96 research outputs found

    Global Cybersecurity: Issues and Concerns [Editorial]

    Get PDF
    By all accounts, the global cybercrime industry is significantly bigger than most of the major and well-known underground and underworld industries. The most often cited figure for the annual worldwide loss to cybercrime is US$1 trillion (Kshetri, 2013a). This is significantly bigger than the illegal drug industry and the human trafficking industry. According to the 2011 Norton Cybercrime Report released by Symantec, 69% of the world's internet users have been victimized at some points in their lives by cybercriminals

    CC-DRIVER Policy Brief No. 8: European Youth Survey

    Get PDF
    This policy brief contains key findings from the CC-DRIVER 2021 European Youth Survey and corresponding conclusions. This brief is designed for all professionals working within the area of cybercrime and key stakeholders, including LEAs, Academics, Criminal Justice, Policy Makers, and Educators. The lack of clarity surrounding the term cybercrime has significant impact on society, cybercrime policy, legal intervention, and academic research. No single classification system fully encapsulated cybercrime concepts or accurately reflected the nebulous nature of cybercrime acts. There is remaining ambiguity as to what exactly constitutes a cybercrime, and it is likely that a clear conceptualisation of cybercrime will continue to be challenged. This review presents key cybercrime definitions, categorisations of cybercrime and typologies of cybercrime. This review presents a new framework with which to conceptualise cybercrime

    Cybercrime Related Topics : Review Study

    Get PDF
    A cybercrime is a crime that involves a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. There are many privacy concerns surrounding cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyberwarfare. Warren Buffett describes cybercrime as the "number one problem with mankind" and said that cybercrime "poses real risks to humanity.

    Cyber Risks: Emerging Risk Management Concerns for Financial Institutions

    Full text link
    Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange. Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even if the antics of high school hackers or a Bonnie-and-Clyde-smash-and-grab of sensitive client data is not alarming, a malicious wave of outages executed as an Ocean\u27s Eleven heist that disarms and disables an international securities exchange demands a regulatory response. Cyber threats designed to disrupt or deny service for the small body of systemically important financial institutions that intermediate global commerce and banking create a special universe of concerns. The financial markets sector is broad, encompassing conventional depository banks, securities, commodities, and derivatives platforms or exchanges; investment banks; hedge, pension, and mutual funds; brokerage firms; and, in some cases, insurance companies.\u27 The number of data breaches threatening to interrupt the services offered by these institutions could shock, debilitate, or even (temporarily) paralyze the global economy. Startling examples underscore these concerns. In 2013, hackers penetrated Citigroup\u27s network and compromised data related to tens of thousands of customer accounts. A year later, JP Morgan Chase endured a similar cyberattack affecting more than 76 million households

    European Youth Cybercrime, Online Harm and Online Risk Taking: 2022 Research Report

    Get PDF
    Researching cybercriminality to design new methods to prevent, investigate and mitigate cybercriminal behaviour. This is one of the largest studies to date exploring youth cybercriminality. The survey is informed by 5 key disciplines: cyberpsychology, criminology, psychology, neuroscience, and digital anthropology Results confirm that cybercrime and cyberdeviance is prevalent-survey finds that two thirds (69%) of European youth self-report to have committed at least one form of cybercrime or online harm or risk taking, and just under half 47.76% (N=3808) report to have engaged in criminal behaviour online, from summer of 2020 to the summer of 2021 Survey finds that males are more likely (74%) than females (65%) to self-report having been involved in at least one form of cybercrime or online harm or risk taking in the last year and results confirm that the majority of cybercrime and cyberdeviant behaviours are gendered. Survey analysis demonstrates that cybercriminal and online harm or risk taking behaviours form a cluster of 11 behaviours that are highly interrelated (CcCd-Cluster) and that cybercrime and online harm or risk taking behaviours represent a spectrum (CcCd-Spectrum) A significant shift from a siloed, categorical approach is needed in terms of how cybercrimes are conceptualised, investigated, and legislated

    Understanding cybercrime in Malaysia: an overview

    Get PDF
    Rapid developments of internet technology and cyber world have created new opportunities for irresponsible people to take advantage of internet users. Millions of internet users across globe have fallen victim to cybercrime. However, many issues regarding cybercrime are not fully understood yet. It is important to thoroughly understand many aspects of cybercrime for better decision making. This paper provides an overview of cybercrime in Malaysia including current state and statistics of cybercrime, common types of cybercrime, brief description of Malaysian cyber laws and describes the role of Malaysian government in responding to cyber security incidents. Hopefully, this paper will enrich current scenarios of cybercrime in Malaysia. Finally, the directions for future research were discussed

    A Cybercrime Taxonomy: Case of the Jamaican Jurisdiction

    Get PDF
    Cybercrimes over the years have become both increasingly numerous and sophisticated. This paper presents a taxonomy for cybercrimes that can be used for the analysis and categorization of such crimes, as well as providing consistency in language when describing cybercrimes. This taxonomy is designed to be useful to information bodies such as the Jamaican Cybercrime Unit, who have to handle and categorize an ever increasing number of cybercrimes on a daily basis. Additionally, cybercrime investigators could use the taxonomy to communicate more effectively as the taxonomy would provide a common classification scheme. The proposed taxonomy uses the concept of characteristics structure. That is, the taxonomy classifies properties about that which is being classified and not by the object itself. The taxonomy consists of characteristics which provide a holistic taxonomy in order to deal with inherent problems in the cybercrime field

    Cybercrime: a theoretical overview of the growing digital threat

    Get PDF
    This theoretical paper is published by the EUCPN Secretariat in connection with the theme of the Luxembourgian presidency which was cybercrime. Cybercrime is a global definition which characterizes many different criminal forms committed in the virtual world. This means the phenomenon covers a very wide scope of activities. This theoretical paper is written as an overview to help understand the definition of cybercrime and its forms. We concentrate on the variety of consequences as a result of the phenomenon. Moreover, this paper also has attention to the current European law and legislative actions against cybercrime

    LEGITIMASI PENYEBARAN INFORMASI YANG MEMILIKI MUATAN PENGHINAAN DAN/ATAU PENCEMARAN NAMA BAIK DALAM PASAL 310 KUHP DAN UNDANG-UNDANG NOMOR 19 TAHUN 2016 TENTANG PERUBAHAN ATAS UNDANG-UNDANG NOMOR 11 TAHUN 2008 TENTANG INFORMASI DAN TRANSAKSI ELEKTRONIK

    Get PDF
    Abstrak Keberadaan dunia cyber memberikan pengaruh besar di berbagai bidang kehidupan. Pengaruh tersebut tidaklah selalu berdampak positif tetapi juga negatif. Dampak negatif terwujudkan dengan istilah cybercrime. Perkembangan cyber law mengalami kemajuan pesat sehingga banyak pengaturan pada penggunaan dunia cyber. Tujuan penelitian ini adalah mengetahui legitimasi pemidanaan penyebaran informasi yang memiliki muatan penghinaan dan/atau pencemaran nama baik yang tidak dianggap salah oleh peraturan-peraturan lain di Indonesia kecuali oleh Undang-Undang ITE, dan mengetahui ketentuan penyebaran informasi dalam Pasal 27 ayat (3) Undang-Undang ITE merupakan pengaturan yang tepat untuk mengendalikan informasi yang memiliki muatan penghinaan dan/atau pencemaran nama baik. Hasil penelitian ini adalah legitimasi pemidanaan penyebaran informasi yang memiliki muatan penghinaan dan/atau pencemaran nama baik yang tidak dianggap salah oleh peraturan-peraturan lain di Indonesia kecuali oleh Undang-Undang ITE. Pasal 27 ayat (3) Undang-Undang ITE merupakan suatu ketentuan yang mengatur penyebaran informasi yang mengandung muatan penghinaan dan/atau pencemaran nama baik. Ketentuan penyebaran informasi dalam Pasal 27 ayat (3) Undang-Undang ITE belum bisa dikatakan sebagai pengaturan yang tepat untuk mengendalikan informasi yang memiliki muatan penghinaan dan/atau pencemaran nama baik di dalam teknologi informasi. Yang menjadi permasalahan bukanlah mengenai rumusan yang tidak jelas dan multitafsir yang terkandung dalam pasalnya, melainkan batasan dari ketentuan tersebut yang bisa dikatakan terlalu luas. Dengan penggunaan konsep penyebaran di dalam Pasal 27 ayat (3), maka setiap orang dapat dikenakan ketentuan tersebut dan dipidana karenanya. Hal ini akan mengakibatkan hilangnya kebebasan berekspresi dan kemerdekaan menyatakan pendapat baik secara lisan maupun tulisan.Kata Kunci: Legitimasi, penyebaran informasi, penghinaan

    An ontological representation of a taxonomy for cybercrime

    Get PDF
    The modern phenomenon of cybercrime raises issues and challenges on a scale that has few precedents. A particular central concern is that of establishing clarity about the conceptualization of cybercrime and its growing economic cost to society. A further related concern is focused on developing appropriate legal and policy responses in a context where crime transcends national jurisdictions and physical boundaries. Both are predicated on a better understanding of cybercrime. Efforts at defining and classifying cybercrime by the use of taxonomies to date have largely been descriptive with resulting ambiguities. This paper contributes a semi-formal approach to the development of a taxonomy for cybercrime and offers the conceptual language and accompanying constraints with which to describe cybercrime examples. The approach uses the ontology development platform, Protégé and the Unified Modeling Language (UML) to present an initial taxonomy for cybercrime that goes beyond the descriptive accounts previously offered. The taxonomy is illustrated with examples of cybercrimes both documented in the Protégé toolset and also using UML
    corecore