Skip to main content

Dealing with the Problem of Cybercrime

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2010)

Abstract

Lack of a universally accepted and comprehensive taxonomy of cybercrime seriously impedes international efforts to accurately identify, report and monitor cybercrime trends. There is, not surprisingly, a corresponding disconnect internationally on the cybercrime legislation front, a much more serious problem and one which the International Telecommunication Union (ITU) says requires ‘the urgent attention of all nations’. Yet, and despite the existence of the Council of Europe Convention on Cybercrime, a proposal for a global cybercrime treaty was rejected by the United Nations (UN) as recently as April 2010. This paper presents a refined and comprehensive taxonomy of cybercrime and demonstrates its utility for widespread use. It analyses how the USA, the UK, Australia and the UAE align with the CoE Convention and finds that more needs to be done to achieve conformance. We conclude with an analysis of the approaches used in Australia, in Queensland, and in the UAE, in Abu Dhabi, to fight cybercrime and identify a number of shared problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Grabosky, P., Smith, R.G., Dempsey, G.: Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge University Press, Cambridge (2001)

    Google Scholar 

  2. Grabosky, P.: The Global and Regional Cyber Crime Problem. In: Broadhurst, R.G. (ed.) Proceedings of the Asia Cyber Crime Summit, pp. 22–42. Centre for Criminology, The University of Hong Kong, Hong Kong (2001)

    Google Scholar 

  3. Furnell, S.M.: The Problem of Categorising Cybercrime and Cybercriminals. In: 2nd Australian Information Warfare and Security Conference, Perth, Australia, pp. 29–36 (2001)

    Google Scholar 

  4. United Nations (UN). International Review of Criminal Policy - United Nations manual on the prevention and control of computer-related crime (1999), http://www.uncjin.org/8th.pdf (cited December 6, 2006)

  5. G8 Government/Industry Conference on High-Tech Crime. Report of Workshop 3: Threat assessment and prevention. G8 Government/Industry Conference on High-Tech Crime (2001), http://www.mofa.go.jp/policy/i_crime/high_tec/conf0105-6.html (cited March 6, 2007)

  6. Krone, T.: High Tech Crime Brief: Concepts and terms (2005), http://www.aic.gov.au/publications/htcb/htcb001.pdf (cited February 1, 2007)

  7. Kelly, J.X.: Cybercrime - High tech crime (2002), http://www.jisclegal.ac.uk/cybercrime/Archived_cybercrime.htm (cited March 1, 2007)

  8. Gordon, S., Ford, R.: On the Definition and Classification of Cybercrime. Journal of Computer Virology 2(1), 13–20 (2006)

    Article  Google Scholar 

  9. Broadhurst, R., Grabosky, P. (eds.): Cyber-crime: The challenge in Asia, p. 434. Hong Kong University Press, Hong Kong (2005)

    Google Scholar 

  10. Smith, R.G., Grabosky, P., Urbas, G.: Cyber Criminals on Trial, p. 262. Cambridge University Press, Melbourne (2004)

    Book  Google Scholar 

  11. Pokar, F.: New Challenges for International Rules Against Cyber-crime. European Journal on Criminal Policy and Research 10(1), 27–37 (2004)

    Article  Google Scholar 

  12. Foreign Affairs and International Trade Canada. Cyber Crime, August 16 (2004), http://www.dfait-maeci.gc.ca/internationalcrime/cybercrime-en.asp (cited December 5, 2006)

  13. Cybercitizenship. What is Cyber Crime? (2008), http://cybercitizenship.org/crime/crime.html (cited February 19, 2008)

  14. Symantec Corporation. What is Cybercrime? (2007), http://www.symantec.com/avcenter/cybercrime/index_page2.html (cited February 5, 2007)

  15. Kshetri, N.: The Simple Economics of Cybercrimes. IEEE Security & Privacy 4(1), 33–39 (2006)

    Article  Google Scholar 

  16. Wall, D.S.: Cybercrimes: New wine, no bottles? In: Davies, P., Francis, P., Jupp, V. (eds.) Invisible Crimes: Their Victims and their Regulation. Macmillan, London (1999)

    Google Scholar 

  17. Grabosky, P.N.: Virtual Criminality: Old Wine in New Bottles? Social & Legal Studies 10(2), 243–249 (2001)

    Google Scholar 

  18. Council of Europe. Convention on Cybercrime (2001), http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm (cited February 10, 2009)

  19. Computer Crime and Intellectual Property Section Criminal Division at U.S. Department of Justice. Prosecuting computer crimes (2007)

    Google Scholar 

  20. UK Metropolitan Police Service (MPS). Progress of MPS E-crime Strategy (2007), http://www.mpa.gov.uk/print/committees/mpa/2007/070125/10.htm (cited January 10, 2008)

  21. Secretariat of the Parliamentary Joint Committee on the Australian Crime Commission. Cybercrime (2004), http://www.aph.gov.au/senate/committee/acc_ctte/completed_inquiries/2002-04/cybercrime/report/report.pdf (cited January 15, 2008)

  22. Brenner, S.W.: U.S. Cybercrime Law: Defining offences. Information Systems Frontiers 6(2), 115–132 (2004)

    Article  Google Scholar 

  23. Sukhai, N.B.: Hacking and Cybercrime. In: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, I.s.c. development, Editor, pp. 128–132. ACM Press, Kennesaw (2004)

    Google Scholar 

  24. Koenig, D.: Investigation of Cybercrime and Technology-related Crime (2002), http://www.neiassociates.org/cybercrime.htm (cited June 25, 2008)

  25. Wilson, C.: Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and policy issues for congress (2008), http://fas.org/sgp/crs/terror/RL32114.pdf (cited June 26, 2008)

  26. Lewis, B.C.: Preventing of Computer Crime Amidst International Anarchy (2004), http://goliath.ecnext.com/coms2/summary_0199-3456285_ITM (cited November 17, 2008)

  27. Australian High Tech Crime Centre (AHTCC): Fighting the Invisible. Platypus Magazine: Journal of the Australian Federal Police 80, 4–6 (2003), http://www.afp.gov.au/~/media/afp/pdf/f/fighting-the-invisible.ashx

    Google Scholar 

  28. Urbas, G., Choo, K.-K.R.: Resources Materials on Technology-enabled Crime, No. 28 (2008), http://www.aic.gov.au/publications/tbp/tbp028/tbp028.pdf (cited November 16, 2008)

  29. Thomas, D.: An Uncertain World. The British Computer Society 48(5), 12–13 (2006)

    Google Scholar 

  30. Kanellis, P., et al. (eds.): Digital Crime and Forensic Science in Cyberspace. Idea Group Inc., London (2006)

    Google Scholar 

  31. Chakrabarti, A., Manimaran, G.: Internet Infrastructure Security: A taxonomy. IEEE Network 16(6), 13–21 (2002)

    Article  Google Scholar 

  32. Krone, T.: High Tech Crime Brief: Hacking motives (2005), http://www.aic.gov.au/publications/htcb/htcb006.html (cited February 12, 2007)

  33. Keyser, M.: The Council of Europe Convention on Cybercrime. Transnational Law and Policy Journal 12(2), 287–326 (2003)

    Google Scholar 

  34. Brenner, S.W.: Defining Cybercrime: A review of the state and federal law. In: Clifford, R.D. (ed.) Cybercrime: The Investigation, Prosecution and Defence of a Computer-Related Crime, pp. 12–40. Carolina Academic Press, North Carolina (2006)

    Google Scholar 

  35. Coleman, K.: Cyber Terrorism (2003), http://www.directionsmag.com/article.php?article_id=432&trv=1 (cited February 10, 2009)

  36. The UK Parliament Office of Science and Technology. Computer crime (2006), http://www.parliament.uk/documents/upload/postpn271.pdf (cited March 1, 2007)

  37. Markoff, J.: Computer Intruder is put on Probation and Fined $10,000 (1990), http://query.nytimes.com/gst/fullpage.html?res=9C0CE1D71038F936A35756C0A966958260 (cited October 7, 2008)

  38. Wyld, B.: Cyberterrorism: Fear factor (2004), http://www.crime-research.org/analytics/501/ (cited October 7, 2008)

  39. CIO Asia. A Hacker Story (2005), http://www.crime-research.org/articles/hacker0405/ (cited May 28, 2008)

  40. Attfield, P.: United States v Gorshkov Detailed Forensics and Case Study: Expert witness perspective, pp. 3–24. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  41. Berghel, H.: Fungible Credentials and Next-generation Fraud. Communications of the ACM 49(12), 15–19 (2006)

    Article  Google Scholar 

  42. Ninemsn. Cop’s Child Porn Case Delayed to Friday (2008), http://news.ninemsn.com.au/article.aspx?id=575167 (cited June 6, 2008)

  43. Grow, B., Bush, J.: Hacker Hunters (2005), http://www.businessweek.com/magazine/content/05_22/b3935001_mz001.htm (cited October 21, 2006)

  44. SCAMwatch. The Holiday Prize Which Nearly Cost Nicole Thousands of Dollars (2008), http://www.scamwatch.gov.au/content/index.phtml/itemId/699124 (cited October 17, 2008)

  45. U.S. Department of Justice. Fourth defendant in massive Internet scam pleads guilty to fraud and money laundering charges (2004), http://www.usdoj.gov/criminal/cybercrime/nordickPlea_triwest.htm (cited November 3, 2008)

  46. Gulfnews. New Department to Fight Cyber Crimes (2009), http://gulfnews.com/news/gulf/uae/crime/new-department-to-fight-cyber-crimes-1.554070 (cited December 25, 2009)

  47. Alkaabi, A., et al.: A Comparative Analysis of the Extent of Money Laundering in Australia, UAE, UK and the USA. In: Finance and Corporate Governance Conference, Melbourne (2010), http://ssrn.com/abstract=1539843

  48. International Telecommunication Union. ITU Toolkit for Cybercrime Legislation (2009) (updated on February 2010), http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-toolkit-cybercrime-legislation.pdf (cited November 3, 2009)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Alkaabi, A., Mohay, G., McCullagh, A., Chantler, N. (2011). Dealing with the Problem of Cybercrime. In: Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19513-6_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19513-6_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19512-9

  • Online ISBN: 978-3-642-19513-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics