Abstract
This chapter describes the fight against cybercrime from a European perspective. Law enforcement agencies always have had an important role when it comes to fighting crime. However, in this digital era, several problems hamper the effectiveness of the police combating crime. Therefore, the first part of this chapter describes the difficulties the police have in fighting cybercrime. The second part of the chapter focuses on one of the strategies to overcome some of these difficulties, namely forming alliances with private institutes. This joint-up approach is mostly realized by public–private partnerships (PPPs), consisting of formalized cooperation between governmental authorities and important stakeholders. Cooperation between governmental and private actors is no sinecure, as will appear from a public administration perspective. Successful cooperation depends on several factors, which will be theoretically described and practically illustrated. Conclusively, the discussion paragraph handles the common dilemma of the extent to which the government should play a leading role in the fight against (cyber) crime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Nowadays, CPNI is part of the Dutch National Cyber Security Centre (NCSC).
- 3.
ENISA is an agency of the European Union, serving as expertise center for the European Union Member States and European institutions.
- 4.
ISACs are not typically Dutch, but an international phenomenon.
- 5.
This refers to a consensus model, which reflects the striving for consensus in Dutch politics and society.
Abbreviations
- CERT:
-
Computer and Emergency Response Team
- CPNI:
-
Centre for Protection of the National Infrastructure
- DDoS:
-
Distributed Denial of Service
- ECTF:
-
Electronic Crimes Task Force
- ENISA:
-
European Network and Information Security Agency
- GOVCERT:
-
Government Computer Emergency Response Teams
- IP:
-
Internet Protocol
- ISAC:
-
Information Sharing and Analysis Center
- ISP:
-
Internet Service Provider
- NCSC:
-
National Cyber Security Centre
- NPM:
-
New Public Management
- NSP:
-
National Skimming Point
- PPP:
-
Public–Private Partnership
- SME:
-
Small and Medium-sized Enterprise
References
Bekkers, V., van Sluis, A., & Siep, P. (2006). De nodale oriëntatie van de Nederlandse Politie: Over criminaliteitsbestrijding in de netwerksamenleving: Bouwstenen voor een beleidstheorie. [The nodal orientation of the Dutch police: About crime fighting in the network society]. Rotterdam: Erasmus Universiteit Rotterdam.
Boonstra, J. J. (2007). Ondernemen in allianties en netwerken: Een multidisciplinair perspectief. [Undertaking in alliances and networks. A multidisciplinary approach]. M&O, 3/4, 5–25.
Bossler, A. M., & Holt, T. J. (2012). Patrol officers’ perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management, 35(1), 165–181.
Boutellier, H. (2005). Meer dan veilig. Over bestuur, bescherming en burgerschap. [More than safe. About governance, protection and citizenship]. Den Haag: Boom Juridische Uitgevers.
Brinkerhoff, D. W., & Brinkerhoff, J. M. (2011). Public-private partnerships: Perspectives on purposes, publicness, and good governance. Public Administration and Development, 31, 2–14.
Capeller, W. (2001). Not such a neat net: Some comments on virtual criminality. Social and Legal Studies, 10, 229–242.
Clark, K., Stikvoort, D., Stofbergen, E., & van den Heuvel, E. (2014). A Dutch approach to cybersecurity through participation. IEEE Security and Privacy, 12, 27–34.
Décary-Hetú, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175.
Domenie, M. M. L., Leukfeldt, E. R., van Wilsem, J., Jansen, J., & Stol W. P. (2013). Slachtofferschap van delicten met een digitale component onder burgers. Hacken, malware, persoonlijke en financiële delicten in kaart gebracht. [Victimization of crimes with a digital component: a report on hacking, malware, personal and financial crimes]. De Bilt/Leeuwarden: PAC/NHL Hogeschool.
Dunn Cavelty, M., & Suter, M. (2009). Public-private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection,. doi:10.1016/j.ijcip.2009.08.006.
ENISA (2011). Cooperative models for effective public private partnerships. Good practice guide. Retrieved May 29, 2015 from https://www.enisa.europa.eu/activities/Resilience-and-CIIP/public-private-partnership/national-public-private-partnerships-ppps/good-practice-guide-on-cooperatve-models-for-effective-ppps.
Garland, D. (2001). The culture of control: Crime and social order in contemporary society. Chicago: The University Press of Chicago.
Gogolin, G., & Jones, J. (2010). Law enforcement’s ability to deal with digital crime and the implications for business. Information Security Journal: A Global Perspective, 19(3), 109–117.
Grabosky, P. N. (2000). Computer crime: A criminological overview. Prepared for presentation at the Workshop on Crimes Related to the Computer Network, Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, 15 April 2000. Retrieved August 7, 2012 from https://www.ncjrs.gov/App/publications/Abstract.aspx?id=209342.
Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social and Legal Studies, 10, 251–256.
Hagenaars, P. M. M., & Bonnes, J. M. (2014). De kracht van privaat-publieke samenwerking [The power of private-public cooperation]. Den Haag: Boom Juridische Uitgevers.
Heldeweg, M., & Sanders, M. (2011). Botsende waarden bij publiek-private samenwerking. Dimensies en dilemma’s van juridisch-bestuurskundige legitimiteit, in het bijzonder bij openbaar gezag [Clashing values in public-private partnerships. Dimensions and dilemmas of judical-governmental legitimacy, especially in public authority]. Bestuurskunde, 2, 33–43.
Hodge, G., & Greve, C. (2005). Introduction. In G. Hodge & C. Greve (Eds.). The challenge of public-private partnerships. Learning from international experience (pp. 1–21). Cheltenham: Edward Elgar Publishing Limited.
Holt, T. J., & Bossler, A. M. (2012). Police perceptions of computer crimes in two south-eastern cities: An examination from the viewpoint of patrol officers. American Journal of Criminal Justice, 37(3), 396–412.
Holt, J. T., & Lampke, E. (2009). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies, 23(1), 33–50.
Hoogenboom, A. B., & Muller, E. R. (2002). Voorbij de dogmatiek. Publiek-private samenwerking in de veiligheidszorg. [Past dogmatic. Public-private cooperation in safety assurance]. Apeldoorn: Politie & Wetenschap.
Hudson, B., Hardy, Henwood, M., & Wistow, G. (1999). In pursuit of inter-agency collaboration in the public sector. Public Management: An International Journal of Research and Theory, 1(2), 235–260.
Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Review, 27(1), 61–67.
Jewkes, Y., & Leukfeldt, E. R. (2012). Policing cybercrime. In E. R. Leukfeldt & W. P. Stol (Eds.), Cyber safety: An introduction (pp. 253–266). The Hague: Eleven International Publishers.
Jewkes, Y., & Yar, M. (2008). Policing cybercrime in the twenty-first century. In T. Newburn (Ed.), Handbook of policing (pp. 280–607). Cullompton, UK: William.
Klijn, E. H., Edelenbos, J., Kort, M., & van Twist, M. (2008). Facing management choices. An analysis of managerial choices in 18 complex environmental public private partnership projects. International Review of Administrative Science, 74(2), 251–278.
Klijn, E. H., & van Twist, M. (2007). Publiek-private samenwerking in Nederland. Overzicht van theorie en praktijk. [Public-private partnerships in the Netherlands. Overview of theory and practice]. In J. J. Boonstra, (Ed.). Ondernemen in allianties en netwerken. Een multidisciplinair perspectief (pp. 156–170). Deventer: Kluwer.
Koops, E. J. (2010). The internet and its opportunities for cybercrime. In M. Herzog-Evans (Ed.), Transnational criminology manual (pp. 735–754). Nijmegen: Wolf Legal Publishers.
Leukfeldt, E. R., Domenie, M., & Stol, W.P. (2010). Verkenning cybercrime in Nederland 2009. [Cybercrime in the Netherlands]. Den Haag: Boom Juridische Uitgevers.
Leukfeldt, E. R., Veenstra, S., Domenie, M., & Stol, W. P. (2013a). De strafrechtketen in een gedigitaliseerde samenleving. Een onderzoek naar de strafrechtelijke afhandeling van cybercrime. [Criminal justice in a digitized society. A study into the criminal prosecution of cybercrimes]. De Bilt/Leeuwarden: PAC/NHL.
Leukfeldt, E. R., Veenstra, S., & Stol, W. P. (2013b). High volume cyber crime and the organization of the police. The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.
Loader, I., & Walker, N. (2007). Civilizing security. Cambridge University Press.
Lodder, A. R., & Toet, J. (2013). Cybersecurity: Europese Unie initiatieven voor een intrinsiek grensoverschrijdend fenomeen. [Cybersecurity: European Union initiatives for an intrinsic boarder-crossing phenomenon]. Tijdschrift voor internetrecht, 5/6, 135–140.
Lu, Y., Luo, X., Polgar, M., & Cao, Y. (2010). Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2), 31–41.
NCSC (2014). Cybersecuritybeeld Nederland. CSBN-4. Den Haag: Ministerie van Veiligheid en Justitie.
NCSC (s.d.). ISACs. Retrieved April 23, 2015 from https://www.ncsc.nl/organisatie/publiek-private-samenwerking/isacs.html.
Onderzoeksraad voor Veiligheid (2012). Het Diginotarincident. Waarom digitale veiligheid de bestuurstafel te weinig bereikt [The Digitnotar incident. Why digital safety does reach the management table too little]. Retrieved April 23, 2015 from http://www.onderzoeksraad.nl/uploads/items-docs/1094/Rapport_Diginotar_NL_web_def_20062012.pdf.
Osborne, D., & Gaebler, T. (1992). Reinventing government. How the entrepreneurial spirit is transforming the public sector. Boston: Addison-Wesly.
Peretti, K. K. (2008). Data breaches: What the underground world of “carding” reveals. Santa Clara Computer and High Technology Law Journal, 25, 345–414.
Rittel, H. W. J., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4, 155–169.
Schuilenburg, M. (2012). Orde in veiligheid. Een dynamisch perspectief. [Orderliness in safety. A dynamic perspective]. Den Haag: Boom Lemma Uitgevers.
Shearing, C., & Wood, J. (2003). Nodal governance, democracy, and the new ‘denizens’. Journal of Law and Society, 30(3), 400–419.
Smit, M. (2010). Publiek belang: hoe houd je het op de rails. Een studie naar de effectiviteit van planvorming voor stationslocaties. [Public interest: how to keep it on track. A study into the effectiveness of planning of railway-station locations]. Enschedé: Gildeprint.
Soudijn, M. R. J., & Monsma, E. (2012). Virtuele ontmoetingsruimten voor cybercriminelen. [Virtual meeting places for cyber criminals]. Tijdschrift voor Criminologie, 54(4), 349–360.
Soudijn, M. R. J., & Zegers, B. C. H. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15, 111–129.
Stenning, P. (2009). Governance and accountability in a plural policing environment. The story so far. Policing, 3(1), 22–33.
Stol, W. P., Kaspersen, H. W. K., Kerstens, J., Leukfeldt, E. R., & Lodder, A. R. (2008). Filteren van kinderporno op internet. Een verkenning van technieken en reguleringen in binnen- en buitenland. [Filtering of child pornography on the internet. Technologies and laws in the Netherlands and abroad]. Den Haag: Boom Juridische Uitgevers.
Stol, W. P., Kaspersen, H. W. K., Kerstens, J., Leukfeldt, E. R., & Lodder, A. R. (2009). Governmental filtering of websites: the Dutch case. Computer Law & Security Review, 25(3), 251–262.
Stol, W. P., Leukfeldt, E. R., & Klap, H. (2013). Policing a digitized society. The state of affairs in the Netherlands in 2013. In W.P. Stol & J. Jansen (Eds.), Cybercrime and the Police (pp. 61–74). Eleven International Publishing: The Hague.
Struiksma, N., de Vey Mestdagh, C. N. J., & Winter, H. B. (2012). De organisatie van de opsporing van cybercrime door de Nederlandse politie. [The organization of policing cybercrime in the Netherlands] Apeldoorn: Politie & Wetenschap.
Terpstra, J. (2011). Regulering in een hybride veiligheidszorg. Over de bewaking van een publiek goed in een deels geprivatiseerd bestel [Regulation in hybrid safety assurance]. Tijdschrift voor Veiligheid, 10(4), 41–58.
Terpstra, J., & Kouwenhoven, R. (2004). Samenwerking en netwerken in de lokale veiligheidszorg. [Cooperation and networks in local safety assurance]. Kerckebosch: Zeist.
Toutenhoofd-Visser, M. H., Veenstra, S. Domenie, M. M. L., Leukfeldt, E. R., & Stol, W.P. (2009). Politie en cybercrime. Intake en eerste opvolging. Een onderzoek naar de intake van het werkaanbod cybercrime door de politie. [Police and cybercrime. A study on the registration process with regard to cybercrime reports within the Dutch police]. Leeuwarden: NHL Hogeschool.
Van Delden, P. (2009). Samenwerking in de publieke dienstverlening. Ontwikkelingsverloop en resultaten. [Cooperation in public services. Development and outcomes]. Delft: Eburon.
Van den Heuvel, E., & Baltink, G. K. (2014). Coordination and cooperation in cyber network defense: the Dutch efforts to prevent and respond. In M. Hathaway (Ed.) Computer Network Defense: Incident Detection and Response (pp. 118–129). NATO Science for Peace and Security Series.
Van der Hulst, R. C. & Neve, R. J. M. (2008). High-tech crime: Inventarisatie van literatuur over soorten criminaliteit en hun daders. [High tech crime. Literature review of cybercrimes and their offenders]. Den Haag: WODC.
Van Montfort, C. J. (2008). Besturen van het onbekende. Goed bestuur bij publiek-private arrangementen. [Governing the unknown. Good governance in public-private arrangements]. Den Haag: Boom Lemma Uitgevers.
Van Montfort, C., van den Brink, G., Schulz, M., & Maalsté, N. (2012). Publiek-private samenwerking in maatschappelijke veiligheid. [Public-private partnerships in social safety]. Den Haag: WODC.
Van Steden, R. (2011). Sturing van lokale veiligheid: een achtergrondstudie. [Governance of local safety: a background study]. In R. van Steden (Ed.). Strategieën van lokale veiligheid. Een achtergrondstudie en drie reflecties [Strategies of local safety. A background study and three reflections] (pp. 9–51). Amsterdam: Amsterdam University Press.
Veenstra, S., Zuurveen, R., Jansen, J., Kloppenburg, S., & Stol, W. P. (2014). MKB en cybercrime. Slachtofferschap onder het Nederlandse Midden- en Kleinbedrijf in een gedigitaliseerde samenleving. [SMEs and cybercrime. Victimization of the Dutch Small and Medium-sized Enterprises in a digitized society]. Leeuwarden/Apeldoorn/Heerlen: NHL Hogeschool/Politieacademie/Open Universiteit.
Visser, R. A., van Gemerden, E., More, P. A., & de Roon, R. J. C. (2008). Sturing en samenwerking in handhavingsprojecten. [Governance and cooperation in enforcement projects]. Leiden: Leiden University Press.
Wall, D. S. (1997). Policing the virtual community: The internet, cyber crimes and the policing of cyberspace. In P. Francis, P. Davies & V. Jupp (Eds.) Policing futures, the police, law enforcement and the twenty-first century (pp. 208–236). London: Macmillan.
Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (Revised May 2010). Police Practice & Research: An International Journal, 8(2), 183–205.
Yar, M. (2011). From the ‘governance of security’ to ‘governance failure’: refining the criminological agenda. Internet Journal of Criminology. Retrieved April 23, 2015 from http://www.academia.edu/2803630/from_the_governance_of_security_to_governance_failure_refining_the_criminological_agenda.
Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. ISI 2012. June 11–14, 2012, Washington.
Zhang, L., Young, R., & Prybutok, V. (2007). Inhibitors of two illegal behaviors: Hacking and shoplifting. Journal of Organizational and End User Computing, 19(3), 24–42.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Boes, S., Leukfeldt, E.R. (2017). Fighting Cybercrime: A Joint Effort. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-32824-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32822-5
Online ISBN: 978-3-319-32824-9
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)