Skip to main content
Top

2022 | OriginalPaper | Chapter

3. Cybersecurity and Cybercrimes

Authors : Melissa Lukings, Arash Habibi Lashkari

Published in: Understanding Cybersecurity Law and Digital Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cybersecurity law is not simply the application of legal systems to the protection of private data; it also includes using our legal systems to address criminal activity that is conducted using networked technologies—otherwise known as cybercrime. This chapter will outline the types of cybersecurity laws needed to address issues such as interpersonal privacy, criminal copyright infringement, data breaches, network attacks, and other computer-related activities of a criminally malicious nature.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
3
United States Sentencing Guidelines, §3B1.3.
 
4
United States Sentencing Guidelines, §3B1.3, comment. (n.4).
 
5
United States v. Lange, 312 F.3d 263, 270 (seventh Cir. 2002).
 
6
United States v. Campa, 529 F.3d 980, 1017–18 (11th Cir. 2008).
 
7
United States v. O’Brien, 435 F.3d 36, 42 (first Cir. 2006).
 
8
United States v. Kyereme, 371 F. App’x 292, 293–94 (3d Cir. 2010).
 
9
United States v. Lavin, 27 F.3d 40, 41 (2d Cir. 1994).
 
10
United States v. Prochner, 417 F.3d 54, 61 (first Cir. 2005).
 
11
United States v. Petersen, 98 F.3d 502 (ninth Cir. 1996).
 
12
United States v. Reichert, 747 F.3d 445, 454–55 (sixth Cir. 2014).
 
13
United States v. Lee, 296 F.3d 792, 797–99 (ninth Cir. 2002).
 
14
United States v. Godman, 223 F.3d 320, 322–23 (sixth Cir. 2000).
 
15
States v. Lord, 915 F.3d 1009, 1024–25 (fifth Cir. 2019).
 
16
Seriously. Read it again. These vaccines are safe, effective, and should absolutely be taken if given the opportunity.
 
Literature
2.
go back to reference Ram, C. (2016). Jonathan Clough, Principles of Cybercrime, (Cambridge: Cambridge University Press, 2015). Canadian Journal of Law and Technology, 14(1). Ram, C. (2016). Jonathan Clough, Principles of Cybercrime, (Cambridge: Cambridge University Press, 2015). Canadian Journal of Law and Technology, 14(1).
3.
go back to reference Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381–395.CrossRef Jamieson, R., Land, L. P. W., Winchester, D., Stephens, G., Steel, A., Maurushat, A., & Sarre, R. (2012). Addressing identity crime in crime management information systems: Definitions, classification, and empirics. Computer Law & Security Review, 28(4), 381–395.CrossRef
4.
go back to reference Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.CrossRef Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook (pp. 149–164). Syngress.CrossRef
5.
go back to reference Urbas, G. (2015). Cybercrime legislation, cases and commentary. LexisNexis Butterworths. Urbas, G. (2015). Cybercrime legislation, cases and commentary. LexisNexis Butterworths.
6.
go back to reference Criminal Code of Canada (RSC, 1985, c C-46), s 162.1(2). Criminal Code of Canada (RSC, 1985, c C-46), s 162.1(2).
7.
go back to reference Aikenhead, M. (2018). A reasonable expectation of sexual privacy in the digital age. Dalhousie LJ, 41, 273. Aikenhead, M. (2018). A reasonable expectation of sexual privacy in the digital age. Dalhousie LJ, 41, 273.
8.
go back to reference Popham, J., McCluskey, M., Ouellet, M., & Gallupe, O. (2020). Exploring police-reported cybercrime in Canada: Variation and correlates. Policing: An International Journal. Popham, J., McCluskey, M., Ouellet, M., & Gallupe, O. (2020). Exploring police-reported cybercrime in Canada: Variation and correlates. Policing: An International Journal.
9.
go back to reference Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In Handbook on crime and deviance (pp. 459–475). Springer.CrossRef Marcum, C. D., & Higgins, G. E. (2019). Cybercrime. In Handbook on crime and deviance (pp. 459–475). Springer.CrossRef
10.
go back to reference Loader, B. D., & Thomas, D. (Eds.). (2013). Cybercrime: Security and surveillance in the information age. Routledge.CrossRef Loader, B. D., & Thomas, D. (Eds.). (2013). Cybercrime: Security and surveillance in the information age. Routledge.CrossRef
11.
go back to reference Briandana, R., Oktavianingtyas, I., & Marta, R. F. (2020). Cybercrime in online dating site: Pornography business in the virtual world. Briandana, R., Oktavianingtyas, I., & Marta, R. F. (2020). Cybercrime in online dating site: Pornography business in the virtual world.
12.
go back to reference Al-Garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, 433–443.CrossRef Al-Garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, 433–443.CrossRef
13.
go back to reference Buono, L. (2014, June). Fighting cybercrime through prevention, outreach and awareness raising. In ERA Forum (Vol. 15, No. 1, pp. 1-8). Springer . Buono, L. (2014, June). Fighting cybercrime through prevention, outreach and awareness raising. In ERA Forum (Vol. 15, No. 1, pp. 1-8). Springer .
14.
go back to reference Aiken, M., Mc Mahon, C., Haughton, C., O’Neill, L., & O’Carroll, E. (2016). A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online. Contemporary Social Science, 11(4), 373–391.CrossRef Aiken, M., Mc Mahon, C., Haughton, C., O’Neill, L., & O’Carroll, E. (2016). A consideration of the social impact of cybercrime: Examples from hacking, piracy, and child abuse material online. Contemporary Social Science, 11(4), 373–391.CrossRef
15.
go back to reference Lee, H. E., Ermakova, T., Ververis, V., & Fabian, B. (2020). Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation, 34, 301022. Lee, H. E., Ermakova, T., Ververis, V., & Fabian, B. (2020). Detecting child sexual abuse material: A comprehensive survey. Forensic Science International: Digital Investigation, 34, 301022.
16.
go back to reference Aiken, M., Moran, M., & Berry, M. J. (2011, September). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. In 29th meeting of the INTERPOL Specialist Group on Crimes against Children, Lyons, France, September (pp. 5–7). Aiken, M., Moran, M., & Berry, M. J. (2011, September). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. In 29th meeting of the INTERPOL Specialist Group on Crimes against Children, Lyons, France, September (pp. 5–7).
17.
go back to reference ECPAT International. (2018, April). Trends in online child sexual abuse material. ECPAT International. ECPAT International. (2018, April). Trends in online child sexual abuse material. ECPAT International.
19.
go back to reference Attorney General Eric Holder Jr. Speaks at the National Strategy Conference on Combating Child Exploitation in San Jose, California, May 19, 2011. Attorney General Eric Holder Jr. Speaks at the National Strategy Conference on Combating Child Exploitation in San Jose, California, May 19, 2011.
21.
go back to reference Moise, A. C. (2017). The legal regulation of cybercrime in the United States of America legislation. Journal of Advanced Research in Law and Economics (JARLE), 8(27), 1576–1578. Moise, A. C. (2017). The legal regulation of cybercrime in the United States of America legislation. Journal of Advanced Research in Law and Economics (JARLE), 8(27), 1576–1578.
22.
go back to reference Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216.CrossRef Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216.CrossRef
23.
go back to reference Clough, J. (2011, March). Data theft? Cybercrime and the increasing criminalization of access to data. In Criminal Law Forum (Vol. 22, No. 1, pp. 145-170). Springer. Clough, J. (2011, March). Data theft? Cybercrime and the increasing criminalization of access to data. In Criminal Law Forum (Vol. 22, No. 1, pp. 145-170). Springer.
24.
go back to reference Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Misuse detection for mobile devices using behaviour profiling. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 41–53.CrossRef Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Misuse detection for mobile devices using behaviour profiling. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 41–53.CrossRef
26.
go back to reference Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817–885. Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817–885.
27.
go back to reference Ganeshkumar, K., Arivazhagan, D., & Sundaram, S. (2013). Strategies of cybercrime: Viruses and security sphere. Journal of Academia and Industrial Research (JAIR), 2(7), 397–401. Ganeshkumar, K., Arivazhagan, D., & Sundaram, S. (2013). Strategies of cybercrime: Viruses and security sphere. Journal of Academia and Industrial Research (JAIR), 2(7), 397–401.
28.
go back to reference Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1–36.CrossRef Huang, K., Siegel, M., & Madnick, S. (2018). Systematically understanding the cyber attack business: A survey. ACM Computing Surveys (CSUR), 51(4), 1–36.CrossRef
30.
go back to reference Sharma, P., Doshi, D., & Prajapati, M. M. (2016, November). Cybercrime: Internal security threat. In 2016 international conference on ICT in business industry & government (ICTBIG) (pp. 1–4). IEEE. Sharma, P., Doshi, D., & Prajapati, M. M. (2016, November). Cybercrime: Internal security threat. In 2016 international conference on ICT in business industry & government (ICTBIG) (pp. 1–4). IEEE.
31.
go back to reference Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. UPNE. Brenner, S. W. (2012). Cybercrime and the law: Challenges, issues, and outcomes. UPNE.
32.
go back to reference Sabillon, R., Cano, J. J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6). Sabillon, R., Cano, J. J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6).
33.
go back to reference Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.CrossRef Provos, N., Rajab, M. A., & Mavrommatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. Communications of the ACM, 52(4), 42–47.CrossRef
34.
go back to reference An, J., & Kim, H. W. (2018). A data analytics approach to the cybercrime underground economy. IEEE Access, 6, 26636–26652.CrossRef An, J., & Kim, H. W. (2018). A data analytics approach to the cybercrime underground economy. IEEE Access, 6, 26636–26652.CrossRef
35.
go back to reference Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime. Smith, G. S. (2015). Management models for international cybercrime. Journal of Financial Crime.
36.
go back to reference Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE. Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., & Reich, C. (2015, April). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE.
37.
go back to reference Director of Public Prosecutions (DPP) v McKeown and Jones [1997] 2 Cr. App. R. 155, HL, at page 163. Director of Public Prosecutions (DPP) v McKeown and Jones [1997] 2 Cr. App. R. 155, HL, at page 163.
39.
go back to reference Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199.CrossRef Marsili, M. (2019). The war on cyberterrorism. Democracy and Security, 15(2), 172–199.CrossRef
41.
go back to reference Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108–127). Butterworth-Heinemann.CrossRef Brewster, B., Kemp, B., Galehbakhtiari, S., & Akhgar, B. (2015). Cybercrime: attack motivations and implications for big data and national security. In Application of big data for national security (pp. 108–127). Butterworth-Heinemann.CrossRef
42.
go back to reference Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In Cyber security and threats: Concepts, methodologies, tools, and applications (pp. 608–621). IGI Global. Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In Cyber security and threats: Concepts, methodologies, tools, and applications (pp. 608–621). IGI Global.
43.
44.
go back to reference Greer, B. (2017). The growth of cybercrime in the United States. Growth. Greer, B. (2017). The growth of cybercrime in the United States. Growth.
45.
go back to reference Tountas, S. W. (2003). Carnivore: Is the regulation of wireless technology a legally viable option to curtail the growth of cybercrime. Wash UJL & Pol’y, 11, 351. Tountas, S. W. (2003). Carnivore: Is the regulation of wireless technology a legally viable option to curtail the growth of cybercrime. Wash UJL & Pol’y, 11, 351.
46.
go back to reference Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.CrossRef Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.CrossRef
Metadata
Title
Cybersecurity and Cybercrimes
Authors
Melissa Lukings
Arash Habibi Lashkari
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-88704-9_3

Premium Partner