Research Article
BibTex RIS Cite

BİRLEŞİK KRALLIKTA SİBER EKONOMİK SUÇLARA YÖNELİK KOLLUK FAALİYETLERİ SORUNLARININ İNCELENMESİ

Year 2020, International Security Congress Special Issue, 113 - 134, 28.02.2020
https://doi.org/10.28956/gbd.695956

Abstract

Artan siber tehditler nedeniyle siber suçlar pek çok ülke tarafından ‘Birinci Öncelikli’ ulusal güvenlik riski olarak nitelendirilmektedir. Bu ciddi riske tepki olarak hükümetler siber suçların önlenmesi programlarına ciddi yatırımlar yapmaktadır. Internetin ağlarla birbirine bağlı küresel karakterinin siber suçların kolluğuna ciddi zorluklar yaratması nedeniyle, siber suçlarla etkin mücadele için uzmanlığa ve teknik yeteneklere ihtiyaç duyulduğu aşikârdır. Siber suçların kolluğu hakkındaki önceki bilimsel araştırmalar yerel polisin uzmanlık eksikliğinin olduğunu ve bunun siber suçlarla mücadeleyi sekteye uğrattığını ortaya koymaktadır. Kolluk kuvvetleri siber suçlarla mücadele kapasitelerini arttırmak kapsamında uzman siber suçlarla mücadele birimlerini ihdas etmeye devam etmektedir. Fakat literatürde siber ekonomik suçlarla mücadele eden uzman birimlerin karşılaştığı sorunları uzman kolluk kuvvetlerinin gözünden ortaya koyan çalışma sayısının az olması dikkat çekicidir. Literatürdeki bu bilgi açığını gidermek maksadıyla Birleşik Krallık siber suçlarla mücadele birimlerinde görevli uzman polis memurları ile icra edilen yarı yapılandırılmış mülakatlardan elde edilen veriler tematik analiz yöntemi ile analiz edilmiştir.
Uluslararası işbirliği eksikliği, suç olaylarının kolluğa yeterince bildirilmemesi ve mağdurların siber suçlar farkındalık eksikliği en önemli sonuçlar olarak ortaya çıkmıştır. Özel firmaların siber ekonomik suçların kovuşturulmasına katılımı konusunda ise polis memurlarının etik kaygılar nedeniyle çekimser oldukları görülmüştür. Siber suçlarla mücadelede kamu-özel sektör işbirliğinin siber suçlarla mücadelenin etkinliğini arttıracak önemli bir çözüm olduğu değerlendirilmektedir. Avrupa Birliği (AB)’nin Ağ ve Bilgi Güvenliği Ajansı (ENISA)’nı yeniden yapılandıran yeni siber güvenlik yasası (Regulation 2019/881) siber suçlarla mücadelede kamu-özel sektör işbirliği kapsamda atılmış önemli bir adımdır. Fakat çalışmamızın sonuçları siber güvenliğin dünya çapında sağlanması için bu inisiyatifin AB üyesi olmayan ülkeleri de kapsaması gerekliliğini ortaya koymaktadır.

References

  • Akhgar, B., Choras, M., Brewster, B., Bosco, F., Veermeersch, E., Luda, V., Puchalski, D., and Wells, D. (2016) 'Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism', pp. 295-322 in B. Akhgar and B. Brewster (eds) Combatting cybercrime and cyberterrorism: challenges, trends and priorities: Springer.
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., and Savage, S. (2013) 'Measuring the Cost of Cybercrime', pp. 265-300 in The economics of information security and privacy: Springer.
  • Barthelemy, J. (2003) 'The seven deadly sins of outsourcing', Academy of Management Perspectives 17(2): 87-98.
  • Bayley, D. H., and Shearing, C. D. (1996) 'The future of policing', Law Society Review 30: 585.
  • BBC (2019) UK cyber-crime victims lose £190,000 a day. Available at: https://www.bbc.co.uk/news/uk-47016671 (Accessed: 14/09/2019.
  • Blanco Hache, A. C., and Ryder, N. (2011) '’Tis The Season to (be Jolly?) Wise-Up to Online Fraudsters. Criminals on The Web Lurking to Scam Shoppers this Christmas: A Critical Analysis of the United Kingdom's Legislative Provisions and Policies to Tackle Online Fraud', Information & Communications Technology Law 20(1): 35-56.
  • Boes, S., and Leukfeldt, E. R. (2017) 'Fighting Cybercrime: A Joint Effort' in R. M. Clark and S. Hakim (eds) Cyber-physical security: protecting critical infrastructure at the state and local level: Springer.
  • Bond, E., and Tyrrell, K. (2018) 'Understanding revenge pornography: A national survey of police officers and staff in England and Wales', Journal of interpersonal violence: 0886260518760011.
  • Bossler, A. M., and Holt, T. J. (2012) 'Patrol officers' perceived role in responding to cybercrime', Policing: an international journal of police strategies & management 35(1): 165-181.
  • Braun, V., and Clarke, V. (2006) 'Using thematic analysis in psychology', Qualitative research in psychology 3(2): 77-101.
  • Brenner, S. W. (2001) 'Is There Such a Thing as' Virtual Crime'?'.
  • ---. (2004) 'Cybercrime Metrics: Old Wine, New Bottles?', VA. JL & TECH. 9: 13.
  • ---. (2007) 'The Council of Europe’s Convention on Cybercrime', pp. 207-221 in J. Balkin, J. Grimmelmann, E. Katz, N. Kozlovski, S. Wagman and T. Zarsky (eds) Cybercrime: digital cops in a networked environment: NYU Press.
  • Brenner, S. W. (2010) Cybercrime: Criminal Threats from Cyberspace: USA: Prager.
  • Button, M. (2019) Private policing: Routledge.
  • Casey, E. (2011) 'Language of Computer Crime Investigation', pp. 35-48 in E. Casey (ed.), Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. London: Elsevier.
  • Clough, J. (2014) 'A World of Difference: The Budapest Convention of Cybercrime and the Challenges of Harmonisation', Monash UL Rev. 40: 698.
  • Dolliver, D. S., and Poorman, K. (2018) 'Understanding Cybercrime', pp. 139-160 in P. L. Reichel and R. Randa (eds) Transnational Crime and Global Security [2 volumes]: ABC-CLIO.
  • Ellis, R., and Mohan, V. (2019) Rewired: Cybersecurity Governance: John Wiley & Sons.
  • European Commission (2007) Towards a General Policy on the Fight Against Cyber Crime Available at: https://eur-lex.europa.eu/LexUriServ/ LexUriServ. do?uri= COM:2007:0267:FIN:EN:PDF.
  • --- (2019) The EU cybersecurity certification framework. Available at: https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-certification-framework (Accessed: 17/08/2019.
  • Finn, B. M. (2019) 'Recommendations for a hybridized public private law enforcement approach'.
  • Garland, D. (1996) 'THE LIMITS OF THE SOVEREIGN STATEStrategies of Crime Control in Contemporary Society', The British journal of criminology 36(4): 445-471.
  • Gercke, M. (2012) Understanding Cybercrimes: Phenomena, Challenges and Legal Response: International Telecommunication Union.
  • Gordon, S., and Ford, R. (2006) 'On the Definition and Classification of Cybercrime', Journal in Computer Virology 2(1): 13-20.
  • Grabosky, P., and Smith, R. (2001) 'Telecommunications Fraud in the Digital Age: the Convergence of Technologies', pp. 23-43 in D. Wall (ed.), Crime and the Internet. London: Routledge.
  • Grabosky, P. N. (2001) 'Virtual criminality: Old wine in new bottles?', Social & Legal Studies 10(2): 243-249.
  • Graham, L. (2017) Cybercrime costs the global economy $450 billion: CEO. Available at: https://www.cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo.html (Accessed: 06/08/2019 2019).
  • Hadlington, L., Lumsden, K., Black, A., and Ferra, F. (2018) 'A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime', Policing: A Journal of Policy and Practice.
  • Hayes, N. (1997) 'Theory-led thematic analysis: Social identification in small companies'.
  • Holt, T. J., Bossler, A. M., and Fitzgerald, S. (2010) 'Examining state and local law enforcement perceptions of computer crime', Crime on-line: Correlates, causes, and context: 221-246.
  • Holt, T. J., Burruss, G. W., and Bossler, A. M. (2018) 'An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents', Policing and Society: 1-16.
  • Holt, T. J., Lee, J. R., Liggett, R., Holt, K. M., and Bossler, A. (2019) 'Examining perceptions of online harassment among constables in England and Wales', International Journal of Cybersecurity Intelligence & Cybercrime 2(1): 24-39.
  • Home Office (2014) The Serious and Organised Crime Strategy, London.
  • --- (2018) CONTEST: The United Kingdom’s Strategy for Countering Terrorism, London.
  • James, J. I., and Gladyshev, P. (2015) A Survey of International Cooperation in Digital Investigations, International Conference on Digital Forensics and Cyber Crime (pp. 103-114): Springer.
  • Joh, E. E. (2019) 'Policing the smart city', International Journal of Law in Context 15(2): 177-182.
  • Koops, B.-J. (2010) 'The internet and its opportunities for cybercrime'.
  • Kshetri, N. (2010a) 'The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures', pp. 1-34 in The Global Cybercrime Industry: Springer.
  • ---. (2010b) 'Structure of Cybercrime in Developing Economies', pp. 165-188 in The Global Cybercrime Industry: Springer.
  • ---. (2013) 'Cybercrime and cyber-security issues associated with China: some economic and institutional considerations', Electronic Commerce Research 13(1): 41-69.
  • Lam, P. T. (2019) 'Public–Private Partnerships for Fire, Police, and Ambulance Services', pp. 153-165 in Public Private Partnerships: Springer.
  • Lee, J. R., Holt, T. J., Burruss, G. W., and Bossler, A. M. (2019) 'Examining English and Welsh Detectives’ Views of Online Crime', International Criminal Justice Review: 1057567719846224.
  • Levi, M., Doig, A., Gundur, R., Wall, D., and Williams, M. L. (2015) The Implications of Economic Cybercrime for Policing: City of London Corporation. Available at: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf. (Accessed: 11 June 2017).
  • Maguire, M., and Delahunt, B. (2017) 'Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars', AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education 9(3).
  • Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., and Ignatuschtschenko, E. (2013) 'Comprehensive Study on Cybercrime', United Nations Office on Drugs and Crime, Tech. Rep.
  • Nouh, M., Nurse, J. R., Webb, H., and Goldsmith, M. (2019) 'Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement', arXiv preprint arXiv:1902.06961.
  • Pathak, P. (2016) 'The Review of Terms and Concepts Used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals', International Journal of Advanced Research in Computer Science 7(1).
  • Petee, T. A., Corzine, J., Huff-Corzine, L., Clifford, J., and Weaver, G. (2010) 'Defining” Cyber-crime”: Issues in Determining the Nature and Scope of Computer-related Offenses,”', Futures Working Group 5: 6-11.
  • Reinhart, R. J. (2018) One in Four Americans Have Experienced Cybercrime. Available at: https://news.gallup.com/poll/245336/one-four-americans-experienced-cybercrime.aspx (Accessed: 08/09/2019.
  • Ruddell, R., Thomas, M. O., and Patten, R. (2011) 'Examining the roles of the police and private security officers in urban social control', International Journal of Police Science & Management 13(1): 54-69.
  • Sandywell, B. (2013) 'On the Globalisation of Crime: the Internet and New Criminality', pp. 56-84 in Handbook of internet crime: Willan. Summerville, A. (2017) Protect against the fastest-growing crime: cyber attacks. Available at: https://www.cnbc.com/2017/07/25/stay-protected-from-the-uss-fastest-growing-crime-cyber-attacks.html (Accessed: 06/08/2019 2019).
  • Taylor, G. (2002) 'The Council of Europe Cybercrime Convention a Civil Liberties Perspective', Retrieved June 13: 2006.
  • The Council of Europe Convention on Cybercrime. (2001) Convention on Cybercrime. In T. C. o. Europe (Ed.). Budapest: European Treaty Series - No. 185.
  • Thomas, D., and Loader, B. (2000) 'Cybercrime: Law Enforcement, Security and Surveillance in the Information Age' in D. Thomas and B. Loader (eds) Cybercrime: Law enforcement, security and surveillance in the information age. London: Routledge.
  • UN Congress. (2000) Crimes Related to Computer Networks, 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Vienna: United Nations.
  • UN Manual (1994) United Nations Manual on the Prevention and Control of Computer-Related Crime. Available at: http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide.pdf (Accessed: 21/03/2017).
  • Wall, D. S. (2005) 'Digital Realism and the Governance of Spam as Cybercrime', European journal on criminal policy and research 10(4): 309-335.
  • ---. (2007a) Cybercrime: The transformation of crime in the information age: Polity.
  • ---. (2007b) Cybercrime: The Transformation of Crime in the Information Age: Cambridge: Polity Press.
  • ---. (2008) 'Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime', International Review of Law, Computers & Technology 22(1-2): 45-63.
  • ---. (2010) 'Policing Cybercrimes: Situating the Public Police in Networks of Security Within Cyberspace (Revised May 2010)', Police Practice and Research 8(2): 183-205.
  • ---. (2013a) 'Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’', pp. 106-121 in Handbook of Internet Crime: Willan.
  • ---. (2013b) 'Policing Identity Crimes', pp. 29-52 in D. S. Wall and M. L. Williams (eds) Policing cybercrime: networked and social media technologies and the challenges for policing: Taylor & Francis.
  • Wall, D. S., and Williams, M. (2014) Policing cybercrime: networked and social media technologies and the challenges for policing: Routledge.
  • Williams, M., and Levi, M. (2015) 'Perceptions of the ecrime Controllers: Modelling the Influence of Cooperation and Data Source Factors', Security Journal 28(3): 252-271.
  • World Medical Association. (2001) 'World Medical Association Declaration of Helsinki. Ethical principles for medical research involving human subjects', Bulletin of the World Health Organization 79(4): 373.
  • Yar, M. (2005) 'The Novelty of 'Cybercrime’ an Assessment in Light of Routine Activity Theory', European Journal of Criminology 2(4): 407-427.
  • ---. (2013a) Cybercrime and Society: Sage.
  • ---. (2013b) 'The Private Policing of Internet Crime' in Y. Jewkes and M. Yar (eds) Handbook of Internet crime: Routledge.

EXAMINING THE CHALLENGES OF POLICING ECONOMIC CYBERCRIME IN THE UK

Year 2020, International Security Congress Special Issue, 113 - 134, 28.02.2020
https://doi.org/10.28956/gbd.695956

Abstract

Cybercrime has received the ‘Tier One’ national security risk status in many countries due to the increased cyber threats. In response to this severe threat, governments have announced a substantial amount of investment in cybercrime prevention programmes. It is evident that tackling cybercrime requires expertise and cybersecurity skills as the networked global nature of the Internet pose significant challenges to policing cybercrime. Previous policing cybercrime studies illustrated that local police officers lack the technical skills, which obviously hampered the fight against cybercrime. Police forces continue enhancing their ability to tackle cybercrime through specialised cybercrime units. Nevertheless, there is a dearth of empirical research examining policing problems of economic cybercrime through the lenses of expert police officers working in cybercrime departments. This empirical research addresses this knowledge gap in the literature. A thematic analysis method was employed to analyse semi-structured interviews conducted with expert police officers working at cybercrime departments in the United Kingdom.
Lack of international cooperation, underreporting of economic cybercrime incidents and lack of victim awareness emerged as key challenges. Police officers’ views regarding private sector involvement in policing economic cybercrime appear to be tentative due to ethical concerns. Public-private partnership in combatting cybercrime appears to be an effective solution to enhance the effectiveness of combatting cybercrime. European Union (EU)’s new Cybersecurity Act (Regulation 2019/881), which restructures the European Union Agency for Network and Information Security (ENISA) is the latest example of public-private partnership in combatting cybercrime. However, the results of this study suggest that the scope of this initiative should be extended to non-EU countries to maintain global cybersecurity.

References

  • Akhgar, B., Choras, M., Brewster, B., Bosco, F., Veermeersch, E., Luda, V., Puchalski, D., and Wells, D. (2016) 'Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism', pp. 295-322 in B. Akhgar and B. Brewster (eds) Combatting cybercrime and cyberterrorism: challenges, trends and priorities: Springer.
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., and Savage, S. (2013) 'Measuring the Cost of Cybercrime', pp. 265-300 in The economics of information security and privacy: Springer.
  • Barthelemy, J. (2003) 'The seven deadly sins of outsourcing', Academy of Management Perspectives 17(2): 87-98.
  • Bayley, D. H., and Shearing, C. D. (1996) 'The future of policing', Law Society Review 30: 585.
  • BBC (2019) UK cyber-crime victims lose £190,000 a day. Available at: https://www.bbc.co.uk/news/uk-47016671 (Accessed: 14/09/2019.
  • Blanco Hache, A. C., and Ryder, N. (2011) '’Tis The Season to (be Jolly?) Wise-Up to Online Fraudsters. Criminals on The Web Lurking to Scam Shoppers this Christmas: A Critical Analysis of the United Kingdom's Legislative Provisions and Policies to Tackle Online Fraud', Information & Communications Technology Law 20(1): 35-56.
  • Boes, S., and Leukfeldt, E. R. (2017) 'Fighting Cybercrime: A Joint Effort' in R. M. Clark and S. Hakim (eds) Cyber-physical security: protecting critical infrastructure at the state and local level: Springer.
  • Bond, E., and Tyrrell, K. (2018) 'Understanding revenge pornography: A national survey of police officers and staff in England and Wales', Journal of interpersonal violence: 0886260518760011.
  • Bossler, A. M., and Holt, T. J. (2012) 'Patrol officers' perceived role in responding to cybercrime', Policing: an international journal of police strategies & management 35(1): 165-181.
  • Braun, V., and Clarke, V. (2006) 'Using thematic analysis in psychology', Qualitative research in psychology 3(2): 77-101.
  • Brenner, S. W. (2001) 'Is There Such a Thing as' Virtual Crime'?'.
  • ---. (2004) 'Cybercrime Metrics: Old Wine, New Bottles?', VA. JL & TECH. 9: 13.
  • ---. (2007) 'The Council of Europe’s Convention on Cybercrime', pp. 207-221 in J. Balkin, J. Grimmelmann, E. Katz, N. Kozlovski, S. Wagman and T. Zarsky (eds) Cybercrime: digital cops in a networked environment: NYU Press.
  • Brenner, S. W. (2010) Cybercrime: Criminal Threats from Cyberspace: USA: Prager.
  • Button, M. (2019) Private policing: Routledge.
  • Casey, E. (2011) 'Language of Computer Crime Investigation', pp. 35-48 in E. Casey (ed.), Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. London: Elsevier.
  • Clough, J. (2014) 'A World of Difference: The Budapest Convention of Cybercrime and the Challenges of Harmonisation', Monash UL Rev. 40: 698.
  • Dolliver, D. S., and Poorman, K. (2018) 'Understanding Cybercrime', pp. 139-160 in P. L. Reichel and R. Randa (eds) Transnational Crime and Global Security [2 volumes]: ABC-CLIO.
  • Ellis, R., and Mohan, V. (2019) Rewired: Cybersecurity Governance: John Wiley & Sons.
  • European Commission (2007) Towards a General Policy on the Fight Against Cyber Crime Available at: https://eur-lex.europa.eu/LexUriServ/ LexUriServ. do?uri= COM:2007:0267:FIN:EN:PDF.
  • --- (2019) The EU cybersecurity certification framework. Available at: https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-certification-framework (Accessed: 17/08/2019.
  • Finn, B. M. (2019) 'Recommendations for a hybridized public private law enforcement approach'.
  • Garland, D. (1996) 'THE LIMITS OF THE SOVEREIGN STATEStrategies of Crime Control in Contemporary Society', The British journal of criminology 36(4): 445-471.
  • Gercke, M. (2012) Understanding Cybercrimes: Phenomena, Challenges and Legal Response: International Telecommunication Union.
  • Gordon, S., and Ford, R. (2006) 'On the Definition and Classification of Cybercrime', Journal in Computer Virology 2(1): 13-20.
  • Grabosky, P., and Smith, R. (2001) 'Telecommunications Fraud in the Digital Age: the Convergence of Technologies', pp. 23-43 in D. Wall (ed.), Crime and the Internet. London: Routledge.
  • Grabosky, P. N. (2001) 'Virtual criminality: Old wine in new bottles?', Social & Legal Studies 10(2): 243-249.
  • Graham, L. (2017) Cybercrime costs the global economy $450 billion: CEO. Available at: https://www.cnbc.com/2017/02/07/cybercrime-costs-the-global-economy-450-billion-ceo.html (Accessed: 06/08/2019 2019).
  • Hadlington, L., Lumsden, K., Black, A., and Ferra, F. (2018) 'A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime', Policing: A Journal of Policy and Practice.
  • Hayes, N. (1997) 'Theory-led thematic analysis: Social identification in small companies'.
  • Holt, T. J., Bossler, A. M., and Fitzgerald, S. (2010) 'Examining state and local law enforcement perceptions of computer crime', Crime on-line: Correlates, causes, and context: 221-246.
  • Holt, T. J., Burruss, G. W., and Bossler, A. M. (2018) 'An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents', Policing and Society: 1-16.
  • Holt, T. J., Lee, J. R., Liggett, R., Holt, K. M., and Bossler, A. (2019) 'Examining perceptions of online harassment among constables in England and Wales', International Journal of Cybersecurity Intelligence & Cybercrime 2(1): 24-39.
  • Home Office (2014) The Serious and Organised Crime Strategy, London.
  • --- (2018) CONTEST: The United Kingdom’s Strategy for Countering Terrorism, London.
  • James, J. I., and Gladyshev, P. (2015) A Survey of International Cooperation in Digital Investigations, International Conference on Digital Forensics and Cyber Crime (pp. 103-114): Springer.
  • Joh, E. E. (2019) 'Policing the smart city', International Journal of Law in Context 15(2): 177-182.
  • Koops, B.-J. (2010) 'The internet and its opportunities for cybercrime'.
  • Kshetri, N. (2010a) 'The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures', pp. 1-34 in The Global Cybercrime Industry: Springer.
  • ---. (2010b) 'Structure of Cybercrime in Developing Economies', pp. 165-188 in The Global Cybercrime Industry: Springer.
  • ---. (2013) 'Cybercrime and cyber-security issues associated with China: some economic and institutional considerations', Electronic Commerce Research 13(1): 41-69.
  • Lam, P. T. (2019) 'Public–Private Partnerships for Fire, Police, and Ambulance Services', pp. 153-165 in Public Private Partnerships: Springer.
  • Lee, J. R., Holt, T. J., Burruss, G. W., and Bossler, A. M. (2019) 'Examining English and Welsh Detectives’ Views of Online Crime', International Criminal Justice Review: 1057567719846224.
  • Levi, M., Doig, A., Gundur, R., Wall, D., and Williams, M. L. (2015) The Implications of Economic Cybercrime for Policing: City of London Corporation. Available at: https://www.cityoflondon.gov.uk/business/economic-research-and-information/research-publications/Documents/Research-2015/Economic-Cybercrime-FullReport.pdf. (Accessed: 11 June 2017).
  • Maguire, M., and Delahunt, B. (2017) 'Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars', AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education 9(3).
  • Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., and Ignatuschtschenko, E. (2013) 'Comprehensive Study on Cybercrime', United Nations Office on Drugs and Crime, Tech. Rep.
  • Nouh, M., Nurse, J. R., Webb, H., and Goldsmith, M. (2019) 'Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement', arXiv preprint arXiv:1902.06961.
  • Pathak, P. (2016) 'The Review of Terms and Concepts Used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals', International Journal of Advanced Research in Computer Science 7(1).
  • Petee, T. A., Corzine, J., Huff-Corzine, L., Clifford, J., and Weaver, G. (2010) 'Defining” Cyber-crime”: Issues in Determining the Nature and Scope of Computer-related Offenses,”', Futures Working Group 5: 6-11.
  • Reinhart, R. J. (2018) One in Four Americans Have Experienced Cybercrime. Available at: https://news.gallup.com/poll/245336/one-four-americans-experienced-cybercrime.aspx (Accessed: 08/09/2019.
  • Ruddell, R., Thomas, M. O., and Patten, R. (2011) 'Examining the roles of the police and private security officers in urban social control', International Journal of Police Science & Management 13(1): 54-69.
  • Sandywell, B. (2013) 'On the Globalisation of Crime: the Internet and New Criminality', pp. 56-84 in Handbook of internet crime: Willan. Summerville, A. (2017) Protect against the fastest-growing crime: cyber attacks. Available at: https://www.cnbc.com/2017/07/25/stay-protected-from-the-uss-fastest-growing-crime-cyber-attacks.html (Accessed: 06/08/2019 2019).
  • Taylor, G. (2002) 'The Council of Europe Cybercrime Convention a Civil Liberties Perspective', Retrieved June 13: 2006.
  • The Council of Europe Convention on Cybercrime. (2001) Convention on Cybercrime. In T. C. o. Europe (Ed.). Budapest: European Treaty Series - No. 185.
  • Thomas, D., and Loader, B. (2000) 'Cybercrime: Law Enforcement, Security and Surveillance in the Information Age' in D. Thomas and B. Loader (eds) Cybercrime: Law enforcement, security and surveillance in the information age. London: Routledge.
  • UN Congress. (2000) Crimes Related to Computer Networks, 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Vienna: United Nations.
  • UN Manual (1994) United Nations Manual on the Prevention and Control of Computer-Related Crime. Available at: http://216.55.97.163/wp-content/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide.pdf (Accessed: 21/03/2017).
  • Wall, D. S. (2005) 'Digital Realism and the Governance of Spam as Cybercrime', European journal on criminal policy and research 10(4): 309-335.
  • ---. (2007a) Cybercrime: The transformation of crime in the information age: Polity.
  • ---. (2007b) Cybercrime: The Transformation of Crime in the Information Age: Cambridge: Polity Press.
  • ---. (2008) 'Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime', International Review of Law, Computers & Technology 22(1-2): 45-63.
  • ---. (2010) 'Policing Cybercrimes: Situating the Public Police in Networks of Security Within Cyberspace (Revised May 2010)', Police Practice and Research 8(2): 183-205.
  • ---. (2013a) 'Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’', pp. 106-121 in Handbook of Internet Crime: Willan.
  • ---. (2013b) 'Policing Identity Crimes', pp. 29-52 in D. S. Wall and M. L. Williams (eds) Policing cybercrime: networked and social media technologies and the challenges for policing: Taylor & Francis.
  • Wall, D. S., and Williams, M. (2014) Policing cybercrime: networked and social media technologies and the challenges for policing: Routledge.
  • Williams, M., and Levi, M. (2015) 'Perceptions of the ecrime Controllers: Modelling the Influence of Cooperation and Data Source Factors', Security Journal 28(3): 252-271.
  • World Medical Association. (2001) 'World Medical Association Declaration of Helsinki. Ethical principles for medical research involving human subjects', Bulletin of the World Health Organization 79(4): 373.
  • Yar, M. (2005) 'The Novelty of 'Cybercrime’ an Assessment in Light of Routine Activity Theory', European Journal of Criminology 2(4): 407-427.
  • ---. (2013a) Cybercrime and Society: Sage.
  • ---. (2013b) 'The Private Policing of Internet Crime' in Y. Jewkes and M. Yar (eds) Handbook of Internet crime: Routledge.
There are 70 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

Naci Akdemir 0000-0002-4288-6482

Bülent Sungur This is me 0000-0002-0705-0049

Bürke Başaranel 0000-0003-4760-2925

Publication Date February 28, 2020
Submission Date October 28, 2019
Published in Issue Year 2020 International Security Congress Special Issue

Cite

APA Akdemir, N., Sungur, B., & Başaranel, B. (2020). EXAMINING THE CHALLENGES OF POLICING ECONOMIC CYBERCRIME IN THE UK. Güvenlik Bilimleri Dergisi, Özel Sayı(International Security Congress Special Issue), 113-134. https://doi.org/10.28956/gbd.695956

2434714728147311473929833


This journal is licensed under the Creative Commons Attribution-NonCommercial 4.0 International License29846