Skip to main content

2022 | OriginalPaper | Buchkapitel

3. Cybersecurity and Cybercrimes

verfasst von : Melissa Lukings, Arash Habibi Lashkari

Erschienen in: Understanding Cybersecurity Law and Digital Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity law is not simply the application of legal systems to the protection of private data; it also includes using our legal systems to address criminal activity that is conducted using networked technologies—otherwise known as cybercrime. This chapter will outline the types of cybersecurity laws needed to address issues such as interpersonal privacy, criminal copyright infringement, data breaches, network attacks, and other computer-related activities of a criminally malicious nature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
United States Sentencing Guidelines, §3B1.3.
 
4
United States Sentencing Guidelines, §3B1.3, comment. (n.4).
 
5
United States v. Lange, 312 F.3d 263, 270 (seventh Cir. 2002).
 
6
United States v. Campa, 529 F.3d 980, 1017–18 (11th Cir. 2008).
 
7
United States v. O’Brien, 435 F.3d 36, 42 (first Cir. 2006).
 
8
United States v. Kyereme, 371 F. App’x 292, 293–94 (3d Cir. 2010).
 
9
United States v. Lavin, 27 F.3d 40, 41 (2d Cir. 1994).
 
10
United States v. Prochner, 417 F.3d 54, 61 (first Cir. 2005).
 
11
United States v. Petersen, 98 F.3d 502 (ninth Cir. 1996).
 
12
United States v. Reichert, 747 F.3d 445, 454–55 (sixth Cir. 2014).
 
13
United States v. Lee, 296 F.3d 792, 797–99 (ninth Cir. 2002).
 
14
United States v. Godman, 223 F.3d 320, 322–23 (sixth Cir. 2000).
 
15
States v. Lord, 915 F.3d 1009, 1024–25 (fifth Cir. 2019).
 
16
Seriously. Read it again. These vaccines are safe, effective, and should absolutely be taken if given the opportunity.
 
Literatur
1.
2.
Zurück zum Zitat Ram, C. (2016). Jonathan Clough, Principles of Cybercrime, (Cambridge: Cambridge University Press, 2015). Canadian Journal of Law and Technology, 14(1). Ram, C. (2016). Jonathan Clough, Principles of Cybercrime, (Cambridge: Cambridge University Press, 2015). Canadian Journal of Law and Technology, 14(1).
3.
Zurück zum Zitat Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381–395.CrossRef Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381–395.CrossRef
4.
Zurück zum Zitat Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.CrossRef Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.CrossRef
5.
Zurück zum Zitat Urbas, G. (2015). Cybercrime legislation, cases and commentary. LexisNexis Butterworths. Urbas, G. (2015). Cybercrime legislation, cases and commentary. LexisNexis Butterworths.
6.
Zurück zum Zitat Criminal Code of Canada (RSC, 1985, c C-46), s 162.1(2). Criminal Code of Canada (RSC, 1985, c C-46), s 162.1(2).
7.
Zurück zum Zitat Aikenhead, M. (2018). A reasonable expectation of sexual privacy in the digital age. Dalhousie LJ, 41, 273. Aikenhead, M. (2018). A reasonable expectation of sexual privacy in the digital age. Dalhousie LJ, 41, 273.
8.
Zurück zum Zitat Popham, J., McCluskey, M., Ouellet, M., & Gallupe, O. (2020). Exploring police-reported cybercrime in Canada: Variation and correlates. Policing: An International Journal. Popham, J., McCluskey, M., Ouellet, M., & Gallupe, O. (2020). Exploring police-reported cybercrime in Canada: Variation and correlates. Policing: An International Journal.
9.
Zurück zum Zitat Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In Handbook on crime and deviance (pp. 459–475). Springer.CrossRef Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In Handbook on crime and deviance (pp. 459–475). Springer.CrossRef
10.
Zurück zum Zitat Loader, B. D., & Thomas, D. (Eds.). (2013). Cybercrime: Security and surveillance in the information age. Routledge.CrossRef Loader, B. D., & Thomas, D. (Eds.). (2013). Cybercrime: Security and surveillance in the information age. Routledge.CrossRef
11.
Zurück zum Zitat Briandana, R., Oktavianingtyas, I., & Marta, R. F. (2020). Cybercrime in online dating site: Pornography business in the virtual world. Briandana, R., Oktavianingtyas, I., & Marta, R. F. (2020). Cybercrime in online dating site: Pornography business in the virtual world.
12.
Zurück zum Zitat Al-Garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, 433–443.CrossRef Al-Garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, 433–443.CrossRef
13.
Zurück zum Zitat Buono, L. (2014, June). Fighting cybercrime through prevention, outreach and awareness raising. In ERA Forum (Vol. 15, No. 1, pp. 1-8). Springer . Buono, L. (2014, June). Fighting cybercrime through prevention, outreach and awareness raising. In ERA Forum (Vol. 15, No. 1, pp. 1-8). Springer .
14.
Zurück zum Zitat Aiken, M., Mc Mahon, C., Haughton, C., O’Neill, L., & O’Carroll, E. (2016). A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online. Contemporary Social Science, 11(4), 373–391.CrossRef Aiken, M., Mc Mahon, C., Haughton, C., O’Neill, L., & O’Carroll, E. (2016). A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online. Contemporary Social Science, 11(4), 373–391.CrossRef
15.
Zurück zum Zitat Lee, H. E., Ermakova, T., Ververis, V., & Fabian, B. (2020). Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation, 34, 301022. Lee, H. E., Ermakova, T., Ververis, V., & Fabian, B. (2020). Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation, 34, 301022.
16.
Zurück zum Zitat Aiken, M., Moran, M., & Berry, M. J. (2011, September). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. In 29th meeting of the INTERPOL Specialist Group on Crimes against Children, Lyons, France, September (pp. 5–7). Aiken, M., Moran, M., & Berry, M. J. (2011, September). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. In 29th meeting of the INTERPOL Specialist Group on Crimes against Children, Lyons, France, September (pp. 5–7).
17.
Zurück zum Zitat ECPAT International. (2018, April). Trends in online child sexual abuse material. ECPAT International. ECPAT International. (2018, April). Trends in online child sexual abuse material. ECPAT International.
19.
Zurück zum Zitat Attorney General Eric Holder Jr. Speaks at the National Strategy Conference on Combating Child Exploitation in San Jose, California, May 19, 2011. Attorney General Eric Holder Jr. Speaks at the National Strategy Conference on Combating Child Exploitation in San Jose, California, May 19, 2011.
21.
Zurück zum Zitat Moise, A. C. (2017). The legal regulation of cybercrime in the United States of America legislation. Journal of Advanced Research in Law and Economics (JARLE), 8(27), 1576–1578. Moise, A. C. (2017). The legal regulation of cybercrime in the United States of America legislation. Journal of Advanced Research in Law and Economics (JARLE), 8(27), 1576–1578.
22.
Zurück zum Zitat Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216.CrossRef Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216.CrossRef
23.
Zurück zum Zitat Clough, J. (2011, March). Data theft? Cybercrime and the increasing criminalization of access to data. In Criminal Law Forum (Vol. 22, No. 1, pp. 145-170). Springer. Clough, J. (2011, March). Data theft? Cybercrime and the increasing criminalization of access to data. In Criminal Law Forum (Vol. 22, No. 1, pp. 145-170). Springer.
24.
Zurück zum Zitat Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Misuse detection for mobile devices using behaviour profiling. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 41–53.CrossRef Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Misuse detection for mobile devices using behaviour profiling. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 41–53.CrossRef
26.
Zurück zum Zitat Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817–885. Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817–885.
27.
Zurück zum Zitat Ganeshkumar, K., Arivazhagan, D., & Sundaram, S. (2013). Strategies of cybercrime: Viruses and security sphere. Journal of Academia and Industrial Research (JAIR), 2(7), 397–401. Ganeshkumar, K., Arivazhagan, D., & Sundaram, S. (2013). Strategies of cybercrime: Viruses and security sphere. Journal of Academia and Industrial Research (JAIR), 2(7), 397–401.
28.
Zurück zum Zitat Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1–36.CrossRef Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1–36.CrossRef
30.
Zurück zum Zitat Sharma, P., Doshi, D., & Prajapati, M. M. (2016, November). Cybercrime: Internal security threat. In 2016 international conference on ICT in business industry & government (ICTBIG) (pp. 1–4). IEEE. Sharma, P., Doshi, D., & Prajapati, M. M. (2016, November). Cybercrime: Internal security threat. In 2016 international conference on ICT in business industry & government (ICTBIG) (pp. 1–4). IEEE.
31.
Zurück zum Zitat Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. UPNE. Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. UPNE.
32.
Zurück zum Zitat Sabillon, R., Cano, J. J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6). Sabillon, R., Cano, J. J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6).
33.
Zurück zum Zitat Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.CrossRef Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.CrossRef
34.
Zurück zum Zitat An, J., & Kim, H. W. (2018). A data analytics approach to the cybercrime underground economy. IEEE Access, 6, 26636–26652.CrossRef An, J., & Kim, H. W. (2018). A data analytics approach to the cybercrime underground economy. IEEE Access, 6, 26636–26652.CrossRef
35.
Zurück zum Zitat Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime. Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime.
36.
Zurück zum Zitat Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE. Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE.
37.
Zurück zum Zitat Director of Public Prosecutions (DPP) v McKeown and Jones [1997] 2 Cr. App. R. 155, HL, at page 163. Director of Public Prosecutions (DPP) v McKeown and Jones [1997] 2 Cr. App. R. 155, HL, at page 163.
39.
Zurück zum Zitat Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199.CrossRef Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199.CrossRef
41.
Zurück zum Zitat Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108–127). Butterworth-Heinemann.CrossRef Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108–127). Butterworth-Heinemann.CrossRef
42.
Zurück zum Zitat Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In Cyber security and threats: Concepts, methodologies, tools, and applications (pp. 608–621). IGI Global. Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In Cyber security and threats: Concepts, methodologies, tools, and applications (pp. 608–621). IGI Global.
43.
44.
Zurück zum Zitat Greer, B. (2017). The growth of cybercrime in the United States. Growth. Greer, B. (2017). The growth of cybercrime in the United States. Growth.
45.
Zurück zum Zitat Tountas, S. W. (2003). Carnivore: Is the regulation of wireless technology a legally viable option to curtail the growth of cybercrime. Wash UJL & Pol’y, 11, 351. Tountas, S. W. (2003). Carnivore: Is the regulation of wireless technology a legally viable option to curtail the growth of cybercrime. Wash UJL & Pol’y, 11, 351.
46.
Zurück zum Zitat Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.CrossRef Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.CrossRef
Metadaten
Titel
Cybersecurity and Cybercrimes
verfasst von
Melissa Lukings
Arash Habibi Lashkari
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-88704-9_3

Premium Partner