Abstract
In this concluding chapter, we consolidate the broad spectrum of challenges discussed throughout this book towards the formulation of a number key priority topics to be addressed by future research related to cybercrime and cyberterrorism. During this process many of the specific areas that need to be addressed are defined across four interlinked dimensions; technological, regulatory, organisational and human. In the process of identifying the nature of the challenges posed, the scope of the research and initiatives needed in order to progress measures targeting them, as well as the required impacts needed in order to ensure the significance of those initiatives. Initial sections of the chapter recapture, from a definitional perspective, the definitions of cybercrime and its constituent elements towards establishing a harmonised taxonomy of terms that we can use to inform the future work being proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
N. ELIS (2014), Can Big Data prevent the next Cyber Attack?
- 4.
B.-J. KOOPS (2010), The Internet and its Opportunities for CC, p. 737.
- 5.
Commonwealth of Independent States Agreement (2001), article 1(a).
- 6.
Shanghai Cooperation Organization Agreement (2010), articles 1, 2 and Annex 1.
- 7.
Draft African Union Convention (2012), Part III, Chapter V, Sections II, Chapters 1 and 2.
- 8.
UNODC (2013), Comprehensive study on CC.
- 9.
Ibid, p. xvii.
- 10.
Ibid, p. 41.
- 11.
European Convention on CC (2001). Available at: http://conventions.coe.int/Treaty/en/Treaties/html/185.htm.
- 12.
Council of Europe (2016), 2001 Budapest Convention on CC - Chart of Signatures and Ratifications of Treaty 185. Available at: http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=CHRqyFpJ.
- 13.
S. BRENNER (2007), “At Light Speed”. Attribution and Response to CC/Terrorism/Warfare.
- 14.
US DEPARTMENT OF JUSTICE, FBI Law Enforcement Bulletin: Cyber Terror.
- 15.
N. VEERASAMY (2010). Motivation for CT.
- 16.
S.A. JALIL (2003), Countering Cyber Terrorism Effectively: Are We Ready To Rumble?, GIAC Security Essentials Certification (GSEC) Practical Assignment, Version 1.4b, Option 1.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
References
Aiken, M., et al.: A consideration of the social impact of CC: examples from hacking, piracy, and child abuse material online. Contemporary Social Science, pp. 1–19. http://www.tandfonline.com/doi/full/10.1080/21582041.2015.1117648. Accessed 21 Apr 2016
Boyatzis, R.E.: Transforming qualitative information: thematic analysis and code development, Sage (1998)
Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)
Chawki, M.: A critical look at the regulation of cybercrime. ICFAI J. Cyberlaw. IV (4) (2005)
Conway, M.: What is Cyberterrorism? The story so far. J. Inf. Warfare 2(2), 33–42 (2003)
Choras, M., Kozik, R., Torres Bruna, M.P., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resilience. In: ARES 2015, pp. 686–692 (2015)
Choraś, M., Kozik, R., Renk, R., Holubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds.) International Joint Conference CISIS 2015 and ICEUTE 2015. AISC, pp. 485–495. Springer, Switzerland (2015). ISBN: 978-3-319-19712-8
Denning, D.: Testimony before the Special Oversight Panel on Terrorism. US House of Representatives, Committee on Armed Services (2000)
Europol, The Internet Organised Crime Threat Assessment (2015). https://www.europol.europa.eu/iocta/2015/. Accessed 21 Apr 2016
Koops, B.J., Brenner, S.W.: Approaches to cybercrime jurisdiction. J. High Technol. Law 4(1), 189–202 (2004)
Koops, B.J.: The Internet and its opportunities for Cybercrime. In: Herzog-Evans, M. (ed.) Transnational Criminology Manual, vol. 1, pp. 735–754. WLP, Nijmegen (2010)
Manky, D.: Cybercrime as a service: a very modern business. Computer Fraud & Security (2013). http://www.sciencedirect.com/science/article/pii/S1361372313700538. Accessed 21 Apr 2016
Parker, D.B.: Threats to computer systems (No. UCRL-13574). California Univ Berkeley Lawrence Livermore Lab (1973)
Podgor, E.S.: International computer fraud: A paradigm for limiting national jurisdiction (2002)
Veerasamy, N., Grobler, M., Von Solsm, B.: Building an Ontology for CT (2012)
Wall, D.S.: The rise of the Internet as a crime problem. In: Handbook of Internet Crime, Vancouver, pp. 88–102 (2010)
Wall, D.S.: The Transformation of Crime in the Information Age. Polity, Cambridge (2007)
Acknowledgement
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) under grant agreement numbers 607949 (COURAGE) and 607406 (CAMINO).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Akhgar, B. et al. (2016). Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)