Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Understanding how cyber breeds novel crime and new criminals is a contribution to criminological models

with significant applied value. It is highly important for law enforcement and particularly pivotal for
preventive intervention. In this paper we propose a human rights-based crime definition, present
explanatory models for cybercrime, and outline future arenas and drivers to suggest to the stakeholder
community prevention focuses and priorities. The presented work ultimately aims towards supporting two
crime preventive design initiatives, one targeted at accounting for and narrowing the cybercriminal space of
means, opportunities, and motives; the other aiming at augmenting early and proactive adaptation of crime
legislation. Finally, life-based and agile design paradigms are briefly introduced as suitable methods to be
pursued in future research and developmental projects.

https://www.academia.edu/8248840/How_Cyber_Breeds_Crime_and_Criminals

The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs)
have become a major platform of communication with wide range of usage from message channeling to
propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks
people use OSNs for information exchange, mobilizing and uniting and raising money for the victims. This
paper critically analyses the specific usage of OSNs in the times of terrorisms attacks in developing
countries. We crawled and used Twitters data during Westgate shopping mall terrorist attack in Nairobi,
Kenya. We then analyzed the number of tweets, geo-location of tweets, demographics of the users and
whether users in developing countries tend to tweet, retweet or reply during the event of a terrorist attack.
We define new metrics (reach and impression of the tweet) and present the models for calculating them.
The study findings show that, users from developing countries tend to tweet more at the first and critical
times of the terrorist occurrence. Moreover, large number of tweets originated from the attacked country
(Kenya) with 73% from men and 23% from women where original posts had a most number of tweets
followed by replies and retweets.

https://www.academia.edu/8162297/Online_Social_Networks_and_Terrorism_2.0_in_Developing_Countries

This article examines the framing of U.S. debates around securitization of the Internet
and questions the need for a securitizing approach. Undoubtedly the Internet could be
more secure, but we stress the importance of cyberspace as an open, global commons
of information that has allowed innovation and rapid technological growth. We therefore
discuss how the cybersecurity issue can be reframed to take into account the importance
of this openness instead of viewing it as a vulnerability, and seek solutions that do not
unduly or disproportionately impact civil liberties.

An open
letter from US researchers in cryptography and information security. Retrieved from
http://masssurveillance.info4

In India, the Information Technology Act, received the Presidential Assent in June 2000. The Act is based on
the Model Law on E-Commerce adopted by the United Nations Commission on International Trade Law
(UNCITRAL). The essence of the Act is captured in the long title: An act to provide for the legal recognition
of transactions carried out by . . . alternatives to paper-based methods of communication and storage of
information . . .. In a previous article the authors reviewed the heavy handed approach taken by the Indian
government to the regulation of Certificating Authorities,1 this article continues this theme and evaluates
the provisions of the Act in and around a range of jurisdiction, crime and privacy issues.

http://www.informaworld.com/smpp/title~content=t713427052

With the advances in information technology (IT) criminals are using cyberspace to commit numerous
cyber crimes. Cyber infrastructures are highly vulnerable to intrusions and other threats. Physical devices
and human intervention are not sufficient for monitoring and protection of these infrastructures; hence,
there is a need for more sophisticated cyber defense systems that need to be flexible, adaptable and robust,
and able to detect a wide variety of threats and make intelligent real-time decisions. Numerous bio-inspired
computing methods of Artificial Intelligence have been increasingly playing an important role in cyber
crime detection and prevention. The purpose of this study is to present advances made so far in the field of
applying AI techniques for combating cyber crimes, to demonstrate how these techniques can be an
effective tool for detection and prevention of cyber attacks, as well as to give the scope for future work.

H. Chen, F. Y. Wang, (2005) Guest Editors' Introduction: Artificial Intelligence for Homeland
Security, IEEE intelligent systems, Vol. 20, No. 5, pp. 1216.

Cyberstalking is an important issue which causes significant distress but which has been difficult to find a
means of regulating, particularly through formal criminal systems. Yet proper regulation of cyberstalking
behaviour could have substantial impact upon the wellbeing of many victims from child to adult. In this
article, I suggest that a different from of regulation is required: one based upon a virtual, community-based
concept of regulation. Such a concept offers a novel approach based on three elements fundamental to the
discussion of regulation of cyberstalking: (1) the differences between physical stalking and cyberstalking; (2)
the character of a virtual community and the effects of social interactions; and (3) the scope of
experienceand reality.

https://www.academia.edu/8893704/Stalking_the_Stranger_in_Web_2.0_A_Contemporary_Regulatory_Analys
is

The purpose of this study is to better understand the online black market economy, speciically
relating to stolen data, using crime script analysis. Content analysis of 13 English- and Russianspeaking
stolen data forums found that the different products and services offered enabled the commodiication
of stolen data. The marketplace offers a range of complementary products, from the
supply of hardware and software to steal data, the sale of the stolen data itself, to the provision of
services to turn data into money, such as drops, cashiers and money laundering. The crime script
analysis provides some insight into how the actors in these forums interact, and the actions they
perform, from setting up software to inalizing transactions and exiting the marketplace.

https://www.academia.edu/10109964/A_crime_script_analysis_of_the_online_stolen_data_market

Perhaps one of the most motivated manipulators of the 21st century, John Robinson convinced several women to
move their flirtations and exchanges offline and into the real world, manipulating women to move long distances to
become his mistresses through underground BDSM chatrooms. The women were kept in various dens he provided
at times, with money defrauded from the collected social security of previous victims until her grew tired of them,
bludgeoned them, and disposed of them. His vicious crimes were made infamous by being the first internet serial
killer.

https://www.academia.edu/9510080/John_Robinson_-_First_Internet_Serial_Killer

In the night of November 6, 2014, Pakistani hackers defaced websites of 22 Government


departments and organisations in India. On the defaced websites, the hackers identified
themselves as 1337 & r00x!. On November 1, 2014, Pakistan-based hackers, calling themselves 'Pakistan
Cyber Mafia
Hackers', hacked two websites of Gujarat Government the official website of the
Commissionerate of Higher Education (www.egyan.org.in) and the official website of the
Agricultural Produce Market Committee of Ahmedabad (www.apmcahmedabad.com). The
hackers put their logo and some text on the homepages of these websites, which read:
'Hacked by Pakistan Cyber Mafia Hackers', 'Feel the power of Pakistan', 'Pk_Robot was here'
and 'Pakistan Zindabad'.

https://www.academia.edu/9437257/Cyber_Wars

We hear it all too often in the media: an organization is attacked, its data, often containing personally
identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we
discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the
wider context of how they occurred. We feel that understanding how such groups have operated in the
past will give organizations ideas of how to defend against them in the future.

https://www.academia.edu/10305485/Cyber_Attacks_and_Public_Embarrassment_A_Survey_of_Some_Notabl
e_Hacks

Crime is a common word that we always heard in this globalization era. Crimes refer
to any violation of law or the commission of an act forbidden by law. Crime and criminality
have been associated with man since long time ago. There are different strategies practices by
different countries to contend with crime. It is depending on their extent and nature. It can be
concluded that a nation with high index of crime cases cannot grow or develop well. This is
because crime is the direct opposite of development. It can contribute to negative impact in term
of social and economic development.
http://www.crime-research.org/articles/joseph06/

Cyber widely considered as the ifth domain of warfareis a conlict ridden domain where actual war is a
rare case scenario but other forms of conlicts are an everyday affair between the challenging players. now,
the question that arises is: what are the other forms of conlict in the cyber domain? The answer to this
question in simple words is: since the cyber domain involves players ranging from individuals to nation
states, the various forms of conlict in it range from cyber theft, hacking, cyber espionage, data collection
through exiltration, to cyber sabotage, cyber terrorism, cyber propaganda, cyber warfare, etc.

https://www.academia.edu/9622330/MAPPING_THE_CYBER_DRAGON_CHINAS_CONDUCT_OF_TERROR_IN_
THE_CYBER_WORLD

The purpose of this research was to identify existing and estimate upcoming cyber operations
capabilities of Unmanned Aerial Vehicles (UAV) and evaluate them from risk management perspective
against current security, policy and legal frameworks. Anticipated results of the research
were that UAV bring new challenges as well as increase the risks associated with existing
cyber operations techniques and attacks. This researched aimed at recognizing the threat of UAV
delivering cyber-attacks and the resulting need for incorporation this fact in risk management
strategies.

https://www.academia.edu/9301041/APPLICATION_OF_UNMANNED_AERIAL_VEHICLES_IN_CYBER_OPERATI
ONS

his article reports on indings from a survey on the concept of cyberterrorism from researchers working in
twenty-four countries across six continents. Our aim is to contribute to the deinitional debate in this area by
exploring the boundaries between cyberterrorism and potentially related terms. Focusing on two questions
fromour survey in particular, we ask: First, how does cyberterrorism relate to adjacent concepts such as
hacktivism, cybercrime and cyberwar? And, second, how familiar, frequently used, and useful are these
concepts amongst the global research community? Our indings include: First, high levels of familiarity with
the terms cyberwarfare, information warfare and cybercrime. And, second, concerns over, and widespread
avoidance of, other terms including cyber jihad and pure cyberterrorism. he article concludes by exploring
the importance of these indings for deinitional debates around cyberterrorism and terrorism more broadly,
before outlining a number of suggestions for future research.

https://www.academia.edu/8500183/Locating_Cyberterrorism_How_Terrorism_Researchers_Use_and_View_t
he_Cyber_Lexicon

The rising of the modern Internet brought with it heap opportunities for attackers to gain illegal benefit
from spreading spam mail. Spam is irrelevant or inappropriate messages sent on the Internet to a large
number of recipients. Many researchers use a large number of classification method in machine learning to
filter spam messages. But, there is still limited research which evaluate the use of clustering task in data
mining to perform spam email segmentation. In this paper we endorse for fighting cyber crime by
evaluating the fuzzy clustering approach in classifying spam emails using one of the most popular and
efficient method in this field, Fuzzy C-Means. The experimental studies on public spam data set using
various different parameter give promising result in this process.

https://www.academia.edu/9341065/Fighting_Cyber_Crime_in_Email_Spamming_An_Evaluation_of_Fuzzy_Cl
ustering_Approach_to_Classify_Spam_Messages

Over dependent of Governments and Businesses in technology give birth to the rising wave of
cybercrime. Cyber terrorism is also on the increase. In the near future, wars between nations will
be shifted from the physical combat to cyber space. Cyber wars will be valuable tools in the
hands of the enemies against world powers; cybercrime will also be a million dollar business. In
the light of this, we will need clear and concise techniques in fighting cybercrime thereby
reducing it to the barest minimum. This crime can be difficult to control or prevent as the
attackers are often times faceless, the attacker can be your next door neighbor or a person in a
different geographical location or continent. This type of crime can be targeted toward
Government, Agencies, Ministries, and Businesses irrespective of size and even individuals. The
skills required of an attacker is dropping by the day as there are freely available and
downloadable tools on the internet that even script kiddies can download and run against any
vulnerable target without understanding what the tools does. Attacks techniques are also getting
sophisticated as more and more tools are out there that try to make the attacked extremely
difficult if not impossible to detect.

https://www.academia.edu/8702857/Cyber_Law_-_Prevention_and_Regulation

Identity-related crimes pose a significant problem to both the UK economy and also its citizens because
they cause estimated annual losses of around 1.5billion. Not only do identity crimes cause considerable
public concern, but they also create challenges for policing them; not least, because policing responses, in
the broader regulatory sense, are often over-reactive or take the form of dramatic Public Relations gestures
rather than coherent policing policy. Yet, the realities of identity-related crimes are quite different from the
ways that they are perceived and even more important is that fact that this difference presents many
challenges for those whose job is to police them. This article will look at what identity crimes are and at the
very real problems they pose for policing them as non-routine policing activities. The article will, firstly, map
out identity crimes and outline the behaviors that we understand as identity crimes and their core
characteristics. It will then consider how the characteristics map onto traditional police practice and
consider some of the ways that the challenges have been addressed.

https://www.academia.edu/8367729/Policing_Identity_Crimes
Identity theft is one of the most intrusive crimes against an individual, one of the
fastest growing crimes around the world, and a crime that many will never
psychologically recover from. The victims of identity theft feel violated, they no longer
feel safe conducting everyday financial transactions, No matter how well they monitor
their financial records for the rest of their lives, they may still feel vulnerable (Monchuk,
2011). Unfortunately, the victims feelings are valid as the American public watches
helplessly while identity crime escalates without adequate recourse.

https://www.academia.edu/10271660/Cyber_Identity_Theft_A_Case_Comparison

This article highlights legal problems of cyber attacks from a jus ad bellum perspective (international
dispositions regarding the justification for entering a war). Since no international instrument whatsoever
cover the cyber attacks the analogies with current international solutions are largely employed. We illustrate
also the developments with relevant examples taken from main powers doctrine and practice (US,
Russia and China). The starting points are the provisions regarding the use of (armed)"force" under Article
2(4) and armed attack under Article 51 of United Nations Charter. The qualification of a cyber attack as
use of armed force or armed attack is based a multi criteria threshold developed by Schmitt. Other
developments focus the capacity of present International law concepts (direct and indirect armed attack,
identification of the aggressor state, pertinence of pre-emptive or interceptive self defense vis--vis cyber
armed attack, etc.) to answer cyber warfares structures and challenges.

Remus. Titiriga. Cyber-attacks and International law of armed conflicts; a jus ad bellum
perspective.Journal of International Commercial Law and Technology, Vol.8 No.3 (July, 2013)

The global use of internet for electronic communication and e-commerce over the past few years
has become a common phenomenon of modern life. No doubt it facilitated our life a lot, but on
other hand it has created a grave concern for governments in India and other countries as it is
posing a threat to personal privacy in an online environment. These concerns have created an
alarming situation to Indian government, media, private entities and policy- makers, waking up
to this challenge now we can see that some efforts are being made by our government to develop
some policies and strategies to protect the privacy of electronic transactions and personal
information in cyberspace.

https://www.academia.edu/9275187/CYBER_PRIVACY_ISSUES_IN_INDIA
Reference:

Driven by constant and remarkable technological innovation, the Internet has increasingly changed the
routine activities of Americans. Connecting with friends and family, shopping, banking, media consumption,
and other daily activities of individuals have migrated to the web, leaving ample opportunities for
victimization online. Routine activities theory (RAT), as initially proposed by Cohen and Felson (1979) holds
that crime occurs at the intersection of a motivated offender, a suitable target, and the lack of a capable
guardian. This theory has been demonstrated to adequately explain variation across several categories of
crime, and continues to serve as the philosophical base to a multitude of practical applications by law
enforcement initiatives. Due to the novel nature of cybercrime and the lack of spatio-temporal clarity online,
the applicability of RAT to the study of cybercrime has been questioned by scholars (Yar 2005). The current
study provides an extensive and critical examination of the current literature order to test the applicability
of RAT to the study of cybercrime and to identify any theoretical concerns in this application.

https://www.academia.edu/8897451/Theorizing_Cybercrime_Applying_Routine_Activities_Theory

The article discusses the concept of cyberbullying and its most common symptoms. The article also presents the
possibilities of legal prosecution of such behavior. Polish police statistics will be used to show the level of risk of
cyberbullying among adolescents. The paper will evaluate the awareness of secondary school students on behaviors
associated with cyberbullying.

https://www.academia.edu/8490457/THE_VIOLENCE_IN_THE_INTERNET

The first documented use of the word "phishing" took place in 1996. Most people believe it originated as an
alternative spelling of "fishing," as in "to fish for information".Phishing is the attempt to acquire sensitive
information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by
masquerading as a trustworthy entity in an electronic communication. Communications purporting to be
from popular social web sites, auction sites, banks, online payment processors or IT administrators are
commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected
with malware.1 Phishing is typically carried out by email spoofing2 or instant messaging,3 and it often directs
users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

https://www.academia.edu/8702857/Cyber_Law_-_Prevention_and_Regulation_of_Phishing_in_Cyber-
Space_National_and_International_Framework

Cybersecurity, also referred to as information technology security, focuses on protecting computers,


networks, programs and data from unintended or unauthorized access, change or destruction (University of
Maryland University College, 2014). Because many aspects of our lives revolve around the use of computers
and the Internet, the protection of the data transmitted is vital to the security and privacy of its users.
Cybersecurity, as it relates to the smart grid, represents a critical component to its infrastructure due to its
connectivity to other networking grid devices. Additionally, its ability to distribute resources to the masses
requires that it is functioning efficiently at all times
https://www.academia.edu/10244078/CyberSecurity_An_Excerpt_From_The_Manual_An_Intelligent_Next_Ste
p_Understanding_Smart_Grid_Structure_Security_and_Technology_

In the era of post-globalization development and dissemination of information and communication


technologies and the assertion of the right to freedom of information with positive implications connected
with it has, however, also produced disastrous results in terms of the proliferation of new forms of digital
crime and in terms of network usage for the realization of illicit purposes. Under this specific profile,
therefore, it is clear the urgent need for the establishment of appropriate discipline of the phenomenon
through legislation which, without affecting the rights and freedoms related to access to the internet, can
prevent or suppress any activity distorted use of network and/or the sabotage of computer systems.

https://www.academia.edu/10052213/CONTEMPORARY_FORMS_OF_CRIME_COMPUTER_CRIMES_A
ND_INTERNATIONAL_INSECURITY_

You might also like