Skip to main content

Cybercrime and Establishing a Secure Cyberworld

  • Chapter
The Handbook of Security

Abstract

The Internet ranks as one of the great inventions. With increasing access to the Internet and the low cost of computers, the Internet has become an integral part of our daily lives. According to the International Telecommunication Union (ITU), over 2.7 billion people were using the Internet in 2013. This is equivalent to about 40% of the world’s population. In the developed world the penetration rate is over 70%, while in the developing world it is estimated to be 30% or even less (ITU, 2013).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Archick, K. (2006). Cybercrime: The Council of Europe Convention. Washington, DC: The Library of Congress.

    Google Scholar 

  • ASRS. (2008). ASRS Program Briefing. Accessed December 9, 2013, from http://asrs.arc.nasa.gov/overview/summary.html

    Google Scholar 

  • Barlow, J.P. (1996). A Declaration of Independence for Cyberspace. Accessed September 28, 2013, from http://homes.eff.org/~barlow/Declaration-Final.html

    Google Scholar 

  • Brenner, S. (2004). Distributed Security: A New Model of Law Enforcement.. Journal of International Law, 8(5), 7–25.

    Google Scholar 

  • Brenner, S. (2010). Cybercrime: Criminal Threats from Cyberspace. Santa Barbara, CA: Praeger.

    Google Scholar 

  • Broadhurst, R. and Chang, L.Y.C. (2013). Cybercrime in Asia: Trends and Challenges, in Hebenton, B., Jou, S. and Liu, J. (eds.) Asian Handbook of Criminology. New York: Springer. pp. 49–64.

    Chapter  Google Scholar 

  • Broadhurst, R. and Grabosky, P. (2005). Cyber-Crime: The Challenge in Asia. Hong Kong: Hong Kong University Press.

    Google Scholar 

  • Capeller, W. (2001). Not Such Neat Net: Some Comments on Virtual Criminality.. Social and Legal Studies, 10, 229–242.

    Google Scholar 

  • CERT (2011). 2011 CyberSecurity Watch Survey: How Bad Is the Insider Threat? Accessed January 3, from http://www.cert.org/archive/pdf/CyberSecuritySurvey2011Data.pdf

    Google Scholar 

  • Chandler, A. (1996). The Changing Definition and Image of Hacker in Popular Disclosure.. International Journal of the Sociology of Law, 24, 229–251.

    Article  Google Scholar 

  • Chang, L.Y.C. (2012a). Responsive Regulation and the Reporting of Information Security Incidents,. Issues and Studies, 48(1), 85–119.

    Google Scholar 

  • Chang, L.Y.C. (2012b). Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait. Cheltenham: Edward Elgar.

    Book  Google Scholar 

  • Chang, L.Y.C. (2013). Formal and informal modalities for policing cybercrime across the Taiwan Strait,. Policing and Society, 23(4), 540–555.

    Article  Google Scholar 

  • Chinatimes. (2013). Taiwan and Philippines in Cyber War Over Fatal Shooting. Chinatimes. Accessed October 4, 2013, from http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130512000105&cid=1101

    Google Scholar 

  • Choo, K.-K.R., Smith, R.G. and McCusker, R. (2007). Future Directions in Technology-Enabled Crime: 2007–2009. Accessed November 1, 2013, from http://www.aic.gov.au.

    Google Scholar 

  • Cohen, L. and Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach.. American Sociological Review, 44, 588–607.

    Article  Google Scholar 

  • Cornish, D. and Clarke, R.V. (1986). Introduction, in Cornish and Clarke (eds.) The Reasoning Criminal. New York: Springer-Verlag. pp 1–16.

    Chapter  Google Scholar 

  • Dacey, R.F. (2004). Critical Infrastructure Protection — Establishing Effective Information Sharing with Infrastructure Sectors. Washington, DC: General Accounting Office.

    Google Scholar 

  • Davidow, B. (2013). Productivity Tools For Cybercrime. The Atlantic. August 23. Accessed January 7, 2014 from http://www.theatlantic.com/technology/archive/2013/08/productivity-tools-for-cybercrime/278974/.

    Google Scholar 

  • Ericson, R.V. (2007). Crime in an Insecure World. Cambridge: Polity Press.

    Google Scholar 

  • F-secure. (2013). Rent-A-Hacker. Accessed November 3, 2013, from http://www.f-secure.com/weblog/archives/00002629.html.

    Google Scholar 

  • Gibson, W. (1982). Burning Chrome. London: Harper Collins.

    Google Scholar 

  • Gibson, W. (1984). Neuromancer. London: Harper Collins.

    Google Scholar 

  • Gill, M. (2011). Learning From Offenders’ Accounts of Their Offending.. Prison Service Journal, 194, 27–32.

    Google Scholar 

  • Goldsmith, J.T. and Wu, T. (2006). Who Controls the Internet?: Illusion of a Borderless World. New York: Oxford University Press.

    Google Scholar 

  • Gordon, S. and Ford, R. (2006). On the Definition and Classification of Cybercrime.. Journal in Computer Virology, 2(1), 13–20.

    Article  Google Scholar 

  • Grabosky, P. (2007). Electronic Crime. New Jersey: Pearson.

    Google Scholar 

  • Grabosky, P. (2013). Organised Crime and the Internet: Implications for National Security.. RUSI Journal, 158(5), 18–25.

    Article  Google Scholar 

  • Grabosky, P., Smith, R. and Dempsey, G. (2001). Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge: Cambridge University Press.

    Google Scholar 

  • Horn, L. (2011). Infographic: What Happens Online in 60 Seconds? PC Magazine. Accessed January 3, 2014 from http://www.pcmag.com/article2/0,2817,2398097,00.asp.

    Google Scholar 

  • Internet Crime Complaint Center. (2013). 2012 Internet Crime Report. Fairmont WV: Internet Crime Complaint Center.

    Google Scholar 

  • ITU. (2013). The World in 2013: ICT Facts and Figures. Accessed December 4, 2013 from http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf.

    Google Scholar 

  • Jewkes, Y. (2003). Dot.cons: Crime, Deviance and Identity on the Internet. Cullompton: Willian.

    Google Scholar 

  • Jewkes, Y. and Yar, M. (2010). Handbook of Internet Crime. London: Willan.

    Google Scholar 

  • Katyal, N.K. (2003). Digital Architecture as Crime Control.. Yale Law Journal, 112(8), 2261– 2289.

    Article  Google Scholar 

  • Lessig, L. (1999). Code and Other Laws of Cyberspace. New York: Basic Books.

    Google Scholar 

  • Levy, S. (1984). Hackers: Heroes of the Computer Revolution. New York: Bantam Doubleday Dell.

    Google Scholar 

  • Liau, Y.Q. (2012). Hong Kong Stock Exchange Hacker Sentenced to Jail. ZDNet. Accessed November 4, 2013, from http://www.zdnet.com/cn/hong-kong-stock-exchange-hacker-sentenced-to-jail-7000007246/.

    Google Scholar 

  • Lynn, J. (2013). U.S. Charges Snowden with Espionage. Washington Post. Accessed January 3, 2014, from http://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html.

    Google Scholar 

  • National Infrastructure Advisory Council. (2003). The National Strategy to Secure Cyberspace. Accessed September 15, 2013 from https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf

    Google Scholar 

  • OECD. (1986). Computer-Related Crime: Analysis of Legal Policy. Paris: OECD.

    Google Scholar 

  • Perlroth, N. and Sanger, D. (2013). Nations Buying as Hackers Sell Flaws in Computer Code. New York Times. Accessed January 2, 2014 from http://www.nytimes.com/2013/07/14/world/europe/nations-buying-as-hackers-sell-computer-flaws.html?pagewanted=all.

    Google Scholar 

  • Poulsen, K. and Zetter, K. (2012). U.S. Intelligence Analyst Arrested in Wikileaks Video Probe. Wired. Accessed January 3, 2014, from http://www.wired.com/threatlevel/2010/06/leak/.

    Google Scholar 

  • Smith, R., Grabosky, P. and Urbas, G. (2004). Cyber Criminals on Trial. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Sterling, B. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. London: Penguin.

    Google Scholar 

  • Symantec. (2006). Symantec Internet Security Threat Report X: Trend for January — June 06. Mountain View, CA: Symantec Corporation.

    Google Scholar 

  • Symantec. (2013). 2012 Norton Study: Consumer Cybercrime Estimated at $110 Billion Annually. Accessed October 13, 2013, from http://www.symantec.com/about/news/release/article.jsp?prid=20120905_02

    Google Scholar 

  • Taylor, P.A. (2005). From Hackers to Hacktivists: Speed Bumps on the Global Superhighway.. New Media Society, 7(5), 625–646.

    Article  Google Scholar 

  • United Nations. (2001). Resolution Adopted by the General Assembly on Combating the Criminal Misuse of Information Technologies (A/RES/55/63). Accessed September 23, 2007 from http://www.unodc.org/pdf/crime/a_res_56/121e.pdf.

    Google Scholar 

  • Walkley, S. (2005). Regulating Cyberspace: An Approach to Studying Criminal Behaviour on the Internet. Unpublished PhD Thesis, The Australian National University, Canberra.

    Google Scholar 

  • Wall, D.S. (2005). The Internet as a Conduit for Criminal Activity, in Pattavian, A. (ed.),. Information Technology and the Criminal Justice System, Thousand Oaks, CA: Sage, pp. 77–98.

    Chapter  Google Scholar 

  • Wall, D.S. (2007). Cybercrime. Cambridge: Polity Press.

    Google Scholar 

  • Wall, D.S. (2013). Enemies within: Redefining the Insider Threat in Organizational Security Policy.. Security Journal, 26, 107–124.

    Article  Google Scholar 

  • Williams, M. (2006). Virtually Criminal — Crime, Deviance and Regulation Online. New York: Routledge.

    Google Scholar 

  • Wilson, J.Q. and Kelling, G.L. (1982). Broken Windows.. The Atlantic Monthly, 249, 29–38.

    Google Scholar 

  • Wolfgang, M.E. (1975). Patterns in Criminal Homicide. Montclair, NJ: Patterson Smith.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Lennon Y.C. Chang and Peter Grabosky

About this chapter

Cite this chapter

Chang, L.Y.C., Grabosky, P. (2014). Cybercrime and Establishing a Secure Cyberworld. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_15

Download citation

Publish with us

Policies and ethics