Advertisement

Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism

  • Babak AkhgarEmail author
  • Michał Choraś
  • Ben Brewster
  • Francesca Bosco
  • Elise Vermeersch
  • Vittoria Luda
  • Damian Puchalski
  • Douglas Wells
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

In this concluding chapter, we consolidate the broad spectrum of challenges discussed throughout this book towards the formulation of a number key priority topics to be addressed by future research related to cybercrime and cyberterrorism. During this process many of the specific areas that need to be addressed are defined across four interlinked dimensions; technological, regulatory, organisational and human. In the process of identifying the nature of the challenges posed, the scope of the research and initiatives needed in order to progress measures targeting them, as well as the required impacts needed in order to ensure the significance of those initiatives. Initial sections of the chapter recapture, from a definitional perspective, the definitions of cybercrime and its constituent elements towards establishing a harmonised taxonomy of terms that we can use to inform the future work being proposed.

Keywords

Cybercrime Cyberterrorism Cybersecurity Roadmap Research Taxonomy Classification 

Notes

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) under grant agreement numbers 607949 (COURAGE) and 607406 (CAMINO).

References

  1. 1.
    Aiken, M., et al.: A consideration of the social impact of CC: examples from hacking, piracy, and child abuse material online. Contemporary Social Science, pp. 1–19. http://www.tandfonline.com/doi/full/10.1080/21582041.2015.1117648. Accessed 21 Apr 2016
  2. 2.
    Boyatzis, R.E.: Transforming qualitative information: thematic analysis and code development, Sage (1998)Google Scholar
  3. 3.
    Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)CrossRefGoogle Scholar
  4. 4.
    Chawki, M.: A critical look at the regulation of cybercrime. ICFAI J. Cyberlaw. IV (4) (2005)Google Scholar
  5. 5.
    Conway, M.: What is Cyberterrorism? The story so far. J. Inf. Warfare 2(2), 33–42 (2003)Google Scholar
  6. 6.
    Choras, M., Kozik, R., Torres Bruna, M.P., Yautsiukhin, A., Churchill, A., Maciejewska, I., Eguinoa, I., Jomni, A.: Comprehensive approach to increase cyber security and resilience. In: ARES 2015, pp. 686–692 (2015)Google Scholar
  7. 7.
    Choraś, M., Kozik, R., Renk, R., Holubowicz, W.: A practical framework and guidelines to enhance cyber security and privacy. In: Herrero, Á., Baruque, B., Sedano, J., Quintián, H., Corchado, E. (eds.) International Joint Conference CISIS 2015 and ICEUTE 2015. AISC, pp. 485–495. Springer, Switzerland (2015). ISBN: 978-3-319-19712-8Google Scholar
  8. 8.
    Denning, D.: Testimony before the Special Oversight Panel on Terrorism. US House of Representatives, Committee on Armed Services (2000)Google Scholar
  9. 9.
    Europol, The Internet Organised Crime Threat Assessment (2015). https://www.europol.europa.eu/iocta/2015/. Accessed 21 Apr 2016
  10. 10.
    Koops, B.J., Brenner, S.W.: Approaches to cybercrime jurisdiction. J. High Technol. Law 4(1), 189–202 (2004)Google Scholar
  11. 11.
    Koops, B.J.: The Internet and its opportunities for Cybercrime. In: Herzog-Evans, M. (ed.) Transnational Criminology Manual, vol. 1, pp. 735–754. WLP, Nijmegen (2010)Google Scholar
  12. 12.
    Manky, D.: Cybercrime as a service: a very modern business. Computer Fraud & Security (2013). http://www.sciencedirect.com/science/article/pii/S1361372313700538. Accessed 21 Apr 2016
  13. 13.
    Parker, D.B.: Threats to computer systems (No. UCRL-13574). California Univ Berkeley Lawrence Livermore Lab (1973)Google Scholar
  14. 14.
    Podgor, E.S.: International computer fraud: A paradigm for limiting national jurisdiction (2002)Google Scholar
  15. 15.
    Veerasamy, N., Grobler, M., Von Solsm, B.: Building an Ontology for CT (2012)Google Scholar
  16. 16.
    Wall, D.S.: The rise of the Internet as a crime problem. In: Handbook of Internet Crime, Vancouver, pp. 88–102 (2010)Google Scholar
  17. 17.
    Wall, D.S.: The Transformation of Crime in the Information Age. Polity, Cambridge (2007)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Babak Akhgar
    • 1
    Email author
  • Michał Choraś
    • 2
    • 3
  • Ben Brewster
    • 1
  • Francesca Bosco
    • 4
  • Elise Vermeersch
    • 4
  • Vittoria Luda
    • 4
  • Damian Puchalski
    • 3
  • Douglas Wells
    • 1
  1. 1.CENTRIC (Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research)Sheffield Hallam UniversitySheffieldUK
  2. 2.University of Science and Technology, UTP BydgoszczBydgoszczPoland
  3. 3.ITTI Sp. z o.o.PoznańPoland
  4. 4.UNICRI, United Nations Interregional Crime and Justice Research InstituteTurinItaly

Personalised recommendations