_url":null,"source":{"id":"https://openalex.org/S4406923027","display_name":"Tilburg University Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cascavilla, G 2024, 'The rise of cybercrime and cyber-threat intelligence : Perspectives and Challenges From Law Enforcement', IEEE security & privacy, pp. 2-11. https://doi.org/10.1109/MSEC.2024.3407859","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G127861940","display_name":null,"funder_award_id":"815356","funder_id":"https://openalex.org/F4320316317","funder_display_name":"Xi'an Eurasia University"},{"id":"https://openalex.org/G6750604258","display_name":null,"funder_award_id":"787061","funder_id":"https://openalex.org/F4320316317","funder_display_name":"Xi'an Eurasia University"},{"id":"https://openalex.org/G7331901853","display_name":null,"funder_award_id":"EU H2020","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320316317","display_name":"Xi'an Eurasia University","ror":null},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2560429597","https://openalex.org/W2614843991","https://openalex.org/W2943117329","https://openalex.org/W3133650126","https://openalex.org/W4285096948","https://openalex.org/W4313315874","https://openalex.org/W4323341852","https://openalex.org/W4376602784","https://openalex.org/W4377234674","https://openalex.org/W6608056997"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W3025546445","https://openalex.org/W3031409616","https://openalex.org/W3164984769","https://openalex.org/W1983112135","https://openalex.org/W2049886938","https://openalex.org/W4200166010","https://openalex.org/W3012403896"],"abstract_inverted_index":{"This":[0],"study":[1],"explores":[2],"whether":[3],"state-of-the-art":[4],"approaches":[5],"help":[6],"Law":[7],"Enforcement":[8],"Agencies":[9],"(LEAs)":[10],"recognize":[11],"and":[12,16,24,29],"prevent":[13],"cybercrime.":[14,43],"Interviews":[15],"surveys":[17],"show":[18],"an":[19],"overlap":[20],"between":[21],"these":[22],"methods":[23],"those":[25],"used":[26],"by":[27],"LEAs":[28],"practitioners,":[30],"highlighting":[31],"the":[32],"need":[33],"for":[34],"closer":[35],"collaboration":[36],"in":[37],"developing":[38],"innovative":[39],"tools":[40],"to":[41],"fight":[42]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
