{"id":"https://openalex.org/W4411406289","doi":"https://doi.org/10.1109/msec.2025.3576909","title":"Relational Cybercrimes: A New Way Forward in Classifying Cybercrimes","display_name":"Relational Cybercrimes: A New Way Forward in Classifying Cybercrimes","publication_year":2025,"publication_date":"2025-06-18","ids":{"openalex":"https://openalex.org/W4411406289","doi":"https://doi.org/10.1109/msec.2025.3576909"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2025.3576909","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2025.3576909","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/msec.2025.3576909","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054441117","display_name":"Monica T. Whitty","orcid":"https://orcid.org/0000-0001-8143-289X"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Monica. T. Whitty","raw_affiliation_strings":["Department for Software Systems and Cyber Security Monash University, Clayton, Australia","Department for Software Systems and Cyber Security, Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department for Software Systems and Cyber Security Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836"]},{"raw_affiliation_string":"Department for Software Systems and Cyber Security, Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006101325","display_name":"Garry Young","orcid":"https://orcid.org/0000-0003-0628-0931"},"institutions":[{"id":"https://openalex.org/I2801350665","display_name":"Monash Medical Centre","ror":"https://ror.org/036s9kg65","country_code":"AU","type":"healthcare","lineage":["https://openalex.org/I2801350665","https://openalex.org/I4210121067"]},{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Garry Young","raw_affiliation_strings":["Department of Human-Centred Computing, Monash University, Clayton, Australia","Department of Human-Centred Computing, Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Human-Centred Computing, Monash University, Clayton, Australia","institution_ids":["https://openalex.org/I56590836","https://openalex.org/I2801350665"]},{"raw_affiliation_string":"Department of Human-Centred Computing, Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054441117"],"corresponding_institution_ids":["https://openalex.org/I56590836"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19957331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"4","first_page":"80","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9671000242233276,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11838","display_name":"Crime, Illicit Activities, and Governance","score":0.9451000094413757,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5477437973022461},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.4209245443344116},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.4001219868659973},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3253909647464752}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5477437973022461},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.4209245443344116},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.4001219868659973},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3253909647464752}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/msec.2025.3576909","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2025.3576909","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:openaire/fbed8a6a-abd0-4a1b-bb38-333bc12be49b","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/fbed8a6a-abd0-4a1b-bb38-333bc12be49b","pdf_url":"https://research.monash.edu/files/731898791/709033205-oa.pdf","source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Whitty, M T & Young, G 2025, 'Relational Cybercrimes : A New Way Forward in Classifying Cybercrimes', IEEE Security and Privacy, vol. 23, no. 4, pp. 80-90. https://doi.org/10.1109/MSEC.2025.3576909","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/msec.2025.3576909","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2025.3576909","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W88926070","https://openalex.org/W2028539073","https://openalex.org/W2078858220","https://openalex.org/W2468823177","https://openalex.org/W2621190648","https://openalex.org/W2735892124","https://openalex.org/W2765405871","https://openalex.org/W2896921551","https://openalex.org/W2910198326","https://openalex.org/W2925555766","https://openalex.org/W2938692238","https://openalex.org/W3094954752","https://openalex.org/W3161980948","https://openalex.org/W4223958541","https://openalex.org/W4311107812"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Cybercrimes":[0],"are":[1],"classified":[2],"as":[3,19,27],"either":[4],"cyber-dependent":[5],"or":[6],"cyber-enabled.":[7],"We":[8],"present":[9],"an":[10],"alternative":[11],"classification":[12,35],"by":[13],"introducing":[14],"a":[15],"cluster":[16],"referred":[17],"to":[18,38],"<italic":[20],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[21],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">relational":[22],"cybercrimes</i>\u2014which":[23],"includes":[24],"offences,":[25],"such":[26],"romance":[28],"scams,":[29],"cyberstalking,":[30],"sextortion,":[31],"and":[32],"radicalization\u2014hoping":[33],"this":[34],"may":[36],"lead":[37],"prevention":[39],"breakthroughs.":[40]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
