152 Hits in 5.7 sec

Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime [article]

Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini
2022 arXiv   pre-print
against cybercrime.  ...  To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime.  ...  Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J. Murdoch is supported by The Royal Society under grant UF160505.  ... 
arXiv:1910.06380v2 fatcat:2jklb4lzmfd6bo7bdftef2v6am

Data Protection and the Prevention of Cybercrime - The EU as an Area of Security?

Maria Grazia Porcedda
2012 Social Science Research Network  
cybercrime or off-line crimes), and novel crimes possible only in the online environment (narrow cybercrime or online crimes) -and on original interpretations as far as the relationship between cybercrime  ...  Cybercrime and cyber-security are attracting increasing attention, both for the relevance of Critical Information Infrastructure to the national economy and security, and the interplay of the policies  ...  to the web 2.0 (i.e. social networks).  ... 
doi:10.2139/ssrn.2169340 fatcat:delhfmf3vrh6nb25mcgvyqmney

Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity

Mieke Eoyang, Chimène Keitner
2020 Social Science Research Network  
This, in turn, can lead to concerns about escalation.  ...  BROOKING, LIKEWAR: THE WEAPONIZATION OF SOCIAL MEDIA (2018); FRED KAPLAN, DARK TERRITORY: THE SECRET HISTORY OF CYBERWAR (reprint edn., 2017); RICHARD A. CLARKE & ROBERT K.  ...  imposition of criminal or civil penalties as a form of "legal strike back." 60 As Jensen emphasizes, however, "legal strike back can only be an effective means of deterrence when states work together  ... 
doi:10.2139/ssrn.3599588 fatcat:y3kkjipuo5cnnfsxaxj2ac5kne

Cybercrime and Punishment: Security, Information War, and the Future of Runet [chapter]

Elizaveta Gaufman
2020 The Palgrave Handbook of Digital Russia Studies  
AbstractCybersecurity à la Russe is marked by the authoritarian nature of the state that is primarily concerned by the question of regime survival.  ...  This chapter aims to show the discrepancies in Russian cyber politics at home and abroad, highlighting its struggle for more internet regulation that is seen by the Russian government as a panacea against  ...  2.0.  ... 
doi:10.1007/978-3-030-42855-6_7 fatcat:pou5b3e7izaibk6m7ll2dbesya

The Past, Present, and Future of Online Child Sexual Exploitation: Summarizing the Evolution of Production, Distribution, and Detection [chapter]

Bryce Garreth Westlake
2019 The Palgrave Handbook of International Cybercrime and Cyberdeviance  
For example, in February 2017, anonymous hacked Freedom Hosting II, removing a reported 11,000 Dark Web child sexual exploitation websites, accounting for an estimated 20% of CSEM being hosted on the Dark  ...  Despite the growth in P2P networks and Dark Web websites, the Surface Web has always been a popular locale for CSEM.  ... 
doi:10.1007/978-3-319-90307-1_52-1 fatcat:mrqlwjsrh5eejbdgheovoqjc2y

July 2020: TOP Must Read Article in Computer Science & Information Technology Research

Ananya Dey
2020 Zenodo  
The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form.  ...  The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.  ...  Mavrommatis, "Cybercrime 2.0: When the Cloud Turns Dark," ACM Communications, Vol. 52, No. 4, pp. 42-47, 2009. 27. S. S.  ... 
doi:10.5281/zenodo.3982490 fatcat:zijiz3dqgjf2xctfjzeworabpy

Top Download Article in Computer Science & Information Technology Research: October 2020

Te-Shun Chou
2020 Zenodo  
In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models.  ...  In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud.  ...  Mavrommatis, "Cybercrime 2.0: When the Cloud Turns Dark," ACM Communications, Vol. 52, No. 4, pp. 42-47, 2009. 27. S. S.  ... 
doi:10.5281/zenodo.4146715 fatcat:ch4opwwwcbdrhlkw3zlvt4oy7m

Top Cited Article in Informatics Engineering Research: October 2020

Shailaja A Patil
2020 Zenodo  
The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on the human use of computing fields such as communication, mathematics, multimedia, and  ...  Due to the growth in IT, individuals and organizations increasingly process information digitally.  ...  Mavrommatis, "Cybercrime 2.0: When the Cloud Turns Dark," ACM Communications, Vol. 52, No. 4, pp. 42-47, 2009. 27. S. S.  ... 
doi:10.5281/zenodo.4269782 fatcat:ml2o2bq4t5eb7pi3cdi6fjc36y

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos
2019 2019 IEEE World Congress on Services (SERVICES)  
web, and hacker forums/marketplaces in the dark web.  ...  The clear, social, and dark web have lately been identified as rich sources of valuable cyber-security information that -given the appropriate tools and methods-may be identified, crawled and subsequently  ...  Web 2.0.  ... 
doi:10.1109/services.2019.00016 dblp:conf/services/KoloveasCTS19 fatcat:ctmqpalahfezvoh3qfarkd3ka4

Top 20 Cited Article in Computer Science & Information Technology

2021 Zenodo  
The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form.  ...  The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems.  ...  Mavrommatis, "Cybercrime 2.0: When the Cloud Turns Dark," ACM Communications, Vol. 52, No. 4, pp. 42-47, 2009. 27. S. S.  ... 
doi:10.5281/zenodo.4671310 fatcat:l5zxwftzlndttln6j4pnrlpsqq

Digital Forensic Analysis [chapter]

2016 Policing Digital Crime  
These are all potentially available to anyone through the dark web (see Chapter 10).  ...  , p. 130 ) and as a nation of 'super-hackers' responsible for sophisticated cyber-attacks (ibid.), with Russian hackers presented as talented highly educated individuals forced to turn to cybercrime to  ... 
doi:10.4324/9781315601083-14 fatcat:dfcfbcyqfjdkphuarpuks7qxjq

The economic functioning of online drugs markets

V. Bhaskar, Robin Linacre, Stephen Machin
2017 Journal of Economic Behavior and Organization  
The impact of the well-known seizure by law enforcement of the original Silk Road and the shutdown of Silk Road 2.0 are also studied, together with the exit scam of the market leader at the time, Evolution  ...  The economic functioning of online drug markets using data scraped from online platforms is studied.  ...  The research is not linked to any of his work for either the Sentencing Council or the Ministry of Justice. The opinions  ... 
doi:10.1016/j.jebo.2017.07.022 fatcat:7zxd3vde6rc7zni5cgr3e5peta

Exploring Lawful Hacking as a Possible Answer to the "Going Dark" Debate

Carlos Liguori
2020 Michigan Technology Law Review  
answers to the "going dark" debate.  ...  The debate on government access to encrypted data, popularly known as the "going dark" debate, has intensified over the years.  ...  . & PRAC. 154 (2015) (for ethics and data protection); Christopher Soghoian, Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era, 8 J. ON TELECOMM. & HIGH TECH.  ... 
doi:10.36645/mtlr.26.2.exploring fatcat:ec53defnc5bjbierxzq2amkffa

'They're all about pushing the products and shiny things rather than fundamental security':Mapping socio-technical challenges in securing the smart home

Jiahong Chen, Lachlan Urquhart
2021 Information & communications technology law  
In addition to the current data protection and network security legal frameworks, for example, the UK government has initiated the 'Secure by Design' campaign.  ...  In this paper we further discuss the policymaking implications of these findings and make some recommendations.  ...  Acknowledgements This work was supported by the Engineering and Physical Sciences Research Council [grant numbers EP/R03351X/1, EP/M02315X/1, EP/T022493/1].  ... 
doi:10.1080/13600834.2021.1957193 fatcat:czq343d4irgrhnhq5tjnlzgnei

Friending Brandeis: Privacy and Government Surveillance in the Era of Social Media

Elizabeth Gaffin
2012 Social Science Research Network  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining  ...  WEB 2.0 TECHNOLOGIES: AN ENGINE FOR CHANGE, GOOD AND BAD instituted the "Dark Web" project.  ... 
doi:10.2139/ssrn.2049013 fatcat:b2bunk2sjbebna7hcl73otk65y
« Previous Showing results 1 — 15 out of 152 results