Skip to main content

Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism

  • Chapter
  • First Online:

Abstract

In this concluding chapter, we consolidate the broad spectrum of challenges discussed throughout this book towards the formulation of a number key priority topics to be addressed by future research related to cybercrime and cyberterrorism. During this process many of the specific areas that need to be addressed are defined across four interlinked dimensions; technological, regulatory, organisational and human. In the process of identifying the nature of the challenges posed, the scope of the research and initiatives needed in order to progress measures targeting them, as well as the required impacts needed in order to ensure the significance of those initiatives. Initial sections of the chapter recapture, from a definitional perspective, the definitions of cybercrime and its constituent elements towards establishing a harmonised taxonomy of terms that we can use to inform the future work being proposed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf.

  2. 2.

    http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pdf.

  3. 3.

    N. ELIS (2014), Can Big Data prevent the next Cyber Attack?

  4. 4.

    B.-J. KOOPS (2010), The Internet and its Opportunities for CC, p. 737.

  5. 5.

    Commonwealth of Independent States Agreement (2001), article 1(a).

  6. 6.

    Shanghai Cooperation Organization Agreement (2010), articles 1, 2 and Annex 1.

  7. 7.

    Draft African Union Convention (2012), Part III, Chapter V, Sections II, Chapters 1 and 2.

  8. 8.

    UNODC (2013), Comprehensive study on CC.

  9. 9.

    Ibid, p. xvii.

  10. 10.

    Ibid, p. 41.

  11. 11.

    European Convention on CC (2001). Available at: http://conventions.coe.int/Treaty/en/Treaties/html/185.htm.

  12. 12.

    Council of Europe (2016), 2001 Budapest Convention on CC - Chart of Signatures and Ratifications of Treaty 185. Available at: http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=CHRqyFpJ.

  13. 13.

    S. BRENNER (2007), “At Light Speed”. Attribution and Response to CC/Terrorism/Warfare.

  14. 14.

    US DEPARTMENT OF JUSTICE, FBI Law Enforcement Bulletin: Cyber Terror.

  15. 15.

    N. VEERASAMY (2010). Motivation for CT.

  16. 16.

    S.A. JALIL (2003), Countering Cyber Terrorism Effectively: Are We Ready To Rumble?, GIAC Security Essentials Certification (GSEC) Practical Assignment, Version 1.4b, Option 1.

  17. 17.

    https://www.giac.org/paper/gsec/3108/countering-cyber-terrorism-effectively-ready-rumble/105154.

  18. 18.

    https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf.

  19. 19.

    https://ec.europa.eu/research/participants/portal/desktop/en/opportunities/h2020/calls/h2020-sec-2016-2017.html#c,topics=callIdentifier/t/H2020-SEC-2016-2017/1/1/1/default-group&callStatus/t/Forthcoming/1/1/0/default-group&callStatus/t/Open/1/1/0/default-group&callStatus/t/Closed/1/1/0/default-group&+identifier/desc

  20. 20.

    http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-aug-2015.pdf.

  21. 21.

    https://cybersecuritymonth.eu/about-ecsm.

  22. 22.

    https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/317480/Cyber_Essentials_Summary.pdf.

  23. 23.

    http://www.unicri.it/special_topics/securing_cyberspace/current_activities/hackers_profiling/.

References

  1. Aiken, M., et al.: A consideration of the social impact of CC: examples from hacking, piracy, and child abuse material online. Contemporary Social Science, pp. 1–19. http://www.tandfonline.com/doi/full/10.1080/21582041.2015.1117648. Accessed 21 Apr 2016

  2. Boyatzis, R.E.: Transforming qualitative information: thematic analysis and code development, Sage (1998)

    Google Scholar 

  3. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)

    Article  Google Scholar 

  4. Chawki, M.: A critical look at the regulation of cybercrime. ICFAI J. Cyberlaw. IV (4) (2005)

    Google Scholar 

  5. Conway, M.: What is Cyberterrorism? The story so far. J. Inf. Warfare 2(2), 33–42 (2003)

    Google Scholar 

  6. Choras, M., Kozik, R., Torres Bruna, M.P., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resilience. In: ARES 2015, pp. 686–692 (2015)

    Google Scholar 

  7. Choraś, M., Kozik, R., Renk, R., Holubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds.) International Joint Conference CISIS 2015 and ICEUTE 2015. AISC, pp. 485–495. Springer, Switzerland (2015). ISBN: 978-3-319-19712-8

    Google Scholar 

  8. Denning, D.: Testimony before the Special Oversight Panel on Terrorism. US House of Representatives, Committee on Armed Services (2000)

    Google Scholar 

  9. Europol, The Internet Organised Crime Threat Assessment (2015). https://www.europol.europa.eu/iocta/2015/. Accessed 21 Apr 2016

  10. Koops, B.J., Brenner, S.W.: Approaches to cybercrime jurisdiction. J. High Technol. Law 4(1), 189–202 (2004)

    Google Scholar 

  11. Koops, B.J.: The Internet and its opportunities for Cybercrime. In: Herzog-Evans, M. (ed.) Transnational Criminology Manual, vol. 1, pp. 735–754. WLP, Nijmegen (2010)

    Google Scholar 

  12. Manky, D.: Cybercrime as a service: a very modern business. Computer Fraud & Security (2013). http://www.sciencedirect.com/science/article/pii/S1361372313700538. Accessed 21 Apr 2016

  13. Parker, D.B.: Threats to computer systems (No. UCRL-13574). California Univ Berkeley Lawrence Livermore Lab (1973)

    Google Scholar 

  14. Podgor, E.S.: International computer fraud: A paradigm for limiting national jurisdiction (2002)

    Google Scholar 

  15. Veerasamy, N., Grobler, M., Von Solsm, B.: Building an Ontology for CT (2012)

    Google Scholar 

  16. Wall, D.S.: The rise of the Internet as a crime problem. In: Handbook of Internet Crime, Vancouver, pp. 88–102 (2010)

    Google Scholar 

  17. Wall, D.S.: The Transformation of Crime in the Information Age. Polity, Cambridge (2007)

    Google Scholar 

Download references

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) under grant agreement numbers 607949 (COURAGE) and 607406 (CAMINO).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Babak Akhgar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Akhgar, B. et al. (2016). Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38930-1_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38929-5

  • Online ISBN: 978-3-319-38930-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics