Skip to main content

Cybercrime: Concerns, Challenges and Opportunities

  • Chapter
  • First Online:
Information Fusion for Cyber-Security Analytics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 691))

Abstract

It is widely accepted that technology is an agent of change in the society. If used properly, it can increase productivity and improve our quality of life. However, the current rate of change in technology leaves room for it to be exploited and be used for things it was not meant to do. This includes criminal activities which are carried using technology on the cyberspace that can be classified as cybercrime. Cybercrime or computer crime can be defined as a criminal activity in which computers or computer networks are a tool, a target or a place of criminal activity. Cybercrime can also be defined as the leveraging of information systems and technology to commit larceny, extortion, identity theft, fraud and, in some cases, corporate espionage.

In this chapter, we explore the challenges of combating cybercrime given its dynamic, pervasive and international nature. We examine in detail the technical, social and legal factors that are continually shaping the landscape of cybercrime. Further, the chapter consolidates research and practical work in the area of cybercrime, emerging perspectives, paradigms and trends. A deliberate effort is made in making sure that the role of underground economy is clearly spelled out and its contribution to cybercrime is analysed. The impact of new laws which are being quickly enacted without much thought, discussion on the regulatory framework for combating cybercrime and ethical dimension of cybercrime given its global nature are examined. This chapter is expected to stimulate constructive discussions on novel ways of mitigating and promoting research in cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hallam-Baker, P.: THE DOTCRIME MANIFESTO: How to Stop Internet Crime. Addison-Wesley, Upper Saddle River, NJ (2008)

    Google Scholar 

  2. Cymru, T.: Can we protect ourselves from the hazards of an online world? ACM Queue 4(9), 24–28 (2006)

    Article  Google Scholar 

  3. McEwen, T.J.: Dedicated Computer Crime Units. Diane Pub Co., Darby, PA (1993)

    Google Scholar 

  4. Forester, T., Morrison, P.: Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. MIT Press, Cambridge, MA (1994)

    Google Scholar 

  5. Tavani, H.T.: Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. Wiley, Hoboken, NJ (2004)

    Google Scholar 

  6. Cornwall, H.: Hacker’s Handbook. E.A. Brown Co., Alexandria, MN (1986)

    Google Scholar 

  7. Balkin, J.M., et al.: Cybercrime: digital cops in a networked environment. In: Balkin, J.M., Noveck, B.S. (eds.) The Information Society Project at Yale Law School. New York University Press, New York (2007)

    Google Scholar 

  8. Geer, D.E.: The physics of digital law: searching for counterintuitive analogies. In: Balkin, J.M., et al. (eds.) CYBERCRIME: Digital Cops in a Networked Environment, pp. 13–36. New York University Press, New York (2007)

    Google Scholar 

  9. Rice, D.: GEEKONOMICS: The Real Cost of Insecure Software. Addison-Wesley, Reading, MA (2008)

    Google Scholar 

  10. Wilson, C.: Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress. In: CRS Report for Congress, pp. 1–40 (2008)

    Google Scholar 

  11. Ben-Itzhak, Y.: Organized cybercrime. ISSA J. 6(10), 37–39 (2008)

    Google Scholar 

  12. Giles, J., Biever, C.: Gathering privacy storm as ISPs sell web clicks to advertisers. New Sci. 198(2653), 24–25 (2008)

    Article  Google Scholar 

  13. Jesdanun, A.: Targeting ads by tracking Web surfing habits hits a wall. http://www.usatoday.com/tech/products/2008-09-02-web-tracking_N.htm. (2008) [cited 21 Dec 2008]

  14. Mtanzania, a local newspaper, cited on July 26, 2013, page 6

    Google Scholar 

  15. http://www.tech360magaz.com/2012/07/tanzania-lost-89218-billions-on.html line. Cited on July 2012

  16. Mwananchi local news paper on Monday, cited on 16 July 2012

    Google Scholar 

  17. http://www.thecitizen.co.tz/News/Hitches-in-fighting-cybercrime/-/1840392/2455418/-/x9w9oq/-/index.html. Source: Wednesday, September 17 2014 at 12:59

  18. Martinelli, N.: Think FICO is a credit scoring company? Nope: it’s about large-scale analytics. 27 May 2015 (2015)

    Google Scholar 

  19. Sidel, R.: Theft of debit-card data from ATMs soars, Thieves are stealing information to make counterfeit plastic. The Wall Street Journal, May 19, 2015 7:41 PM (2015)

    Google Scholar 

  20. Bank of Tanzania 2013, Monetary Policy Statement 2013/2014, ISSN 08556-6976

    Google Scholar 

  21. Bond, M., Omar Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderso, R.: Chip and Skim: Cloning EMV Cards with the Pre-Play Attack. Computer Laboratory, University of Cambridge, UK, Cambridge, UK (2012)

    Google Scholar 

  22. Murphy, N.: Edward Snowden reveals tips for protecting your privacy. http://www.cheatsheet.com/money-career/edward-snowden-reveals-tips-for-protecting-your-privacy.html/?a=viewall on March 2016. 19 Jan 2016

  23. Andy Greenberg, Security, Signal, the Snowden, Approved Crypto App Comes to Adroid Time of Publication: 8:06 pm. 8:06 pm, Source: Thinkstock.

    Google Scholar 

  24. Stephen, P., Induruwa, A.: Cybercrime investigation training and specialist education for the European Union. In Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos-Greece (2007)

    Google Scholar 

  25. Markoff, J.: Internet traffic begins to bypass the U.S. http://www.nytimes.com/2008/08/30/business/30pipes.html. (2008) [cited 21 Dec 2008]

  26. O’Connor, O.: The 2nd ISSA/UCD Irish Cybercrime Survey, pp. 1–25. Information Systems Security Association Ireland Chapter/UCD, Dublin (2008)

    Google Scholar 

  27. Loibil, T.R.: Identity theft, spyware and the law. In: Information Security Curriculum Development (InfoSecCD) Conference, Kennesaw, GA, USA (2005)

    Google Scholar 

  28. Biever, C.: Murky trade in bugs plays into the hands of hackers. New Sci. 194(2608), 30–31 (2007)

    Article  Google Scholar 

  29. Schneier, B.: Schneier on Security. Wiley Publishing, Inc., Indianapolis, IN (2008)

    Google Scholar 

  30. Robel, D.: International Cybercrime Treaty: Looking Beyond Ratification. SANS InfoSec Reading Rooms (2007)

    Google Scholar 

  31. Cerezo, A.I., Lopez, J., Patel, A.: International cooperation to fight transnational cybercrime. In Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007). IEEE Computer Society, Samos-Greece (2007)

    Google Scholar 

  32. Fossi, M., et al.: Symantec Report on the Underground Economy. Symantec (2008)

    Google Scholar 

  33. Emigh, A., Ramzan, Z.: Overview of crimeware. In: Jakobsson, M., Ramzan, Z. (eds.) Crimeware Understanding New Attacks and Defenses, pp. 1–36. Symantec Press, Cupertino (2008)

    Google Scholar 

  34. Espiner, T., Sullivan, D.: Botnets, cybercrime, and cyberterrorism: vulnerabilities and policy issues for congress. In: Wilson C. (ed.) CRS Report for Congress, Washington (2007)

    Google Scholar 

  35. Denning, D.: A view of cyberterrorism 5 years later. In: Himma, K.E. (ed.) Internet Security: Hacking, Counterhacking, and Society, pp. 123–140. Jones and Bartlett, Sudbury, MA (2007)

    Google Scholar 

  36. Brenner, S.W.: Organized cybercrime? How cyberspace may affect the structure of criminal relationships. N. C. J. Law Technol. 4(1), 29 (2002)

    Google Scholar 

  37. Ward, M.: Cybercrime treaty condemned. http://news.bbc.co.uk/1/hi/sci/tech/1072580.stm. (2000) [cited 21 Dec 2008]

  38. Swartz, B.: Multilateral Law Enforcement Treaties. Senate Foreign Relations Committee (2004)

    Google Scholar 

  39. Sommer, P.: Criminalising hacking tools. Digit. Investig. 3, 68–72 (2006)

    Article  Google Scholar 

  40. RIPA. Regulation of Investigatory Powers Act 2000. http://www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_1. (2000) [cited 21 Dec 2008]

  41. Council of Europe. Convention on cybercrime. http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CL=ENG. (2001) [cited 21 Dec 2008]

  42. Meinel, C.P.: Cybercrime treaty could chill research. IEEE Secur. Priv. 2(4), 28–32 (2004)

    Article  Google Scholar 

  43. SAFECODE. Software Assurance Forum for Excellence in Code (SAFECode). http://www.safecode.org/index.php. (2008) [cited 21 Dec 2008]

  44. Howard, M.: Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today, pp. 1–20. Software Assurance Forum for Excellence in Code (SAFECode), Arlington, VA (2008)

    Google Scholar 

  45. Laliberte, S., Gupta, A.: Defend I.T.: Security by Example, p. 384. Addison-Wesley Professional, Boston (2004)

    Google Scholar 

  46. McNeil, K., Etges, R.: Cyber warfare and defense strategies. ISSA J. 6–10 (2008)

    Google Scholar 

  47. Price, S.: How to win the cyber war. ISSA J. 6(12), 7 (2008)

    Google Scholar 

  48. Schwartz, J.: Who needs Hackers? http://www.nytimes.com/2007/09/12/technology/techspecial/12threat.html?_r = 1&adxnnl = 1&adxnnlx = 1229803518-cYQBQCp4uGjb5UpVgVGNHw. (2007) [cited 12 Sept 2007]

  49. Day, O.: Microsoft’s stance on piracy affects us all. http://www.securityfocus.com/columnists/484. (2008) [cited 30 Nov 2008]

  50. Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of vulnerability: a case study analysis. Computer 33(12), 52–59 (2000)

    Article  Google Scholar 

  51. Provos, N., et al.: The ghost in the browser analysis of web-based malware. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, Cambridge, MA (2007)

    Google Scholar 

  52. Valentine, D.W.: Practical computer security: a new service course based upon the national strategy to secure cyberspace. In: SIGITE’05. ACM, Newark, NJ (2005)

    Google Scholar 

  53. Sommer, P.: The future for the policing of cybercrime. Comput. Fraud Secur. 2004(1), 8–12 (2004)

    Article  Google Scholar 

  54. Shannon, M.M.: Shaking hands, kissing babies, and blogging? Commun. ACM 50(9), 21–24 (2007)

    Article  Google Scholar 

  55. Nakashima, E.: Cyber attack data-sharing is lacking, Congress told. (2008) [cited 19 Sept 2008]

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George S. Oreku .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Oreku, G.S., Mtenzi, F.J. (2017). Cybercrime: Concerns, Challenges and Opportunities. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44257-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44256-3

  • Online ISBN: 978-3-319-44257-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics