Skip to main content

2017 | OriginalPaper | Buchkapitel

Some Criminal Aspects of Cybersecurity

verfasst von : J. Martín Ramírez

Erschienen in: Cyberspace

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

These pages are meant to be a modest step in order to help the prevention and the combat of cybercrime, raising awareness that the birth of the ubiquitous “cyber spectrum” brings with it a parallel presence of plenty of ‘new’ crimes. The cybersecurity ecosystem, besides obvious benefits, also presents new potential specific cybercriminal threats, criminal opportunities, and vulnerabilities, as well as physical and psychological harm to individuals. After describing the cybercrime phenomenon and enumerating the spectrum of it; the importance of cyber-security awareness through public education stressing emerging threats and risks is highlighted in the hope that individual internet users will take basic security precautions. CYBERCRIME IS SILENT VIOLENCE, THEREFORE ME MUST PREVENT CYBERCRIMES!!!

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In March 2015, it became publicly known that Hillary Clinton, during her tenure as United States Secretary of State, had exclusively used her family’s private email server rather than official State Department accounts maintained on federal servers, for thousands of emails that would later be marked classified official communications. On July 5, 2016 the FBI stated that at least Clinton was “extremely careless” in handling her email system (see https://​en.​wikipedia.​org/​wiki/​Hillary_​Clinton_​email_​controversy).
 
2
This can occur, for example, where cloud computing providers store data in multiple copies in data centers in different countries, and make use of dynamic data management between these data centers.
 
3
“If users spent even a minute a day reading URLs to avoid phishing, the cost (in terms of user time) would be two orders of magnitude greater than all phishing losses (Herley 2009)”.
 
Literatur
Zurück zum Zitat Angwin J (2014) Dragnet nation: a quest for privacy, security and freedom in a world of relentless surveillance. Times Books Angwin J (2014) Dragnet nation: a quest for privacy, security and freedom in a world of relentless surveillance. Times Books
Zurück zum Zitat Calderoni F (2010) The European legal framework on cybercrime: striving for an effective implementation. Crime Law Soc Change 54(5):339–357CrossRef Calderoni F (2010) The European legal framework on cybercrime: striving for an effective implementation. Crime Law Soc Change 54(5):339–357CrossRef
Zurück zum Zitat Cayón J, Cortijo B (2016) The dilema security vs. freedom. In: 41st CICA on Mapping the Cyberspace, Nebrija University, Madrid, 1–3 June 2016 Cayón J, Cortijo B (2016) The dilema security vs. freedom. In: 41st CICA on Mapping the Cyberspace, Nebrija University, Madrid, 1–3 June 2016
Zurück zum Zitat Economist (2014) Governments’ relationship with the tech sector is hideously complicated. Econ, 22 Feb 2014 Economist (2014) Governments’ relationship with the tech sector is hideously complicated. Econ, 22 Feb 2014
Zurück zum Zitat Galexia (2011) An overview of international cyber-security awareness raising and educational initiatives. Australian Communications and Media Authority Galexia (2011) An overview of international cyber-security awareness raising and educational initiatives. Australian Communications and Media Authority
Zurück zum Zitat García-Segura LA, Ramírez JM (eds) (2016) Mapping the cyberspace. An emerging priority challenge. Universidad Antonio de Nebrija, Madrid García-Segura LA, Ramírez JM (eds) (2016) Mapping the cyberspace. An emerging priority challenge. Universidad Antonio de Nebrija, Madrid
Zurück zum Zitat Grabosky P, Smith R (1998) Crime in the digital age. Federation Press, Sydney Grabosky P, Smith R (1998) Crime in the digital age. Federation Press, Sydney
Zurück zum Zitat Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. New Security Paradigms Workshop, OxfordCrossRef Herley C (2009) So long, and no thanks for the externalities: the rational rejection of security advice by users. New Security Paradigms Workshop, OxfordCrossRef
Zurück zum Zitat Higgins KJ (2012) Turning tables: ID’ing the hacker behind the keyboard. Dark Read, 2 Oct 2012 Higgins KJ (2012) Turning tables: ID’ing the hacker behind the keyboard. Dark Read, 2 Oct 2012
Zurück zum Zitat International Cyber Security Protection Alliance (ICSPA) (2012) Project 2020. Scenarios for the future of cybercrime—white paper for decision makers. European Cybercrime Centre (EC3), Europol International Cyber Security Protection Alliance (ICSPA) (2012) Project 2020. Scenarios for the future of cybercrime—white paper for decision makers. European Cybercrime Centre (EC3), Europol
Zurück zum Zitat International Telecommunication Union (2011) Understanding cybercrime: a guide for developing countries. Explanatory Report to the Council of Europe Cybercrime Convention, ETS No. 185 International Telecommunication Union (2011) Understanding cybercrime: a guide for developing countries. Explanatory Report to the Council of Europe Cybercrime Convention, ETS No. 185
Zurück zum Zitat Koops B-J (2010) Cybercrime legislation. Electron J Comp Law 14(3) Koops B-J (2010) Cybercrime legislation. Electron J Comp Law 14(3)
Zurück zum Zitat Lucas E (2015) Cyberphobia: identity, trust, security and the Internet. Bloomsbury Lucas E (2015) Cyberphobia: identity, trust, security and the Internet. Bloomsbury
Zurück zum Zitat OECD (2002) Recommendation of the council concerning guidelines for the security of information systems and networks—towards a culture of security, OECD, 25 July 2002 OECD (2002) Recommendation of the council concerning guidelines for the security of information systems and networks—towards a culture of security, OECD, 25 July 2002
Zurück zum Zitat Otero P (2013) Terrorism and organized crime in the Spanish criminal law: reasons for specific punishment and punitive responses. In: Walters TK, Monaghan R, Ramírez JM (eds) Radicalization, terrorism, and conflict. Cambridge Scholars Publishing, Newcastle, pp 104–129 Otero P (2013) Terrorism and organized crime in the Spanish criminal law: reasons for specific punishment and punitive responses. In: Walters TK, Monaghan R, Ramírez JM (eds) Radicalization, terrorism, and conflict. Cambridge Scholars Publishing, Newcastle, pp 104–129
Zurück zum Zitat Pocar F (2004) New challenges for international rules against cyber-crime. Eur J Crim Policy Res 10(1):27–37CrossRef Pocar F (2004) New challenges for international rules against cyber-crime. Eur J Crim Policy Res 10(1):27–37CrossRef
Zurück zum Zitat Ramírez JM (2014) Moving toward peace. In: Ramírez JM, Morrison C, Kendall AJ (eds) Conflict, violence, terrorism, and their prevention. Cambridge Scholars Publishing, Newcastle, pp 191–206 Ramírez JM (2014) Moving toward peace. In: Ramírez JM, Morrison C, Kendall AJ (eds) Conflict, violence, terrorism, and their prevention. Cambridge Scholars Publishing, Newcastle, pp 191–206
Zurück zum Zitat Ramírez JM, Alfaro PJ (2013) Cyberspace and cyber attacks. In: 60th Pugwash conference on science and world affairs on dialogue, disarmament, & regional and global security, Istanbul, Turkey, 1–5 November 2013 Ramírez JM, Alfaro PJ (2013) Cyberspace and cyber attacks. In: 60th Pugwash conference on science and world affairs on dialogue, disarmament, & regional and global security, Istanbul, Turkey, 1–5 November 2013
Zurück zum Zitat Segura-Serrano A (2006) Internet regulation and the role of international law. In: Von Bogdandy A, Wolfrum R (eds) Max Planck Yearbook of United Nations Law 10:191–272 Segura-Serrano A (2006) Internet regulation and the role of international law. In: Von Bogdandy A, Wolfrum R (eds) Max Planck Yearbook of United Nations Law 10:191–272
Zurück zum Zitat Sorkin DE (2001) Technical and legal approaches to unsolicited electronic mail. Univ San Francisco Law Rev 35(2):359–360 Sorkin DE (2001) Technical and legal approaches to unsolicited electronic mail. Univ San Francisco Law Rev 35(2):359–360
Zurück zum Zitat Tejada de la Fuente E (2016) Legislative reform on the fight against cybernetic crimes. In: 41st CICA on Mapping the Cyberspace, Nebrija University, Madrid, 1–3 June 2016 Tejada de la Fuente E (2016) Legislative reform on the fight against cybernetic crimes. In: 41st CICA on Mapping the Cyberspace, Nebrija University, Madrid, 1–3 June 2016
Zurück zum Zitat United Nations (2002) Guidelines for the prevention of crime. Economic and Security Council resolution 2002/13 United Nations (2002) Guidelines for the prevention of crime. Economic and Security Council resolution 2002/13
Zurück zum Zitat United Nations (2003) General assembly resolution 57/239, 31 Jan 2003 United Nations (2003) General assembly resolution 57/239, 31 Jan 2003
Zurück zum Zitat Wall DS (2007) Cybercrime: the transformation of crime in the information age. Polity Press, Cambridge Wall DS (2007) Cybercrime: the transformation of crime in the information age. Polity Press, Cambridge
Metadaten
Titel
Some Criminal Aspects of Cybersecurity
verfasst von
J. Martín Ramírez
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-54975-0_8