Abstract
As the threat of cybercrime increases, the forces which seek to combat them also increase. This chapter seeks to examine how an industry has arisen from the cybercrime threat and what forms of specialist areas they cover. In particular, we will look at the broad categories in which these different threats fall into and discuss how an industry has sprung up to capitalise upon it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Bauman, Z. (1998). Globalisation – The human consequences. USA: Columbia University Press.
Blackburn, S. (2008). Oxford dictionary of philosophy. Great Britain: Oxford University Press.
Buruma, I. & Margalit, A. (2004). Occidentalism – A short history of anti-westernism. USA: The Penguin Press.
Campbell, D. (17th July 2004). Introducing Del-Qaeda from The Guardian, Great Britain, Available online at: http://www.guardian.co.uk/world/2004/jul/17/terrorism.comment Accessed on 23rd January 2010.
Carrabine, E. (2008). Crime, culture and the media. Great Britain: Polity Press.
Cere, R. (2007). Digital underground: alternative politics and civil society from Crime Online Edited by Yvonne Jewkes. Great Britain: Willan Publishing.
Deloitte. (2015). The Deloitte consumer review – consumer data under attack: The growing threat of cyber crime. Great Britain: Deloitte. Available online at: www2.deloitte.com/content/dam/Deloitte/uk/Documents/consumer-business/deloitte-uk-consumer-review-nov-2015.pdf.
Forst, B. (2009). Terrorism, crime and public policy. New York, USA: Cambridge University Press.
Giddens, A. (1995). Sociology. 2nd Edition. Great Britain: Polity Press.
Gray, J. (2003). Al Qaeda and what it means to be modern. Great Britain: Faber and Faber.
Gray, J. (2004). Heresies – against progress and other illusions. Great Britain: Granta Publications.
Grierson, J. (2016). Met chief suggests banks should not refund online fraud victims, from the guardian.com 24th March 2016. Available online at: http://www.theguardian.com/uk-news/2016/mar/24/dont-refund-online-victims-met-chief-tells-banks.
Jewkes, Y. (2003). Policing the net: Crime, regulation and surveillance in cyberspace from Dot.cons – Crime, deviance and identity on the internet Edited by Yvonne Jewkes. Great Britain: Willan Publishing.
Jewkes, Y. (2007). Cybercrime from the sage dictionary of criminology. 2nd Ed. Edited by Eugene McLaughlin & John Muncie. Great Britain: Sage Publications.
Katz, R. & Kern, M. (2009). Catching a Jihadi cyberterrorist from terrorism, crime and public policy. New York, USA: Cambridge University Press.
Krotoski, A. (2010). The virtual revolution – enemy of the state. Great Britain: British Broadcasting Corporation. Transmitted 6th February 2010.
Krotoski, A. (2010). The virtual revolution – the price of free. Great Britain: British Broadcasting Corporation. Transmitted 13th February 2010.
Krotoski, A. (2010). The virtual revolution – homo interneticus?. Great Britain: British Broadcasting Corporation. Transmitted 20th February 2010.
Miller, S. (2009). Terrorism and counter-terrorism – Ethics and liberal democracy. Great Britain: Blackwell Publishing.
Muncie, J. (2007). Globalisation from the sage dictionary of criminology. Great Britain: Sage Publications.
Newburn, T. (2007). Criminology. Great Britain: Willan publishing.
Noble, W. (2011). A critical engagement with Piratical opinion. University of Central Lancashire, Great Britain. Available online at:http://clok.uclan.ac.uk/7126/
Owen, T. (2006a). Genetic-social science and the study of human biotechnology. Current Sociology, 54 (6), 897–917.
Owen, T. (2007). Culture of crime control: Through a post-Foucauldian lens, from The Internet Journal of Criminology available online at: http://www.theinternetjournalofcriminology.com Accessed on 10th February 2010.
Pollinger, Z. A. (2007). Counterfeit goods and their potential financing of international terrorism. The Michigan Journal of Business, USA. Available online at: http://michiganjb.org/issues/1/article4.pdf Accessed on 7th January 2010.
Reyes, A. & Wiles, J. (2007) The best damn cybercrime and digital forensics book period. USA: Syngress Publishing Inc.
Shcherbakova, T., Vergelis, M. & Demidova, N. (2015). Spam and phishing in the first quarter of 2015. Quarterly Spam Reports, Securelist, May 13, 2015. Available online at: https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/.
Taylor, P. (2010a). Generation jihad – episode two. British Broadcasting Corporation, Great Britain. Transmitted on 15th February 2010.
Taylor, P. (2010b). Generation jihad – episode three. British Broadcasting Corporation, Great Britain. Transmitted on 22nd February 2010.
Wall, D. (2008). Cybercrime. Great Britain: Polity Press.
Yar, M. (2006). Cybercrime and society. Great Britain: Sage Publications.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Owen, T., Noble, W., Speed, F.C. (2017). Cyber Armies – The Growth of the Cyber Defence Industry. In: New Perspectives on Cybercrime. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-53856-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-53856-3_5
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-53855-6
Online ISBN: 978-3-319-53856-3
eBook Packages: Law and CriminologyLaw and Criminology (R0)