Abstract
The following chapter provides an in depth look at a broad selection challenges related to Cybercrime and Cyberterrorism, as identified through prolonged engagement with a multitude of horizontal and vertical cyber-security stakeholders. Out of six critical areas identified, the two leading causes, were through the evolving rate of technology, and, the subsequent lack of education, awareness and training. These two underlying factors further influenced and affected the severity of the additional four critical areas; the capability of investigators, cooperation and information sharing, legislative systems and data protection, and, organisational and societal resilience. Through the consultation and elicitation of information from over 90 individual domain experts, practitioners and security stakeholders, the research of this chapter is dedicated towards improving international awareness towards leading threats, vulnerabilities, and challenges to the continually evolving sphere of cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akhgar, B., Staniforth, A.: Tackling Cyber Crime and Cyber Terrorism Through a Methodological Approach. Freedom From Fear 2015 (2015). http://f3magazine.unicri.it/?p=621. Accessed 25 Apr 2016
Aspray, W.: Chasing Moore’s Law. SciTech Pub., Raleigh (2014). http://univebooks.com/file/C/Chasing-Moores-Law.pdf. Accessed 25 Apr 2016
Bauman, Z.: Modernity and the Holocaust. Polity Printing Press, Cambridge (1991)
Beck, U.: Risk Society: Towards a New Modernity. Sage Publications, Munich (1992)
Boehm, B.W.: Software Engineering Economics (1984). https://extras.springer.com/2002/978-3-642-59413-7/4/rom/pdf/Boehm_hist.pdf. Accessed 25 Apr 2016
Brenner, S.: Cyberthreats: The Emerging Fault Lines of the Nation State. Oxford University Press, New York (2009)
Castells, M.: Information Technology, Globalization and Social Development. United Nations research Institute for Social Development (1999). http://www.unrisd.org/80256B3C005BCCF9/(httpAuxPages)/F270E0C066F3DE7780256B67005B728C?OpenDocument. Accessed 25 Apr 2016
Corbin, J., Strauss, A.: Grounded theory research: procesures, canons and evaluative criteria. Zeitschrift fuer Soziologie 19(6), 418–427 (1990). http://springerlink.bibliotecabuap.elogim.com/article/10.1007/BF00988593 Accessed 25 Apr 2016
Council of Europe, Convention on CC. Counceil De L’Europe, Budapest (2001). http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm. Accessed 25 Apr 2016
Denning, D.E.: “Cyberterrorism,” Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives (2000). http://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm. Accessed 25 Apr 2016
ENISA, FAQ Cyber Europe 2010 Final (2015). www.enisa.europa.eu/media/news-items/faqs-cyber-europe-2010-final/view?searchterm=cyber%20europe. Accessed 25 Apr 2016
ENISA, CERT Cooperation and its further facilitation by relevant stakeholders (2015). https://www.enisa.europa.eu/activities/cert/background/coop/files/cert-cooperation-and-its-further-facilitation-by-relevant-stakeholders. Accessed 25 Apr 2016
EU Executive Report, Smart Cities (2015). https://eu-smartcities.eu/sites/all/files/blog/files/Transformational%20Smart%20Cities%20-%20Symantec%20Executive%20Report.pdf. Accessed 25 Apr 2016
Glaser, B.G.: Theoretical Sensitivity: Advances in the Methology of Grounded Theory (1978)
Giddens, A.: The Consequences of Modernity (1990). http://ewclass.lecture.ub.ac.id/files/2015/02/Giddens_-_Consequences_of_Modernity_17388b4f6c76919ffe7817f7751c61fa.pdf. Accessed 25 Apr 2016
Guinchard, A.: Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy (2011). http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1107&context=jss. Accessed 25 Apr 2016
Koops, B.J.: The Internet and its Opportunities for CC (2010). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1738223. Accessed 25 Apr 2016
Kremer, J.-F., Müller, B.: Cyberspace and International Relations: Theory, Prospects and Challenges. Springer, Heidelberg (2014)
Landeta, J.: Current validity of the Delphi method in social sciences. Technological Forecasting and Social Change 73, 467–482 (2005). http://www.sciencedirect.com/science/article/pii/S0040162505001381. Accessed 25 Apr 2016
Linstone, H., Turoff, M.: The Delphi method: Techniques and applications. Addison-Wesley (1975). https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=256068. Accessed 25 Apr 2016
Medland, D.: U.K. Study reveals Serious Underreporting of Cyber Atacks by Business. Forbers (2016). http://www.forbes.com/sites/dinamedland/2016/03/02/u-k-study-reveals-serious-under-reporting-of-cyber-attacks-by-business/#79392e1c392e. Accessed 25 Apr 2016
Microsoft, The Cybersecurity Risk Paradox: Impact of Social, Economic, and Technological Factors on Rates of Malware. Microsoft Security Intelligence Report, Special Edition (2014). http://download.microsoft.com/download/E/1/8/E18A8FBB-7BA6-48BD-97D2-9CD32A71B434/Cybersecurity-Risk-Paradox.pdf. Accessed 25 Apr 2016
Rumsfield, D.: Known and Unknown: A Memoir. Penguin Press, London (2011)
Salazar Ortuno, A.: Collective Intelligence. Crisis Response 10(3) (2015)
Schneier, B.: Heartbleed. Schneier on Security (2014). https://www.schneier.com/blog/archives/2014/04/heartbleed.html. Accessed 25 Apr 2016
Acknowledgements
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the COURAGE project under grant agreement no 607949.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wells, D., Brewster, B., Akhgar, B. (2016). Challenges Priorities and Policies: Mapping the Research Requirements of Cybercrime and Cyberterrorism Stakeholders. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)