Skip to main content

Risks Related to Illegal Content in Cybercrime and Cyberterrorism Research

  • Chapter
  • First Online:
Combatting Cybercrime and Cyberterrorism
  • 2059 Accesses

Abstract

What follows here is an examination of the risks and issues related to illegal content within, and related to, the context of cybercrime and cyberterrorism research. Before any useful analysis can take place, it is necessary to create an understanding of the subject matter; therein lies the first challenge. The problem of establishing what the term ‘illegal content’ encompasses is addressed throughout. By outlining the particular relevance of illegal content with regard to research, we set out the key considerations which will assist in understanding what is required to successfully carry out valuable research and to understand the possible limitations. Some of these are related to the fact that the nature of much illegal content means that victim considerations are of utmost importance. Just as there is no specific definition of illegal content, there is no specific legislation addressing this type of criminal activity, therefore a wide range is presented and considered, which further assists in illustrating different perspectives. Countries too, have different perspectives and an in-depth examination of two of them reveal both similarities and differences. The general conclusion draws together the findings and the issues that have been addressed and provides a holistic view of the main points before key recommendations are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    European Data Protection Supervisor, “EDPS formal comments on DG MARKT’s public consultation on procedures for notifying and acting on illegal content hosted by online MARKT’s public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries”, European Union Data Protection Supervisor, Brussels 2012. Available at: https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Comments/2012/12-09-13_Comments_DG_MARKT_EN.pdf.

  2. 2.

    Ibid.

  3. 3.

    Stern, S.R. ‘Encountering Distressing Information in Online Research: A Consideration of Legal and Ethical Responsibilities’ Chap. 11 in: Hughes, J (ed.) SAGE Internet Research Methods (SAGE 2012) Google eBook http:// books.google.co.uk/books?id=A6mHAwAAQBAJ&dq=illegal+content+internet+ research+methods&source=gbs_navlinks_s.

  4. 4.

    Established in 1996 by the internet industry to provide a reporting point for illegal content online http://wwww.iwf.org.uk accessed 7 September 2014.

  5. 5.

    Lobe, B; Livingstone, S; Olafsson, K and Simoes, J.A. (2008) Best Practice Research Guide: How to research children and online technologies in comparative perspective. London, EU Kids Online (Deliverable D4.2).

  6. 6.

    Lobe, B; Livingstone, S and Haddon, L (eds.) (2007) Researching Children’s Experiences Online across Countries: Issues and Problems in Methodology. London, UK Kids Online (Deliverable D4.1) http://www.lse.ac.uk/media@lse/research/EUKidsonline/EU%20Kids%20I%20(2006-9)EU%20Kids%20Online%20I%20Reports/D41_ISBN.pdf accessed 11 September 2014.

  7. 7.

    ‘The Security Directive’ aims to implement cybersecurity strategy across EU. At June 2015 the main principles have been agreed in a fourth trilogue meeting.

  8. 8.

    CM/Rec(2014)6 on a Guide to human rights for Internet users. Available at: https://rm.coe.int/CoERMPublicCommonSearchServices/DisplayDCTMContent?documentId=09000016804d5b31.

  9. 9.

    Education Act 2011 (c21).

  10. 10.

    The Tiger Leap programme was introduced in 1996, establishing ICT in all schools by 2000 and promoting ICT education. Still active today.

  11. 11.

    Conducted by TNS Opinion and Social at the request of the European Commission ‘Special Eurobarometer 423 on Cybersecurity’ Published February 2015. Available from: http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf.

  12. 12.

    www.riso.ee/et/oigusaktid accessed 9 September 2014.

  13. 13.

    To be amended on 1.1.2016.

  14. 14.

    Amended on 1.1.2015.

  15. 15.

    Council Framework Decision of 28 November 2008 on combating certain forms and expressions of racism and xenophobia by means of criminal law. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:328:0055:0058:EN:PDF accessed 30 August 2014.

  16. 16.

    Factsheet on Hate Speech and Hate Crimes against LGBT Persons, FRA (European Union Agency for Fundamental Rights) http://fra.europa.eu/sites/default/files/fra_uploads/1226-Factsheet-homophobia-hate-speech-crime_EN.pdf accessed 10 September 2014.

  17. 17.

    Freedom on the Net 2013, Estonia. http://www.freedomhouse.org/sites/default/files/resources/FOTN%202013_Estonia.pdf accessed 10 September 2014.

  18. 18.

    Delfi AS v. Estonia (App no 64569/09) [2014].

  19. 19.

    Parliament UK (2014) ‘Social Media and Criminal Offences’ Communications Committee, First Report. Available at: http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm.

  20. 20.

    Ibid Section 2, para. 13.

  21. 21.

    Ibid Section 2, para. 12.

  22. 22.

    https://www.esrc.ac.uk/about-esrc/what-we-do/ accessed 8 September 2014 ‘... the UK’s largest organisation for funding research on economic and social issues.’

  23. 23.

    ESRC Framework for Research Ethics (FRE) 2010. Updated September 2012.

  24. 24.

    Jan Coles, Jill Astbury, Elizabeth Dartnall, and Shazneen Limjerwala, ‘A qualitative exploration of researcher trauma and researchers’ responses to investigating sexual violence.’ (2014) 20 Violence against women 95–117.

  25. 25.

    RCUK (2013) ‘Policy and Guidelines on Governance of Good Research Conduct’. Available at: http://www.rcuk.ac.uk/RCUK-prod/assets/documents/reviews/grc/RCUKPolicyandGuidelinesonGovernanceofGoodResearchPracticeFebruary2013.pdf.

  26. 26.

    As amended by the Serious Crime Act 2015.

  27. 27.

    https://www.cps.gov.uk/legal/a_to_c/computer_misuse_act_1990 accessed 11 September 2014.

  28. 28.

    JISC legal information 1 February 2007 ‘Cybercrime Essentials’ http://www.jisclegal.ac.uk/Portals/12/Documents/PDFs/crimeEssentials.pdf accessed 11 September 2014.

  29. 29.

    http://www.cps.gov.uk/publications/docs/mousexoffences.pdf accessed 11 September 2014.

  30. 30.

    Ibid page 3.

  31. 31.

    Set up as a result of the Bichard Inquiry which led to the Safeguarding Vulnerable Groups Act 2006. http://www.criminalrecordchecks.co.uk/crb/isa-independent-safeguarding-authority.

  32. 32.

    ESRC Framework for Research Ethics (FRE) 2010, updated September 2012 http://www.esrc.ac.uk/_images/framework-for-research-ethics-09-12_tcm8-4586.pdf accessed 7 September 2014.

  33. 33.

    Established in 1996 by the internet industry to provide a reporting point for illegal content online http://wwww.iwf.org.uk accessed 7 September 2014.

  34. 34.

    Parliament UK (2014) ‘Social Media and Criminal Offences’ Communications Committee, First Report. Available at: http://www.publications.parliament.uk/pa/ld201415/ldselect/ldcomuni/37/3702.htm.

  35. 35.

    Freilich, J.D.; Chermak, S.M. and Gruenewald, J (2014) The Future of Terrorism Research: a review essay International Journal of Comparative and Applied Criminal Justice.

  36. 36.

    ‘Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience’ COM (2009) 149 final. Brussels 30.3.2009. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri+com:2009:0149:FIN:EN:PDF accessed 5 September 2014.

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the COURAGE project under grant agreement no 607949.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alison Lyle .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lyle, A., Kemp, B., Spasova, A., Gasper, U. (2016). Risks Related to Illegal Content in Cybercrime and Cyberterrorism Research. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38930-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38929-5

  • Online ISBN: 978-3-319-38930-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics