3,301 research outputs found

    INTERNATIONAL AND REGIONAL ORGANIZATIONS WITH ATTRIBUTES AND PREOCCUPATIONS IN PREVENTING AND FIGHTING AGAINST CYBERCRIME AND THEIR MAIN ACCOMPLISHMENTS

    Get PDF
    At global level, there are various organizations which are constantly concerned with the analysis of the latest manifestations and evolution of cybercrime, setting up work groups to develop strategies for the prevention and fight of cybercrimes. Besides these international organizations which act globally, several other organizations focus on certain regions, dealing with issues related to cybercrime.cybercrime, organizations, declaration, resolution, convention

    Global Cyber Intermediary Liability: A Legal & Cultural Strategy

    Get PDF
    This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some level of injunctive relief, intermediaries operate in a largely unregulated environment. Part III looks at what we can learn from other countries. The cleanest intermediary country, Finland, and the worst country, Lithuania, were selected in order to explore the causes for the differences between country performances. The section examines the remarkable distinctions between national cultures to explain differences in national cybercrime rates. Part III.A of this Article argues that the criminal code laws do not account for the difference in host and ISP performances between Finland and Lithuania. There are few differences in the codified laws pertaining to cybercrime between these countries. Instead, it is Finland’s cultural and business environments that appear to drive its cybercrime ranking. Part IV suggests reforms to shift a country’s culture to make it less prone to corruption. However, changing a culture takes time so Part IV also proposes a private law scheme in which intermediaries are unable to wave the “flag of immunity,” as they do now. The guiding philosophy for this proposal is that harmed parties should be permitted to recover damages directly from “bad” intermediaries

    Public opinion and policy on crime prevention in Europe

    Get PDF
    In this second monitor report the focus is put on people’s perceptions and attitudes on the one hand, and on priorities in crime prevention policies across Europe on the other hand. What does the general public think about the police: their relationship with the communities, their effectiveness in preventing crime, their fairness with which they wield their authoritative power, their integrity,...? What do Europeans think of the effectiveness of policies on the different levels (national vs. European)? What do they believe to be the challenges to the security in the prevention and fight against crime? These are some questions approached in this report. The information and data used to answer these questions come from the Trust in the Police & Courts Module of the European Social Survey and from the Eurobarometer surveys conducted by the European Commission. Besides these existing survey data, the EUCPN Secretariat collected some additional data from the EUCPN members on the priorities in the crime prevention policies in their countries. More specifically, questions were asked about the country’s top three priorities in crime prevention policy/strategy and compared to the country’s three most prominent crime problems based on crime statistics. Also, it was examined whether or not the top three priorities in the country’s crime prevention policy were based on statistical or recorded data, or – if not – what other basis was used to pick these priorities. And finally, some questions were added about any remarkable or new developments in the Member States over the past five years

    The Federal Information Security Management Act of 2002: A Potemkin Village

    Get PDF
    Due to the daunting possibilities of cyberwarfare, and the ease with which cyberattacks may be conducted, the United Nations has warned that the next world war could be initiated through worldwide cyberattacks between countries. In response to the growing threat of cyberwarfare and the increasing importance of information security, Congress passed the Federal Information Security Management Act of 2002 (FISMA). FISMA recognizes the importance of information security to the national economic and security interests of the United States. However, this Note argues that FISMA has failed to significantly bolster information security, primarily because FISMA treats information security as a technological problem and not an economic problem. This Note analyzes existing proposals to incentivize heightened software quality assurance, and proposes a new solution designed to strengthen federal information security in light of the failings of FISMA and the trappings of Congress’s 2001 amendment to the Computer Fraud and Abuse Act

    The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium

    Get PDF
    The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the required battery power. Carbon fibre composites are by many seen as the only real option when traditional engineering materials are running out of potential for further weight reduction. However, the automotive industry lacks experience working with structural composites and the methods for high volume composite manufacturing are immature. The development of a composite automotive body structure, therefore, needs methods to support and guide the conceptual work to improve the financial and technical results. In this thesis a framework is presented which will provide guidelines for the conceptual phase of the development of an automotive body structure. The framework follows two main paths, one to strive for the ideal material diversity, which also defines an initial partition of the body structure based on the process and material selection. Secondly, a further analysis of the structures are made to evaluate if a more cost and weight efficient solution can be found by a more differential design and by that define the ideal part size. In the case and parameter studies performed, different carbon fibre composite material systems and processes are compared and evaluated. The results show that high performance material system with continuous fibres becomes both more cost and performance effective compared to industrialised discontinuous fibre composites. But also that cycle times, sometimes, are less important than a competitive feedstock cost for a manufacturing process. When further analysing the manufacturing design of the structures it is seen that further partition(s) can become cost effective if the size and complexity is large enough.      QC 20140527</p

    Cybercrime: a theoretical overview of the growing digital threat

    Get PDF
    This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual world. This means the phenomenon covers a very wide scope of activities. This theoretical paper is written as an overview to help understand the definition of cybercrime and its forms. We concentrate on the variety of consequences as a result of the phenomenon. Moreover, this paper also has attention to the current European law and legislative actions against cybercrime

    National plan to combat cybercrime

    Get PDF
    Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life. However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging as a key enabler for criminal activity. In Australia, the term \u27cybercrime\u27 is used to describe both: crimes directed at computers or other information communications technologies (ICTs) (such as hacking and denial of service attacks) and crimes where computers or ICTs are an integral part of an offence (such as online fraud, identity theft and the distribution of child exploitation material). Responsibility for combating the different forms of cybercrime in Australia is shared between Australian Government agencies state and territory agencies. All jurisdictions have criminal laws directed at the various forms of cybercrime. The Australian Attorney-General\u27s Department has led the development of a National Plan to Combat Cybercrime, in consultation with Australian Government agencies, state and territory agencies

    Policing virtual spaces: public and private online challenges in a legal perspective

    Get PDF
    The chapter concerns public and private policing of online platforms and the current challenges in terms of legislation, policing practices and the Dark Web

    Cybercrimes in the aftermath of COVID-19: Present concerns and future directions

    Get PDF
    Cybercrimes are broadly defined as criminal activities carried out using computers or computer networks. Given the rapid and considerable shifts in Internet use and the impact of the COVID-19 pandemic on cybercrime rates, online behaviours have attracted increased public and policy attention. In this article, we map the landscape of cybercrime in the UK by first reviewing legislation and policy, as well as examine barriers to reporting and address investigative challenges. Given the indisputable rise in cybercrime and its mental health impacts, we propose a four-facet approach for research and practice in this field with an eye to systemic shifts and strategies to combat cybercrime holistically: community alliances and social support, state intervention, and infrastructural sensitivity to user diversity. Lastly, empirical evidence from research guides the design of data-driven technology and provision of advice/interventions to provide a safer digital landscape — hence the importance for more informative research
    corecore