Skip to main content

Towards the Development of a Research Agenda for Cybercrime and Cyberterrorism – Identifying the Technical Challenges and Missing Solutions

  • Chapter
  • First Online:
Combatting Cybercrime and Cyberterrorism

Abstract

Cybercrime and cyberterrorism research faces a number of challenges, such as the rate of change in technology, field complexity and interdisciplinarity. This chapter aims at identifying the major technical challenges that require solutions to be developed for the successful prevention and fight against such contemporary problems. The following solutions have been elicited as a leading contribution towards the design of a cybersecurity research agenda. The identified and selected solutions include technologies and techniques for computer fraud prevention, investigation and detection methods and tools, and crime prevention methods that address human elements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. International Telecommunication Union (ITU): Understanding Cybercrime: Phenomena, Challenges and Legal Response (2012). http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime20legislation20EV6.pdf

  2. International Telecommunication Union (ITU): Understanding Cybercrime: Guide for developing countries (2011). http://www.itu.int/ITU-D/cyb/cybersecurity/projects/crimeguide.html

  3. United Nations Office on Drugs and Crime (UNODC): Comprehensive Study on Cybercrime (2013). http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

  4. Bisson, P., Martinelli, F., Granadino, R.R. (eds.): Cybersecurity Strategic Research Agenda (2015). https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/

  5. Hui, S., Jiafu, W., Caifeng, Z., Jianqi, L.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, Proceedings, pp. 648–651 (2012)

    Google Scholar 

  6. Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, Chap. 12, pp. 265–675. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  7. Sims, D., Ghernaouti, S.: A report on taxonomy and evaluation of existing inventories. D2.1, E-CRIME deliverable (2014). http://ecrime-project.eu/

  8. Koops, B.J.: The internet and its opportunities for cybercrime. In: Manual, T.C., Herzog-Evans, M. (eds.) vol. 1, pp. 735–754. WLP, Nijmegen (2010)

    Google Scholar 

  9. Hartel, P., Junger, M., Wieringa, R.: Cyber-crime Science = Crime Science + Information Security, University of Twente, Version 0.15 (2010)

    Google Scholar 

  10. Newman, G.R.: Cybercrime. In: Krohn, M.D., Lizotte, A.J., Penly Hall, G. (eds.) Handbook on Crime and Deviance, pp. 551–584. Springer, New York (2009)

    Chapter  Google Scholar 

  11. Newman, G.R., Clarke, R.V.: Superhighway Robbery: Preventing E-Commerce Crime, pp. 8–9. Willan Publishing, Uffculme (2003)

    Google Scholar 

  12. Brenner, S.W., Clarke, L.L.: Distributed security: preventing cybercrime. John Marshall J. Comput. Inf. Law XXIII(4), 659–667 (2005)

    Google Scholar 

  13. Helfgott, J.B.: Criminal Behaviour Theories, Typologies and Criminal Justice, pp. 4–18. SAGE Publications, Thousand Oaks (2008)

    Google Scholar 

  14. Lipson, H.P.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Requirements for Next-Generation Internet (2002). http://www.sei.cmu.edu/reports/02sr009.pdf

  15. Oehemen, C., Peterson, E., Dowson, S.: An organic model for detecting cyber-events. In: CSIIRW 2010 Proceedings of the Sixth Annual Workshop on Cybersecurity and Information Intelligence Research, Article No. 66. ACM, New York (2010)

    Google Scholar 

  16. Moore, D., Rid, T.: Cryptopolitik and the Darknet. Survival 58(1), 7–38 (2016). doi:10.1080/00396338.2016

    Article  Google Scholar 

  17. Hilbert, M., López, P.: The world’s technological capacity to store, communicate, and compute information. Science 332(6025), 60–65 (2011). doi:10.1126/science.1200970

    Article  Google Scholar 

  18. Boyd., D., Crawford, K.: Six Provocations for Big Data, A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society (2011). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1926431

  19. Victim support. https://www.victimsupport.org.uk/more-us/policy-and-research/

  20. Horizon 2020, Secure Societies Advisory Group, Strategic Input for 2016-2017 Workprogram, April 2015, Private communication (2015)

    Google Scholar 

  21. Kunz, M., Wilson, P.: Computer Crime and Computer Fraud. University of Maryland, College Park (2004)

    Google Scholar 

  22. European Cybercrime Centre (EC3), Europol - The Internet Organised Crime Threat Assessment 2014 (iOCTA) (2014)

    Google Scholar 

  23. Marinos, L.: ENISA Threat Landscape 2014: overview of current and emerging cyber-threats. ENISA (2014)

    Google Scholar 

  24. Choo, K.-K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30, 719–731 (2011)

    Article  Google Scholar 

  25. Marpaung, J.A.P., Sain, M., Lee, H.-J.: Survey on malware evasion techniques: state of the art and challenges. In: 14th International Conference on Advanced Communication Technology (ICACT) (2012)

    Google Scholar 

  26. Ortega, A.: Your malware shall not fool us with those anti analysis tricks. AlienVault Labs (2012)

    Google Scholar 

  27. Arntz, P.: Sandbox sensitivity. Malwarebytes unpacked (2013). https://blog.malwarebytes.org/intelligence/2013/02/sandbox-sensitivity/

  28. Singh, A.: Don’t Click the Left Mouse Button: Introducing Trojan UpClicker. FireEye Blog (2012)

    Google Scholar 

  29. European Cybercrime Centre (EC3), Europol - The Internet Organised Crime Threat Assessment 2015 (iOCTA) (2015)

    Google Scholar 

  30. Suarez-Tangil, G., Tapiador, E.J., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 16(2), 961–987 (2014)

    Article  Google Scholar 

  31. Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. In: De Decker, B., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63–72. Springer, Heidelberg (2014)

    Google Scholar 

  32. Agency, E.U., for Network, Information Security (ENISA): Algorithms, key size and parameters report - 2014 (2014)

    Google Scholar 

  33. Kert, M., Lopez, J., Markatos, E., Preneel, P.: State-of-the-art of Secure ICT Landscape (Final, Version 1), NIS Platform, Working group 3 (WG3) (2014)

    Google Scholar 

  34. Granjal, J., Monteiro, E., Sá Silva, J.: Security in the integration of low-power wireless sensor networks with the internet: a survey. Ad Hoc Netw. 24, 264–287 (2015)

    Article  Google Scholar 

  35. Sasse, M.A.: “Technology should be smarter than this!”: A vision for overcoming the great authentication Fatigue. In: Jonker, W., Petković, M. (eds.) SDM 2013. LNCS, vol. 8425, pp. 33–36. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  36. Mirante, D., Cappos, J.: Understanding password database compromises. Polytechnic Institute of NYU, Technical report TR-CSE-2013-02 (2013)

    Google Scholar 

  37. Bhagavatula, C., Ur, B., Iacovino, K., Kywey, S.M., Cranor, L.F., Savvides, M.: Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption. USEC 2015 (2015)

    Google Scholar 

  38. European Union Agency for Network, Information Security (ENISA): ENISA Report on Strategic Research Agenda, draft v02.63 (2014). https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents

  39. European Union Agency for Network and Information Security (ENISA): ENISA cybersecurity Information Sharing: An Overview of Regulatory and Non-regulatory Approaches (2015). https://www.enisa.europa.eu/activities/cert/support/information-sharing/cybersecurity-information-sharing/at_download/fullReport

  40. MITRE: Structured Threat Information eXpression (STIX) specification (2014). http://stix.mitre.org

  41. Advanced Cyber Defence centre (ACDC) (2016). https://www.acdc-project.eu/

  42. MITRE: Trusted Automated eXchange of Indicator Information (TAXII) specifications (2014). https://taxiiproject.github.io/

  43. Torres, R., Gallego-Nicasio, B., Zanetti, R.: Initial set of research activities listed to meet gaps. CAPITAL (cybersecurity research agenda for privacy and technology challenges) D3.1 deliverable (2014)

    Google Scholar 

  44. Adrian, A.: Beyond griefing: virtual crime. Comput. Law Secur. Rev. 26(6), 640–648 (2010)

    Article  Google Scholar 

  45. Hibshi, H., Vidas, T., Cranor, L. Usability of forensics tools: a user study. In: Sixth International Conference on IT Security Incident Management and IT Forensics, pp. 81–91. IEEE (2011)

    Google Scholar 

  46. Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob. Comput. 17, 159–174 (2015)

    Article  Google Scholar 

  47. Christin, D.: Privacy in mobile participatory sensing: current trends and future challenges. J. Syst. Softw. (2015). doi:10.1016/j.jss.2015.03.067

    Google Scholar 

  48. Klobučar, T., Gabrijelčič, D., Pagon, V.: Cross-border e-learning and academic services based on eIDs: case of Slovenia. In: eChallenges 2014: 29–30 October, 2014 Belfast, Ireland. Dublin: IIMC: = International Information Management Corporation, 9pp (2014)

    Google Scholar 

  49. Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. J. Inf. Sec. Appl. 19(1), 25–44 (2014)

    Google Scholar 

  50. Record, J.: Bounding the Global War on Terrorism. Strategic Studies Institute (2003). http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA419754

  51. Jarvis, L., Nouri, L., Whiting, A.: Understanding, locating and constructing cyberterrorism. In: Chen, T.N., Jarvis, L., Macdonald, S. (eds.) Cyberterrorism: Understanding, Assessment and Purpose, pp. 25–41 (2014) doi:10.1007/978-1-4939-0962-9

    Google Scholar 

Download references

Acknowledgement

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the COURAGE project under grant agreement no 607949.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomaž Klobučar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Jerman-Blažič, B., Klobučar, T. (2016). Towards the Development of a Research Agenda for Cybercrime and Cyberterrorism – Identifying the Technical Challenges and Missing Solutions. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38930-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38929-5

  • Online ISBN: 978-3-319-38930-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics