Abstract
It is widely accepted that technology is an agent of change in the society. If used properly, it can increase productivity and improve our quality of life. However, the current rate of change in technology leaves room for it to be exploited and be used for things it was not meant to do. This includes criminal activities which are carried using technology on the cyberspace that can be classified as cybercrime. Cybercrime or computer crime can be defined as a criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity. Cybercrime can also be defined as the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud and, in some cases, corporate espionage.
In this chapter, we explore the challenges of combating cybercrime given its dynamic, pervasive and international nature. We examine in detail the technical, social and legal factors that are continually shaping the landscape of cybercrime. Further, the chapter consolidates research and practical work in the area of cybercrime, emerging perspectives, paradigms and trends. A deliberate effort is made in making sure that the role of underground economy is clearly spelled out and its contribution to cybercrime is analysed. The impact of new laws which are being quickly enacted without much thought, discussion on the regulatory framework for combating cybercrime and ethical dimension of cybercrime given its global nature are examined. This chapter is expected to stimulate constructive discussions on novel ways of mitigating and promoting research in cybercrime.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hallam-Baker, P.: THE DOTCRIME MANIFESTO: How to Stop Internet Crime. Addison-Wesley, Upper Saddle River, NJ (2008)
Cymru, T.: Can we protect ourselves from the hazards of an online world? ACM Queue 4(9), 24–28 (2006)
McEwen, T.J.: Dedicated Computer Crime Units. Diane Pub Co., Darby, PA (1993)
Forester, T., Morrison, P.: Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. MIT Press, Cambridge, MA (1994)
Tavani, H.T.: Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. Wiley, Hoboken, NJ (2004)
Cornwall, H.: Hacker’s Handbook. E.A. Brown Co., Alexandria, MN (1986)
Balkin, J.M., et al.: Cybercrime: digital cops in a networked environment. In: Balkin, J.M., Noveck, B.S. (eds.) The Information Society Project at Yale Law School. New York University Press, New York (2007)
Geer, D.E.: The physics of digital law: searching for counterintuitive analogies. In: Balkin, J.M., et al. (eds.) CYBERCRIME: Digital Cops in a Networked Environment, pp. 13–36. New York University Press, New York (2007)
Rice, D.: GEEKONOMICS: The Real Cost of Insecure Software. Addison-Wesley, Reading, MA (2008)
Wilson, C.: Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress. In: CRS Report for Congress, pp. 1–40 (2008)
Ben-Itzhak, Y.: Organized cybercrime. ISSA J. 6(10), 37–39 (2008)
Giles, J., Biever, C.: Gathering privacy storm as ISPs sell web clicks to advertisers. New Sci. 198(2653), 24–25 (2008)
Jesdanun, A.: Targeting ads by tracking Web surfing habits hits a wall. http://www.usatoday.com/tech/products/2008-09-02-web-tracking_N.htm. (2008) [cited 21 Dec 2008]
Mtanzania, a local newspaper, cited on July 26, 2013, page 6
http://www.tech360magaz.com/2012/07/tanzania-lost-89218-billions-on.html line. Cited on July 2012
Mwananchi local news paper on Monday, cited on 16 July 2012
http://www.thecitizen.co.tz/News/Hitches-in-fighting-cybercrime/-/1840392/2455418/-/x9w9oq/-/index.html. Source: Wednesday, September 17 2014 at 12:59
Martinelli, N.: Think FICO is a credit scoring company? Nope: it’s about large-scale analytics. 27 May 2015 (2015)
Sidel, R.: Theft of debit-card data from ATMs soars, Thieves are stealing information to make counterfeit plastic. The Wall Street Journal, May 19, 2015 7:41 PM (2015)
Bank of Tanzania 2013, Monetary Policy Statement 2013/2014, ISSN 08556-6976
Bond, M., Omar Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderso, R.: Chip and Skim: Cloning EMV Cards with the Pre-Play Attack. Computer Laboratory, University of Cambridge, UK, Cambridge, UK (2012)
Murphy, N.: Edward Snowden reveals tips for protecting your privacy. http://www.cheatsheet.com/money-career/edward-snowden-reveals-tips-for-protecting-your-privacy.html/?a=viewall on March 2016. 19 Jan 2016
Andy Greenberg, Security, Signal, the Snowden, Approved Crypto App Comes to Adroid Time of Publication: 8:06 pm. 8:06 pm, Source: Thinkstock.
Stephen, P., Induruwa, A.: Cybercrime investigation training and specialist education for the European Union. In Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos-Greece (2007)
Markoff, J.: Internet traffic begins to bypass the U.S. http://www.nytimes.com/2008/08/30/business/30pipes.html. (2008) [cited 21 Dec 2008]
O’Connor, O.: The 2nd ISSA/UCD Irish Cybercrime Survey, pp. 1–25. Information Systems Security Association Ireland Chapter/UCD, Dublin (2008)
Loibil, T.R.: Identity theft, spyware and the law. In: Information Security Curriculum Development (InfoSecCD) Conference, Kennesaw, GA, USA (2005)
Biever, C.: Murky trade in bugs plays into the hands of hackers. New Sci. 194(2608), 30–31 (2007)
Schneier, B.: Schneier on Security. Wiley Publishing, Inc., Indianapolis, IN (2008)
Robel, D.: International Cybercrime Treaty: Looking Beyond Ratification. SANS InfoSec Reading Rooms (2007)
Cerezo, A.I., Lopez, J., Patel, A.: International cooperation to fight transnational cybercrime. In Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). IEEE Computer Society, Samos-Greece (2007)
Fossi, M., et al.: Symantec Report on the Underground Economy. Symantec (2008)
Emigh, A., Ramzan, Z.: Overview of crimeware. In: Jakobsson, M., Ramzan, Z. (eds.) Crimeware Understanding New Attacks and Defenses, pp. 1–36. Symantec Press, Cupertino (2008)
Espiner, T., Sullivan, D.: Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress. In: Wilson C. (ed.) CRS Report for Congress, Washington (2007)
Denning, D.: A view of cyberterrorism 5 years later. In: Himma, K.E. (ed.) Internet Security: Hacking, Counterhacking, and Society, pp. 123–140. Jones and Bartlett, Sudbury, MA (2007)
Brenner, S.W.: Organized cybercrime? How cyberspace may affect the structure of criminal relationships. N. C. J. Law Technol. 4(1), 29 (2002)
Ward, M.: Cybercrime treaty condemned. http://news.bbc.co.uk/1/hi/sci/tech/1072580.stm. (2000) [cited 21 Dec 2008]
Swartz, B.: Multilateral Law Enforcement Treaties. Senate Foreign Relations Committee (2004)
Sommer, P.: Criminalising hacking tools. Digit. Investig. 3, 68–72 (2006)
RIPA. Regulation of Investigatory Powers Act 2000. http://www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_1. (2000) [cited 21 Dec 2008]
Council of Europe. Convention on cybercrime. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG. (2001) [cited 21 Dec 2008]
Meinel, C.P.: Cybercrime treaty could chill research. IEEE Secur. Priv. 2(4), 28–32 (2004)
SAFECODE. Software Assurance Forum for Excellence in Code (SAFECode). http://www.safecode.org/index.php. (2008) [cited 21 Dec 2008]
Howard, M.: Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today, pp. 1–20. Software Assurance Forum for Excellence in Code (SAFECode), Arlington, VA (2008)
Laliberte, S., Gupta, A.: Defend I.T.: Security by Example, p. 384. Addison-Wesley Professional, Boston (2004)
McNeil, K., Etges, R.: Cyber warfare and defense strategies. ISSA J. 6–10 (2008)
Price, S.: How to win the cyber war. ISSA J. 6(12), 7 (2008)
Schwartz, J.: Who needs Hackers? http://www.nytimes.com/2007/09/12/technology/techspecial/12threat.html?_r = 1&adxnnl = 1&adxnnlx = 1229803518-cYQBQCp4uGjb5UpVgVGNHw. (2007) [cited 12 Sept 2007]
Day, O.: Microsoft’s stance on piracy affects us all. http://www.securityfocus.com/columnists/484. (2008) [cited 30 Nov 2008]
Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of vulnerability: a case study analysis. Computer 33(12), 52–59 (2000)
Provos, N., et al.: The ghost in the browser analysis of web-based malware. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, Cambridge, MA (2007)
Valentine, D.W.: Practical computer security: a new service course based upon the national strategy to secure cyberspace. In: SIGITE’05. ACM, Newark, NJ (2005)
Sommer, P.: The future for the policing of cybercrime. Comput. Fraud Secur. 2004(1), 8–12 (2004)
Shannon, M.M.: Shaking hands, kissing babies, and blogging? Commun. ACM 50(9), 21–24 (2007)
Nakashima, E.: Cyber attack data-sharing is lacking, Congress told. (2008) [cited 19 Sept 2008]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Oreku, G.S., Mtenzi, F.J. (2017). Cybercrime: Concerns, Challenges and Opportunities. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-44257-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44256-3
Online ISBN: 978-3-319-44257-0
eBook Packages: EngineeringEngineering (R0)