Abstract
Cybercrime and cyberterrorism research faces a number of challenges, such as the rate of change in technology, field complexity and interdisciplinarity. This chapter aims at identifying the major technical challenges that require solutions to be developed for the successful prevention and fight against such contemporary problems. The following solutions have been elicited as a leading contribution towards the design of a cybersecurity research agenda. The identified and selected solutions include technologies and techniques for computer fraud prevention, investigation and detection methods and tools, and crime prevention methods that address human elements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
International Telecommunication Union (ITU): Understanding Cybercrime: Phenomena, Challenges and Legal Response (2012). http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime20legislation20EV6.pdf
International Telecommunication Union (ITU): Understanding Cybercrime: Guide for developing countries (2011). http://www.itu.int/ITU-D/cyb/cybersecurity/projects/crimeguide.html
United Nations Office on Drugs and Crime (UNODC): Comprehensive Study on Cybercrime (2013). http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
Bisson, P., Martinelli, F., Granadino, R.R. (eds.): Cybersecurity Strategic Research Agenda (2015). https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents/
Hui, S., Jiafu, W., Caifeng, Z., Jianqi, L.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, Proceedings, pp. 648–651 (2012)
Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M.J.G., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, Chap. 12, pp. 265–675. Springer, Heidelberg (2013)
Sims, D., Ghernaouti, S.: A report on taxonomy and evaluation of existing inventories. D2.1, E-CRIME deliverable (2014). http://ecrime-project.eu/
Koops, B.J.: The internet and its opportunities for cybercrime. In: Manual, T.C., Herzog-Evans, M. (eds.) vol. 1, pp. 735–754. WLP, Nijmegen (2010)
Hartel, P., Junger, M., Wieringa, R.: Cyber-crime Science = Crime Science + Information Security, University of Twente, Version 0.15 (2010)
Newman, G.R.: Cybercrime. In: Krohn, M.D., Lizotte, A.J., Penly Hall, G. (eds.) Handbook on Crime and Deviance, pp. 551–584. Springer, New York (2009)
Newman, G.R., Clarke, R.V.: Superhighway Robbery: Preventing E-Commerce Crime, pp. 8–9. Willan Publishing, Uffculme (2003)
Brenner, S.W., Clarke, L.L.: Distributed security: preventing cybercrime. John Marshall J. Comput. Inf. Law XXIII(4), 659–667 (2005)
Helfgott, J.B.: Criminal Behaviour Theories, Typologies and Criminal Justice, pp. 4–18. SAGE Publications, Thousand Oaks (2008)
Lipson, H.P.: Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Requirements for Next-Generation Internet (2002). http://www.sei.cmu.edu/reports/02sr009.pdf
Oehemen, C., Peterson, E., Dowson, S.: An organic model for detecting cyber-events. In: CSIIRW 2010 Proceedings of the Sixth Annual Workshop on Cybersecurity and Information Intelligence Research, Article No. 66. ACM, New York (2010)
Moore, D., Rid, T.: Cryptopolitik and the Darknet. Survival 58(1), 7–38 (2016). doi:10.1080/00396338.2016
Hilbert, M., López, P.: The world’s technological capacity to store, communicate, and compute information. Science 332(6025), 60–65 (2011). doi:10.1126/science.1200970
Boyd., D., Crawford, K.: Six Provocations for Big Data, A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society (2011). http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1926431
Victim support. https://www.victimsupport.org.uk/more-us/policy-and-research/
Horizon 2020, Secure Societies Advisory Group, Strategic Input for 2016-2017 Workprogram, April 2015, Private communication (2015)
Kunz, M., Wilson, P.: Computer Crime and Computer Fraud. University of Maryland, College Park (2004)
European Cybercrime Centre (EC3), Europol - The Internet Organised Crime Threat Assessment 2014 (iOCTA) (2014)
Marinos, L.: ENISA Threat Landscape 2014: overview of current and emerging cyber-threats. ENISA (2014)
Choo, K.-K.R.: The cyber threat landscape: challenges and future research directions. Comput. Secur. 30, 719–731 (2011)
Marpaung, J.A.P., Sain, M., Lee, H.-J.: Survey on malware evasion techniques: state of the art and challenges. In: 14th International Conference on Advanced Communication Technology (ICACT) (2012)
Ortega, A.: Your malware shall not fool us with those anti analysis tricks. AlienVault Labs (2012)
Arntz, P.: Sandbox sensitivity. Malwarebytes unpacked (2013). https://blog.malwarebytes.org/intelligence/2013/02/sandbox-sensitivity/
Singh, A.: Don’t Click the Left Mouse Button: Introducing Trojan UpClicker. FireEye Blog (2012)
European Cybercrime Centre (EC3), Europol - The Internet Organised Crime Threat Assessment 2015 (iOCTA) (2015)
Suarez-Tangil, G., Tapiador, E.J., Peris-Lopez, P., Ribagorda, A.: Evolution, detection and analysis of malware for smart devices. IEEE Commun. Surv. Tutorials 16(2), 961–987 (2014)
Chen, P., Desmet, L., Huygens, C.: A study on advanced persistent threats. In: De Decker, B., Zúquete, A. (eds.) CMS 2014. LNCS, vol. 8735, pp. 63–72. Springer, Heidelberg (2014)
Agency, E.U., for Network, Information Security (ENISA): Algorithms, key size and parameters report - 2014 (2014)
Kert, M., Lopez, J., Markatos, E., Preneel, P.: State-of-the-art of Secure ICT Landscape (Final, Version 1), NIS Platform, Working group 3 (WG3) (2014)
Granjal, J., Monteiro, E., Sá Silva, J.: Security in the integration of low-power wireless sensor networks with the internet: a survey. Ad Hoc Netw. 24, 264–287 (2015)
Sasse, M.A.: “Technology should be smarter than this!”: A vision for overcoming the great authentication Fatigue. In: Jonker, W., Petković, M. (eds.) SDM 2013. LNCS, vol. 8425, pp. 33–36. Springer, Heidelberg (2014)
Mirante, D., Cappos, J.: Understanding password database compromises. Polytechnic Institute of NYU, Technical report TR-CSE-2013-02 (2013)
Bhagavatula, C., Ur, B., Iacovino, K., Kywey, S.M., Cranor, L.F., Savvides, M.: Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption. USEC 2015 (2015)
European Union Agency for Network, Information Security (ENISA): ENISA Report on Strategic Research Agenda, draft v02.63 (2014). https://resilience.enisa.europa.eu/nis-platform/shared-documents/wg3-documents
European Union Agency for Network and Information Security (ENISA): ENISA cybersecurity Information Sharing: An Overview of Regulatory and Non-regulatory Approaches (2015). https://www.enisa.europa.eu/activities/cert/support/information-sharing/cybersecurity-information-sharing/at_download/fullReport
MITRE: Structured Threat Information eXpression (STIX) specification (2014). http://stix.mitre.org
Advanced Cyber Defence centre (ACDC) (2016). https://www.acdc-project.eu/
MITRE: Trusted Automated eXchange of Indicator Information (TAXII) specifications (2014). https://taxiiproject.github.io/
Torres, R., Gallego-Nicasio, B., Zanetti, R.: Initial set of research activities listed to meet gaps. CAPITAL (cybersecurity research agenda for privacy and technology challenges) D3.1 deliverable (2014)
Adrian, A.: Beyond griefing: virtual crime. Comput. Law Secur. Rev. 26(6), 640–648 (2010)
Hibshi, H., Vidas, T., Cranor, L. Usability of forensics tools: a user study. In: Sixth International Conference on IT Security Incident Management and IT Forensics, pp. 81–91. IEEE (2011)
Bettini, C., Riboni, D.: Privacy protection in pervasive systems: state of the art and technical challenges. Pervasive Mob. Comput. 17, 159–174 (2015)
Christin, D.: Privacy in mobile participatory sensing: current trends and future challenges. J. Syst. Softw. (2015). doi:10.1016/j.jss.2015.03.067
Klobučar, T., Gabrijelčič, D., Pagon, V.: Cross-border e-learning and academic services based on eIDs: case of Slovenia. In: eChallenges 2014: 29–30 October, 2014 Belfast, Ireland. Dublin: IIMC: = International Information Management Corporation, 9pp (2014)
Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. J. Inf. Sec. Appl. 19(1), 25–44 (2014)
Record, J.: Bounding the Global War on Terrorism. Strategic Studies Institute (2003). http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA419754
Jarvis, L., Nouri, L., Whiting, A.: Understanding, locating and constructing cyberterrorism. In: Chen, T.N., Jarvis, L., Macdonald, S. (eds.) Cyberterrorism: Understanding, Assessment and Purpose, pp. 25–41 (2014) doi:10.1007/978-1-4939-0962-9
Acknowledgement
The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7-SEC-2013) as the COURAGE project under grant agreement no 607949.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Jerman-Blažič, B., Klobučar, T. (2016). Towards the Development of a Research Agenda for Cybercrime and Cyberterrorism – Identifying the Technical Challenges and Missing Solutions. In: Akhgar, B., Brewster, B. (eds) Combatting Cybercrime and Cyberterrorism. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-38930-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-38930-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38929-5
Online ISBN: 978-3-319-38930-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)