Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Megatrends and Grand Challenges of Cybercrime and Cyberterrorism Policy and Research

verfasst von : Bert-Jaap Koops

Erschienen in: Combatting Cybercrime and Cyberterrorism

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

What are grand challenges of cybercrime and cyberterrorism policy and research for the coming one or two decades? To answer this question, we first need to grasp some major trends that influence the future of cybercrime and cyberterrorism, and the combatting thereof, in fundamental ways. This chapter therefore starts with sketching seven megatrends in technology and society: Internet as the infrastructure of everything, autonomic technologies, datafication, the onlife world, the transformation of crime, the fourth generation of cybercrime as attacks on the Internet of Things and People, and the gradual erosion of privacy. Against this background, seven grand challenges for keeping societies secure and inclusive against the threats of CC/CT are presented: underground marketplaces, hiding technologies, ubiquitous data, smart regulation, smart organisation, designing technology, and preserving the human rights framework in a volatile context.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Article 6, Convention of Cybercrime, CETS 185, Budapest 2001; Article 7 Directive 2013/40/EU on attacks against information systems, Official Journal 14 August 2013, L218/8.
 
Literatur
1.
Zurück zum Zitat Ayres, I., Braithwaite, J.: Responsive Regulation: Transcending the Deregulation Debate. Oxford Socio-Legal Studies. Oxford University Press, New York (1992) Ayres, I., Braithwaite, J.: Responsive Regulation: Transcending the Deregulation Debate. Oxford Socio-Legal Studies. Oxford University Press, New York (1992)
2.
Zurück zum Zitat Black, J., Lodge, M., Thatcher, M.: Regulatory Innovation: A Comparative Analysis. Edward Elgar, Cheltenham/Northampton (2005)CrossRef Black, J., Lodge, M., Thatcher, M.: Regulatory Innovation: A Comparative Analysis. Edward Elgar, Cheltenham/Northampton (2005)CrossRef
3.
Zurück zum Zitat Brenner, S.W.: Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press, Oxford/New York (2009)CrossRef Brenner, S.W.: Cyber Threats: The Emerging Fault Lines of the Nation State. Oxford University Press, Oxford/New York (2009)CrossRef
4.
Zurück zum Zitat Brownsword, R.: Rights, Regulation, and the Technological Revolution. Oxford University Press, Oxford/New York (2008)CrossRef Brownsword, R.: Rights, Regulation, and the Technological Revolution. Oxford University Press, Oxford/New York (2008)CrossRef
5.
Zurück zum Zitat Gasson, M.N., Koops, B.J.: Attacking human implants: a new generation of cybercrime. Law Innov. Technol. 5, 248–277 (2013)CrossRef Gasson, M.N., Koops, B.J.: Attacking human implants: a new generation of cybercrime. Law Innov. Technol. 5, 248–277 (2013)CrossRef
7.
Zurück zum Zitat Koops, B.J.: Should ICT regulation be technology-neutral? In: Koops, B.J., et al. (eds.) Starting Points for ICT Regulation, pp. 77–108. T.M.C. Asser Press, The Hague (2006)CrossRef Koops, B.J.: Should ICT regulation be technology-neutral? In: Koops, B.J., et al. (eds.) Starting Points for ICT Regulation, pp. 77–108. T.M.C. Asser Press, The Hague (2006)CrossRef
8.
Zurück zum Zitat Koops, B.J.: Technology and the crime society: rethinking legal protection. Law Innov. Technol. 1, 93–124 (2009) Koops, B.J.: Technology and the crime society: rethinking legal protection. Law Innov. Technol. 1, 93–124 (2009)
9.
Zurück zum Zitat Koops, B.J.: The internet and its opportunities for cybercrime. In: Herzog-Evans, M. (ed.) Transnational Criminol. Manual, vol. 1, pp. 735–754. Wolf Legal Publishers, Nijmegen (2010) Koops, B.J.: The internet and its opportunities for cybercrime. In: Herzog-Evans, M. (ed.) Transnational Criminol. Manual, vol. 1, pp. 735–754. Wolf Legal Publishers, Nijmegen (2010)
10.
Zurück zum Zitat Koops, B.J., Goodwin, M.E.A.: Cyberspace, the Cloud, and Cross-Border Crimi-nal Investigation: The Limits and Possibilities of International Law. WODC/TILT, The Hague/Tilburg (2014) Koops, B.J., Goodwin, M.E.A.: Cyberspace, the Cloud, and Cross-Border Crimi-nal Investigation: The Limits and Possibilities of International Law. WODC/TILT, The Hague/Tilburg (2014)
11.
Zurück zum Zitat Koops, B.J., Leenes, R.E.: Code and the slow erosion of privacy. Mich. Telecommun. Technol. Law Rev. 12, 115–188 (2005) Koops, B.J., Leenes, R.E.: Code and the slow erosion of privacy. Mich. Telecommun. Technol. Law Rev. 12, 115–188 (2005)
12.
Zurück zum Zitat Koops, B.J., Leenes, R.E.: Privacy regulation cannot be hardcoded: a critical comment on the privacy by design provision in data-protection law. Int. Rev. Law, Comput. Technol. 28, 159–171 (2014)CrossRef Koops, B.J., Leenes, R.E.: Privacy regulation cannot be hardcoded: a critical comment on the privacy by design provision in data-protection law. Int. Rev. Law, Comput. Technol. 28, 159–171 (2014)CrossRef
13.
Zurück zum Zitat Naisbitt, J.: Megatrends: Ten New Directions Transforming Our Lives. Warner Books, New York (1982) Naisbitt, J.: Megatrends: Ten New Directions Transforming Our Lives. Warner Books, New York (1982)
14.
Zurück zum Zitat Ratcliffe, J.H.: Intelligence-Led Policing. Willan Publishing, Cullompton (2008) Ratcliffe, J.H.: Intelligence-Led Policing. Willan Publishing, Cullompton (2008)
15.
Zurück zum Zitat Sykes, C.J.: The End of Privacy. St. Martins Press, New York (1999) Sykes, C.J.: The End of Privacy. St. Martins Press, New York (1999)
16.
Zurück zum Zitat Wall, D.S.: Cybercrime. The Transformation of Crime in the Information Age. Polity, Cambridge (2007) Wall, D.S.: Cybercrime. The Transformation of Crime in the Information Age. Polity, Cambridge (2007)
Metadaten
Titel
Megatrends and Grand Challenges of Cybercrime and Cyberterrorism Policy and Research
verfasst von
Bert-Jaap Koops
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-38930-1_1