Abstract
The Internet ranks as one of the great inventions. With increasing access to the Internet and the low cost of computers, the Internet has become an integral part of our daily lives. According to the International Telecommunication Union (ITU), over 2.7 billion people were using the Internet in 2013. This is equivalent to about 40% of the world’s population. In the developed world the penetration rate is over 70%, while in the developing world it is estimated to be 30% or even less (ITU, 2013).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Archick, K. (2006). Cybercrime: The Council of Europe Convention. Washington, DC: The Library of Congress.
ASRS. (2008). ASRS Program Briefing. Accessed December 9, 2013, from http://asrs.arc.nasa.gov/overview/summary.html
Barlow, J.P. (1996). A Declaration of Independence for Cyberspace. Accessed September 28, 2013, from http://homes.eff.org/~barlow/Declaration-Final.html
Brenner, S. (2004). Distributed Security: A New Model of Law Enforcement.. Journal of International Law, 8(5), 7–25.
Brenner, S. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, CA: Praeger.
Broadhurst, R. and Chang, L.Y.C. (2013). Cybercrime in Asia: Trends and Challenges, in Hebenton, B., Jou, S. and Liu, J. (eds.) Asian Handbook of Criminology. New York: Springer. pp. 49–64.
Broadhurst, R. and Grabosky, P. (2005). Cyber-Crime: The Challenge in Asia. Hong Kong: Hong Kong University Press.
Capeller, W. (2001). Not Such Neat Net: Some Comments on Virtual Criminality.. Social and Legal Studies, 10, 229–242.
CERT (2011). 2011 CyberSecurity Watch Survey: How Bad Is the Insider Threat? Accessed January 3, from http://www.cert.org/archive/pdf/CyberSecuritySurvey2011Data.pdf
Chandler, A. (1996). The Changing Definition and Image of Hacker in Popular Disclosure.. International Journal of the Sociology of Law, 24, 229–251.
Chang, L.Y.C. (2012a). Responsive Regulation and the Reporting of Information Security Incidents,. Issues and Studies, 48(1), 85–119.
Chang, L.Y.C. (2012b). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait. Cheltenham: Edward Elgar.
Chang, L.Y.C. (2013). Formal and informal modalities for policing cybercrime across the Taiwan Strait,. Policing and Society, 23(4), 540–555.
Chinatimes. (2013). Taiwan and Philippines in Cyber War Over Fatal Shooting. Chinatimes. Accessed October 4, 2013, from http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130512000105&cid=1101
Choo, K.-K.R., Smith, R.G. and McCusker, R. (2007). Future Directions in Technology-Enabled Crime: 2007–2009. Accessed November 1, 2013, from http://www.aic.gov.au.
Cohen, L. and Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach.. American Sociological Review, 44, 588–607.
Cornish, D. and Clarke, R.V. (1986). Introduction, in Cornish and Clarke (eds.) The Reasoning Criminal. New York: Springer-Verlag. pp 1–16.
Dacey, R.F. (2004). Critical Infrastructure Protection — Establishing Effective Information Sharing with Infrastructure Sectors. Washington, DC: General Accounting Office.
Davidow, B. (2013). Productivity Tools For Cybercrime. The Atlantic. August 23. Accessed January 7, 2014 from http://www.theatlantic.com/technology/archive/2013/08/productivity-tools-for-cybercrime/278974/.
Ericson, R.V. (2007). Crime in an Insecure World. Cambridge: Polity Press.
F-secure. (2013). Rent-A-Hacker. Accessed November 3, 2013, from http://www.f-secure.com/weblog/archives/00002629.html.
Gibson, W. (1982). Burning Chrome. London: Harper Collins.
Gibson, W. (1984). Neuromancer. London: Harper Collins.
Gill, M. (2011). Learning From Offenders’ Accounts of Their Offending.. Prison Service Journal, 194, 27–32.
Goldsmith, J.T. and Wu, T. (2006). Who Controls the Internet?: Illusion of a Borderless World. New York: Oxford University Press.
Gordon, S. and Ford, R. (2006). On the Definition and Classification of Cybercrime.. Journal in Computer Virology, 2(1), 13–20.
Grabosky, P. (2007). Electronic Crime. New Jersey: Pearson.
Grabosky, P. (2013). Organised Crime and the Internet: Implications for National Security.. RUSI Journal, 158(5), 18–25.
Grabosky, P., Smith, R. and Dempsey, G. (2001). Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge: Cambridge University Press.
Horn, L. (2011). Infographic: What Happens Online in 60 Seconds? PC Magazine. Accessed January 3, 2014 from http://www.pcmag.com/article2/0,2817,2398097,00.asp.
Internet Crime Complaint Center. (2013). 2012 Internet Crime Report. Fairmont WV: Internet Crime Complaint Center.
ITU. (2013). The World in 2013: ICT Facts and Figures. Accessed December 4, 2013 from http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf.
Jewkes, Y. (2003). Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willian.
Jewkes, Y. and Yar, M. (2010). Handbook of Internet Crime. London: Willan.
Katyal, N.K. (2003). Digital Architecture as Crime Control.. Yale Law Journal, 112(8), 2261– 2289.
Lessig, L. (1999). Code and Other Laws of Cyberspace. New York: Basic Books.
Levy, S. (1984). Hackers: Heroes of the Computer Revolution. New York: Bantam Doubleday Dell.
Liau, Y.Q. (2012). Hong Kong Stock Exchange Hacker Sentenced to Jail. ZDNet. Accessed November 4, 2013, from http://www.zdnet.com/cn/hong-kong-stock-exchange-hacker-sentenced-to-jail-7000007246/.
Lynn, J. (2013). U.S. Charges Snowden with Espionage. Washington Post. Accessed January 3, 2014, from http://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html.
National Infrastructure Advisory Council. (2003). The National Strategy to Secure Cyberspace. Accessed September 15, 2013 from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf
OECD. (1986). Computer-Related Crime: Analysis of Legal Policy. Paris: OECD.
Perlroth, N. and Sanger, D. (2013). Nations Buying as Hackers Sell Flaws in Computer Code. New York Times. Accessed January 2, 2014 from http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html?pagewanted=all.
Poulsen, K. and Zetter, K. (2012). U.S. Intelligence Analyst Arrested in Wikileaks Video Probe. Wired. Accessed January 3, 2014, from http://www.wired.com/threatlevel/2010/06/leak/.
Smith, R., Grabosky, P. and Urbas, G. (2004). Cyber Criminals on Trial. Cambridge: Cambridge University Press.
Sterling, B. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. London: Penguin.
Symantec. (2006). Symantec Internet Security Threat Report X: Trend for January — June 06. Mountain View, CA: Symantec Corporation.
Symantec. (2013). 2012 Norton Study: Consumer Cybercrime Estimated at $110 Billion Annually. Accessed October 13, 2013, from http://www.symantec.com/about/news/release/article.jsp?prid=20120905_02
Taylor, P.A. (2005). From Hackers to Hacktivists: Speed Bumps on the Global Superhighway.. New Media Society, 7(5), 625–646.
United Nations. (2001). Resolution Adopted by the General Assembly on Combating the Criminal Misuse of Information Technologies (A/RES/55/63). Accessed September 23, 2007 from http://www.unodc.org/pdf/crime/a_res_56/121e.pdf.
Walkley, S. (2005). Regulating Cyberspace: An Approach to Studying Criminal Behaviour on the Internet. Unpublished PhD Thesis, The Australian National University, Canberra.
Wall, D.S. (2005). The Internet as a Conduit for Criminal Activity, in Pattavian, A. (ed.),. Information Technology and the Criminal Justice System, Thousand Oaks, CA: Sage, pp. 77–98.
Wall, D.S. (2007). Cybercrime. Cambridge: Polity Press.
Wall, D.S. (2013). Enemies within: Redefining the Insider Threat in Organizational Security Policy.. Security Journal, 26, 107–124.
Williams, M. (2006). Virtually Criminal — Crime, Deviance and Regulation Online. New York: Routledge.
Wilson, J.Q. and Kelling, G.L. (1982). Broken Windows.. The Atlantic Monthly, 249, 29–38.
Wolfgang, M.E. (1975). Patterns in Criminal Homicide. Montclair, NJ: Patterson Smith.
Editor information
Editors and Affiliations
Copyright information
© 2014 Lennon Y.C. Chang and Peter Grabosky
About this chapter
Cite this chapter
Chang, L.Y.C., Grabosky, P. (2014). Cybercrime and Establishing a Secure Cyberworld. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_15
Download citation
DOI: https://doi.org/10.1007/978-1-349-67284-4_15
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-67286-8
Online ISBN: 978-1-349-67284-4
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)