{"id":"https://openalex.org/W4396674481","doi":"https://doi.org/10.3390/info15050263","title":"Cybercrime Intention Recognition: A Systematic Literature Review","display_name":"Cybercrime Intention Recognition: A Systematic Literature Review","publication_year":2024,"publication_date":"2024-05-05","ids":{"openalex":"https://openalex.org/W4396674481","doi":"https://doi.org/10.3390/info15050263"},"language":"en","primary_location":{"id":"doi:10.3390/info15050263","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050263","pdf_url":"https://www.mdpi.com/2078-2489/15/5/263/pdf?version=1714903761","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2078-2489/15/5/263/pdf?version=1714903761","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094202120","display_name":"Yidnekachew Worku Kassa","orcid":"https://orcid.org/0009-0002-0325-7322"},"institutions":[{"id":"https://openalex.org/I4210129636","display_name":"Addis Ababa Science and Technology University","ror":"https://ror.org/02psd9228","country_code":"ET","type":"education","lineage":["https://openalex.org/I4210129636"]},{"id":"https://openalex.org/I4537092","display_name":"Addis Ababa University","ror":"https://ror.org/038b8e254","country_code":"ET","type":"education","lineage":["https://openalex.org/I4537092"]}],"countries":["ET"],"is_corresponding":true,"raw_author_name":"Yidnekachew Worku Kassa","raw_affiliation_strings":["School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa P.O. Box 1176, Ethiopia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa P.O. Box 1176, Ethiopia","institution_ids":["https://openalex.org/I4210129636","https://openalex.org/I4537092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072289062","display_name":"Joshua I. James","orcid":"https://orcid.org/0000-0003-0148-4732"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joshua Isaac James","raw_affiliation_strings":["DFIR Science LLC, Bangkok 10110, Thailand"],"affiliations":[{"raw_affiliation_string":"DFIR Science LLC, Bangkok 10110, Thailand","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028555608","display_name":"Elefelious Getachew Belay","orcid":"https://orcid.org/0000-0001-8720-6295"},"institutions":[{"id":"https://openalex.org/I4210129636","display_name":"Addis Ababa Science and Technology University","ror":"https://ror.org/02psd9228","country_code":"ET","type":"education","lineage":["https://openalex.org/I4210129636"]},{"id":"https://openalex.org/I4537092","display_name":"Addis Ababa University","ror":"https://ror.org/038b8e254","country_code":"ET","type":"education","lineage":["https://openalex.org/I4537092"]}],"countries":["ET"],"is_corresponding":false,"raw_author_name":"Elefelious Getachew Belay","raw_affiliation_strings":["School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa P.O. Box 1176, Ethiopia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa P.O. Box 1176, Ethiopia","institution_ids":["https://openalex.org/I4210129636","https://openalex.org/I4537092"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5094202120"],"corresponding_institution_ids":["https://openalex.org/I4210129636","https://openalex.org/I4537092"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":1.1251,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75479173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"15","issue":"5","first_page":"263","last_page":"263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8461436033248901},{"id":"https://openalex.org/keywords/systematic-review","display_name":"Systematic review","score":0.5209047198295593},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.4384923577308655},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40576350688934326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34094876050949097},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3401482105255127},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.21276286244392395},{"id":"https://openalex.org/keywords/medline","display_name":"MEDLINE","score":0.1723078191280365},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16543450951576233},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14381247758865356},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.10016649961471558}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8461436033248901},{"id":"https://openalex.org/C189708586","wikidata":"https://www.wikidata.org/wiki/Q1504425","display_name":"Systematic review","level":3,"score":0.5209047198295593},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.4384923577308655},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40576350688934326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34094876050949097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3401482105255127},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.21276286244392395},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.1723078191280365},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16543450951576233},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14381247758865356},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10016649961471558}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/info15050263","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050263","pdf_url":"https://www.mdpi.com/2078-2489/15/5/263/pdf?version=1714903761","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:25b8e082edfe4ccfb7afa2b337400860","is_oa":true,"landing_page_url":"https://doaj.org/article/25b8e082edfe4ccfb7afa2b337400860","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Information, Vol 15, Iss 5, p 263 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/info15050263","is_oa":true,"landing_page_url":"https://doi.org/10.3390/info15050263","pdf_url":"https://www.mdpi.com/2078-2489/15/5/263/pdf?version=1714903761","source":{"id":"https://openalex.org/S4210219776","display_name":"Information","issn_l":"2078-2489","issn":["2078-2489"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396674481.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W308438294","https://openalex.org/W1539987097","https://openalex.org/W1996767106","https://openalex.org/W2014113877","https://openalex.org/W2056746095","https://openalex.org/W2163598528","https://openalex.org/W2321990803","https://openalex.org/W2555468998","https://openalex.org/W2628759714","https://openalex.org/W2754582685","https://openalex.org/W2784718811","https://openalex.org/W2913597926","https://openalex.org/W2962825174","https://openalex.org/W2971943712","https://openalex.org/W2973625556","https://openalex.org/W3010661144","https://openalex.org/W3012567678","https://openalex.org/W3022953388","https://openalex.org/W3044462962","https://openalex.org/W3080260826","https://openalex.org/W3103319283","https://openalex.org/W3115798218","https://openalex.org/W3118615836","https://openalex.org/W3160114030","https://openalex.org/W3176888870","https://openalex.org/W3210059387","https://openalex.org/W4205592184","https://openalex.org/W4214889219","https://openalex.org/W4243222480","https://openalex.org/W4247009661","https://openalex.org/W4250706065","https://openalex.org/W4288414189","https://openalex.org/W4293417205","https://openalex.org/W4309357352","https://openalex.org/W4310676331","https://openalex.org/W4312391278","https://openalex.org/W4327927408","https://openalex.org/W4366547444","https://openalex.org/W4367281679","https://openalex.org/W4386159340","https://openalex.org/W4388169576","https://openalex.org/W4391351198","https://openalex.org/W4394372016","https://openalex.org/W6680277930","https://openalex.org/W6684327724","https://openalex.org/W6730280463"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W111175386","https://openalex.org/W4361023959"],"abstract_inverted_index":{"In":[0,94],"this":[1,227,261],"systematic":[2,120],"literature":[3],"review,":[4],"we":[5,123,229,242],"delve":[6],"into":[7,133],"the":[8,14,44,81,95,106,180,192,244,255],"realm":[9],"of":[10,16,23,48,68,75,83,92,97,108,186,209,246],"intention":[11,99,146,252],"recognition":[12,71,100,147],"within":[13],"context":[15,96],"digital":[17,49,193,204],"forensics":[18,37,194,205],"and":[19,33,46,56,90,110,130,142,172,211,220,239],"cybercrime.":[20],"The":[21],"rise":[22],"cybercrime":[24],"has":[25,148],"become":[26],"a":[27,39,66,73,118,189,247],"major":[28],"concern":[29],"for":[30,203,223,231,257],"individuals,":[31],"organizations,":[32],"governments":[34],"worldwide.":[35],"Digital":[36],"is":[38,72,198],"field":[40],"that":[41,59,78,200,234],"deals":[42,79],"with":[43,80],"investigation":[45],"analysis":[47],"evidence":[50,64],"in":[51,65,191,260],"order":[52],"to":[53,104,112,153,249],"identify,":[54],"preserve,":[55],"analyze":[57],"information":[58],"can":[60,101],"be":[61,102],"used":[62,103],"as":[63,179],"court":[67],"law.":[69],"Intention":[70],"subfield":[74],"artificial":[76,167],"intelligence":[77,168],"identification":[82],"agents\u2019":[84],"intentions":[85,107],"based":[86],"on":[87],"their":[88,114,224],"actions":[89],"change":[91],"states.":[93],"cybercrime,":[98],"identify":[105],"cybercriminals":[109],"even":[111],"predict":[113],"future":[115,258],"actions.":[116],"Employing":[117],"PRISMA":[119],"review":[121],"approach,":[122],"curated":[124],"research":[125],"articles":[126],"from":[127],"reputable":[128],"journals":[129],"categorized":[131],"them":[132],"three":[134],"distinct":[135],"modeling":[136],"approaches:":[137],"logic-based,":[138],"classical":[139],"machine":[140],"learning-based,":[141],"deep":[143,176],"learning-based.":[144],"Notably,":[145],"transcended":[149],"its":[150,183],"historical":[151],"confinement":[152],"network":[154],"security,":[155],"now":[156],"addressing":[157],"critical":[158],"challenges":[159],"across":[160],"various":[161],"subdomains,":[162],"including":[163],"social":[164],"engineering":[165],"attacks,":[166],"black":[169],"box":[170],"vulnerabilities,":[171],"physical":[173],"security.":[174],"While":[175],"learning":[177],"emerges":[178],"dominant":[181],"paradigm,":[182],"inherent":[184],"lack":[185],"transparency":[187],"poses":[188],"challenge":[190],"landscape.":[195],"However,":[196],"it":[197],"imperative":[199],"models":[201],"developed":[202],"possess":[206],"intrinsic":[207],"attributes":[208],"explainability":[210],"logical":[212],"coherence,":[213],"thereby":[214],"fostering":[215],"judicial":[216],"confidence,":[217],"mitigating":[218],"biases,":[219],"upholding":[221],"accountability":[222],"determinations.":[225],"To":[226],"end,":[228],"advocate":[230],"hybrid":[232],"solutions":[233],"blend":[235],"explainability,":[236],"reasonableness,":[237],"efficiency,":[238],"accuracy.":[240],"Furthermore,":[241],"propose":[243],"creation":[245],"taxonomy":[248],"precisely":[250],"define":[251],"recognition,":[253],"paving":[254],"way":[256],"advancements":[259],"pivotal":[262],"field.":[263]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
