363 research outputs found

    Enhancing the effectiveness of cybercrime prevention through policy monitoring

    Get PDF
    This article examines the feasibility of designing and implementing a cybercrime prevention monitoring approach to enhance the quality of knowledge about policies that aim to reduce the prevalence and impact of online harms. Despite very significant investments made by governments over the past decade to improve the cybersecurity of publicly and privately-operated computer systems, there is very limited systematic knowledge about what cybercrime prevention policies have been adopted in various parts of the world and even less knowledge about their effectiveness in reducing the exposure of individuals and organizations to cybercrime. Borrowing from the policy monitoring (or policy surveillance) methodology that was developed in a broad range of fields such as public health and education, this article argues that such an approach would be critical in advancing our understanding of what is being done to control cybercrime, what works, what doesn’t, and what is promising. This article provides an overview of the principles and benefits of the policy monitoring approach, reviews the main features of a sample of 18 policy monitoring platforms, assesses a dozen cybersecurity policy rating initiatives—concluding that very few of them include cybercrime in their framework, then provides a template for the creation of a dedicated cybercrime prevention monitoring tool that would benefit academics, policy-makers and practitioners

    Datation par le carbone 14 d'un niveau sédimentaire de l'archipel du lac Tchad

    Get PDF
    International audienceUne datation de 460 ans BP d'un niveau d'argile d'une carotte prélevée dans l'archipel du lac Tchad permet de situer une phase d'assÚchement dans l'histoire récente du lac et de calculer une vitesse de sédimentation. Le rÎle et l'importance des conditions locales sont soulignés

    The impact of a Canadian financial cybercrime prevention campaign on clients’ sense of security

    Full text link
    The purpose of this study was to evaluate the impact of a cybercrime prevention campaign that was run by a Canadian financial institution. More specifically, we examined how participants/clients perceived the financial institution’s initiative to inform them about cybercrimes. The study also explored whether or not the campaign had the desired effect, which was to reinforce the clients’ sense of security. This campaign took place on October 2018 and 1452 adults (831 males and 621 females) participated in the online web survey. The results indicated that the prevention campaign had been positively perceived by most of the respondents (93.2%). However, only a low percentage of individuals (18%) had seen the poster/campaign prior to the completion of the survey while the majority (82%) accessed the prevention campaign’s components during the survey. Further analysis has shown no gender differences in participants’ responses. In general, participants felt that the campaign has increased their sense of security, especially among older individuals (55 years old and over). Most participants have expressed an interest in receiving more information on cybercrime and how to take actions on protecting one’s self. Results suggest that it would be advisable to conduct targeted prevention campaigns in order to reach out to as many people as possible. Discussion also includes practical recommendations based on the results and the review of the literature

    Enhancing relationships between criminology and cybersecurity

    Full text link
    ‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing (Brodeur, 2010) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber-crime and cyber-security and to call for more fruitful alliances between cybercrime and cybersecurity researchers

    Countering distrust in illicit online networks : the dispute resolution strategies of cybercriminals

    Full text link
    The core of this paper is a detailed investigation of the dispute resolution system contained within Darkode, an elite cybercriminal forum. Extracting the dedicated disputes section from within the marketplace, where users can report bad behaviour and register complaints, we carry out content analysis on these threads. This involves both descriptive statistics across the dataset and qualitative analysis of particular posts of interest, leading to a number of new insights. First, the overall level of disputes is quite high, even though members are vetted for entry in the first instance. Second, the lower ranked members of the marketplace are the most highly represented category for both the plaintiffs and defendants. Third, vendors are accused of malfeasance far more often than buyers, and that their “crimes” are most commonly either not providing the product/service or providing a poor one. Fourth, the monetary size of the disputes is surprisingly small. Finally, only 23.1% of disputes reach a clear outcome

    Saisir la sĂ©curitĂ© privĂ©e : quand l’État, l’industrie et la police nĂ©gocient un nouveau cadre de rĂ©gulation

    Get PDF
    L’accroissement substantiel de l’industrie de la sĂ©curitĂ© a profondĂ©ment changĂ© la maniĂšre dont la sĂ©curitĂ© est gouvernĂ©e aujourd’hui. Une rĂ©cente proposition lĂ©gislative de la province de QuĂ©bec sur la sĂ©curitĂ© privĂ©e – Loi sur la sĂ©curitĂ© privĂ©e – nous a servi de point de dĂ©part pour rĂ©pondre Ă  deux objectifs, soit tenter de dĂ©finir l’objet « sĂ©curitĂ© privĂ©e » et comprendre les liens qu’entretient cette sĂ©curitĂ© privĂ©e avec l’État et la police. Une analyse de la littĂ©rature grise accompagnant cette loi (mĂ©moires dĂ©posĂ©s Ă  l’AssemblĂ©e nationale du QuĂ©bec et consultations particuliĂšres de la Commission des institutions) nous a permis de dĂ©crire les divers morcellements de la sĂ©curitĂ© privĂ©e, ainsi que la difficultĂ© Ă  la circonscrire clairement, les frontiĂšres l’entourant Ă©tant larges et poreuses. En outre, notre analyse a mis en lumiĂšre certaines spĂ©cificitĂ©s de l’État dans la gouvernance de la sĂ©curitĂ© – soit sa capacitĂ© Ă  lĂ©gifĂ©rer et Ă  lĂ©gitimer – qui continuent Ă  peser sur l’industrie. Enfin, il est observĂ© que l’industrie de la sĂ©curitĂ© privĂ©e ne tente pas tant de se substituer Ă  la police que de se construire une place Ă  part, qui lui soit propre et, si est possible, libre de toute contrainte.The dramatic growth of the security industry has significantly altered the way security is governed today. We relied on a recent bill on private security enacted by the province of QuĂ©bec to question two dimensions, that is the definition of the object ‘private security,’ as seen by the state, and the existing ties of this private security with the state and the public police. Drawing from submissions (white papers) made to the parliamentary committee reviewing the Bill and from transcripts of the hearings held in Parliament, we designed a four-layer model to describe the vagueness of the delimitations of private security, as well as its inner divisions. Then, we shed some light on the capacity of the state to legislate and legitimate, thus keeping the state in a very strategic, and partially unchallengeable, position in the governance of security. Finally, we found that the private security doesn’t want so much to replace the public police than create its own place in the field of security
    • 

    corecore