Cybercrime: The Transformation of Crime in the Information Age, 2nd edition, Cambridge: Polity (Outline of update) (original) (raw)

Cyber Crime and Security, a Global Vulnerable Coercion: Obstacles and Remedies

International Journal of Information and Electronics Engineering, 2017

Cyber Crime is a deliberate batter of fraudulent technological practice or psychological assault to divulge the sensible information knowingly or unknowingly, with or without authorization. At present, cyber attackers have adopted those criminal fraudulent techniques with most up-to-date technology on the internet and committing crimes. Approximately, one billion people have experienced the cyber crime in the last calendar year which costs approximately $445 billion. A concerted effort by all governments of the nations should frame policies that can protect citizens from financial and other frauds. This will result in eradicating poverty and other benefits from utilizing the recovered fraud money. Proposed blueprint would suggest amicable solutions to eliminate the cyber crime.

Cyber-Crimes: Challenges of the Millennium Age

Abstract: The connecting gains arising between organized crimes and the Internet has increased the lapses of the digital world. How do hackers frame their attitudes? What factors encourage and improvise their actions? These are very vital but highly under studied questions. Drawing upon psychology, economics and international relation to propose a framework that elaborates these questions, we found that countries across the globe differ in terms of regulations, normative and cognitive legitimacy to different types of web problems. Cyber wars and crimes are also functions of the stocks of hacking skills relative to the availability of economic availabilities. An attacking unit’s selection criteria for the target network include reasonable significance and criticalness, level of digitization of values and weakness in defense systems. Managerial and policy implications are elaborated and directions for future research are suggested. Keywords: Information and communications technologies; Cyber war; Hacking; Mafia; Nationalism

CONTEMPORARY FORMS OF CRIME: COMPUTER CRIMES AND “INTERNATIONAL INSECURITY”

RESEARCHING SECURITY - APPROACHES, CONCEPTS AND POLICIES

In the era of post-globalization development and dissemination of information and communication technologies and the assertion of the right to freedom of information with positive implications connected with it has, however, also produced disastrous results in terms of the proliferation of new forms of digital crime and in terms of network usage for the realization of illicit purposes. Under this specific profile, therefore, it is clear the urgent need for the establishment of appropriate discipline of the phenomenon through legislation which, without affecting the rights and freedoms related to access to the internet, can prevent or suppress any activity distorted use of network and/or the sabotage of computer systems. The diffusion of technologies and tools, therefore, can identify different and contemporary forms of crime due to the fact that the world of crime immediately sensed the many possibilities offered by the network for illegal purposes, and to make use of IT tools in order to take actions against criminal. As for the European union, since the ‘90 EU institutions have begun to address the problem of cyber terrorism in key integrationist believing, rightly, that the Internet and its applications would affect more and more evidence on relations socio-economic and financial framework of the international community. The spread of cyber terrorism and the delineation of a new concept of digital war, within the EU, has led to the establishment of the famous ENFOPOL organization responsible to implement a system of control of the means of communication, drawn up at the European Council in Madrid 15 and 16 December 1995, and considered by many, rightly or wrongly, a sort of European Echelon, the global interception network created by the "007" of the USA, Britain, Canada, Australia and New Zealand. In 2004, confirming the fact that the rampant spread of the attacks of so-called cyber crime has made no longer put greater cooperation between Member States in order to protect the significant interests of the States for increasing use of information technology and safe, the European Union has established the ENISA, the Centre of Excellence Strategic and Operation of the European Union in the field of computer security. With this work, the Author analyzes the European legislation for new, contemporary forms of crime and “international insecurity” related to the use of the Internet. Nell’epoca della post-globalizzazione lo sviluppo e la diffusione delle tecnologie informatiche e telematiche e l’affermazione del diritto alla libertà informatica con le implicazioni positive ad esso connesse ha, tuttavia, prodotto anche risultati nefasti sotto il profilo della proliferazione di nuove forme di criminalità digitale e sotto il profilo dell’utilizzo della rete anche per la realizzazione di illecite finalità. Sotto tale specifico profilo, dunque, appare evidente l’urgente necessità di predisporre un’adeguata disciplina del fenomeno attraverso una legislazione che, senza incidere sui diritti e le libertà collegate all’accesso ad internet, possa prevenire o reprimere ogni attività di utilizzo distorto della rete e/o il sabotaggio dei sistemi informatici. La diffusione delle tecnologie e degli strumenti informatici, dunque, consente di individuare differenti e contemporary forms of crime in ragione del fatto che il mondo della criminalità ha intuito immediatamente le ampie possibilità offerte dalla rete per fini illeciti e per avvalersi degli strumenti informatici allo scopo di compiere azioni penalmente rilevanti. Per quanto riguarda l’Unione europea, fin dagli anni ‘90 le Istituzioni comunitarie hanno cominciato ad affrontare il problema del cyber terrorismo in chiave integrazionista ritenendo, a giusto titolo, che la rete internet e le sue applicazioni avrebbero inciso con sempre maggior evidenza sulle relazioni socio-economiche e finanziarie nell’ambito della Comunità internazionale. La diffusione del cyber terrorismo e il delineamento di un nuovo concetto di guerra digitale, in ambito UE, ha condotto alla istituzione di ENFOPOL la famosa organizzazione preposta ad attuare un sistema di controllo dei mezzi di comunicazione, elaborata in occasione del Consiglio europeo di Madrid del 15 e 16 dicembre 1995 e da molti ritenuta, a torto o a ragione, una sorta di Echelon europeo, la rete di intercettazione globale creata dagli “007” di USA, Gran Bretagna, Canada, Australia e Nuova Zelanda. Nel 2004, a conferma del fatto che la dilagante diffusione degli attacchi di cosiddetta cyber criminalità ha reso non più rinviabile una maggior cooperazione fra gli Stati membri ai fini della tutela dei rilevanti interessi degli Stati per un utilizzo sempre più diffuso e sicuro delle tecnologie informatiche, l’Unione europea ha istituito la ENISA, il Centro di Eccellenza Strategico ed Operativo dell’Unione europea nell’ambito della sicurezza informatica.

The Role of Governments in Ensuring Global Security in the Cyber Age: Cyber-crimes, Cyberterrorism and Cryptocurrencies

Contemporary challenges and new developments , 2019

The Cyber Age has brought the world incommensurable advantages: freedom of expression, access to information and instant communication, rendering distance and borders as irrelevant. However, these benefits are heavily debated, as the civil society and national governments stand on very different standpoints. The effects of the Cyber Revolution were clearly seen in the mutations of both the criminal organizations and those of the terrorist organizations which took full advantage of it. Our paper will contend the following: (1) the Cyber Revolution took the world by surprise, very few actors were truly prepared to deal with the fallout; (2) there can be no successful unilateral actions to combat the misuse and exploitation of new technologies; (3) the role of NATO can be revamped to include an integrated approach on combatting state-sponsored hybrid warfare, propaganda and fake news as well as combating criminal and terrorist organisations which make use of such technologies.

CYBERSECURITY

CYBERSECURITY, 2023

It is undoubtedly commonplace to assert that information and communication technologies (ICTs) are having a fundamental impact on our society. In this sense, the success of the ‘information society’ has been considered essential for Europe’s growth, competitiveness and employment opportunities. New trends in cybercrime are emerging all the time, with estimated costs to the global economy running to billions of dollars. In the past, cybercrime was committed mainly by individuals or small groups. Today, we are seeing highly complex cybercriminal networks bring together individuals from across the globe in real time to commit crimes on an unprecedented scale. Criminal organizations turning increasingly to the Internet to facilitate their activities and maximize their profit in the shortest time. The crimes themselves are not necessarily new – such as theft, fraud, illegal gambling, sale of fake medicines – but they are evolving in line with the opportunities presented online and therefore becoming more widespread and damaging.

UNDERSTANDING CYBERCRIME: CURRENT THREATS AND RESPONSES

2020

Technology is embedded within almost every aspect of our daily lives, from the smartphones in our pockets to our computers, fridges, and door locks. Technology’s exponential growth and its increasing effect upon daily lives shape how we live within a global society and, as expected, this process shows no sign of decreasing. In fact, we now rely on computer systems more than ever, as the Covid-19 outbreak has deeply affected the way people conduct their lives. For instance, digital technologies have been exponentially employed by governments, institutions, and businesses in order to mitigate the impact of social distancing. Notably, however, this technology is a double-edged sword. It makes our lives easier and more connected whilst enabling individuals and organisations to commit crimes remotely, creating new challenges for security professionals to overcome.

Overview of Cyber Security: Endangerment of Cybercrime on Vulnerable Innocent Global Citizens

The global community is filled with uncertainties and constant threats of cybercrime, global economic collapse, social and economic insecurity. The evolving issue of cybersecurity will soon have far reaching economic consequences on our connected global society. Leaders of developed and developing nations must be prepared to launch protective plan of action against perpetrators of cybersecurity attacks. In the past, regular mail systems and fax machines were used for data and documents transmission and Radio network was used for local, national and international communications. Today, the culture of high definition television, broadbanddirect connection, electronic mails, Internet access, and cyber technology has taken over the global transmission and communication operations. Cyber-technology is progressing at an overwhelming pace, posing an ever-present danger to all segments of innocent global populaces. Current researchers, such as Rejesh, ), Shinder (2008 recommends the creation of global collaborative partnership (GCP) to provide strategies and commanding directives to provide stable security for vulnerable global residents. The Paris and San Bernardino attacks on innocent citizens are a forewarning to leaders of developed and developing nations to create cyber security-savvy workforces to prevent future tragedies. As a part of GCP ground strategy, software developers must develop preemptive built-in capabilities to deter cybercriminals.Cyber-crime is affecting the physical existence of innocent citizens of the global society and it is a devastating threat. In isolation, individuals, government agencies, corporate organizations, financial institutions and higher education systems are vulnerable to cybercriminals. The most credible and reliable techniques to defeat perpetrators of cybercrime today and tomorrow, must include the implementation of a united front to work together through trust, dedication and commitment. The threats of cybersecurity are penetrating all segments of world organizations and educational settings. The culture of the education enterprise is the exchange of ideas, values, beliefs, cultural backgrounds, instruction and learning process. Presidents, vice-chancellors, professors, instructors, allied educators are strongly encouraged to create plan of action to protect vital data, information and infrastructure of the entire educational facilities from cyber-attacks. The unforeseen incidences in Paris, France and San Bernardino, in California, United States is an enduring development and a commanding steps empowering national and higher education leaders, professors, instructors and allied educators to implement a well-structured plan of action, effective security measures and workforces to dismantle perpetrators' malicious intent to destroy the entire institutions of human civilization.

Cybercrime: A Challenge to Law Enforcement

SEEU Review, 2020

When comparing 100 years ago and today, we always mention the social, economic and political changes that have influenced the emergence and development of the opportunities that we have today, with special emphasis on technological changes. Technology has evolved so fast that it seems that in the blink of an eye something new has just hit the market. Whether we like it or not, technology has become part of us, part of our lives, where we upon spend a great deal of the day with at least one of our technological devices with which we perform many tasks. Nowadays there are limitless possibilities of gathering information, business, shop, and almost anything through the internet. Although it is a very easy to make payments online, it can be quite risky, because not every website offers the security and convenience for purchasing the product we want and we may have doubts whether the money we have paid has gone to the right place and for the specific service, which we have paid for. The ...