BibTex RIS Cite

Crucial Elements in Law Enforcement against Cybercrime

Year 2018, Volume: 7 Issue: 3, 140 - 158, 01.09.2018

Abstract

Technological innovation, globalization, and urbanization have facilitated criminals and terrorists to pose a fresh wave of hazards that can shake the security establishment of global markets. The development of information and communications technology creates not only advantages, convenience and efficiency, but also disadvantages, challenges and threats. The purpose of this paper is to explore into crucial elements in combating cybercrime. The paper identified the following crucial elements as special perpetrator-victim relationship, time elements, spatial elements, technological nature of cybercrime, complexity, costs, anonymity, hidden victims, concealment, trans-territoriality, and fast increase in recent four decades. They should be emphasized in fighting against cybercrime. The paper further analyzes the phenomenon of rent-seeking from the exaggeration of insecurity and cybercrime, which can be misinformation in this battle.

References

  • [1].Allen, J. (2001). CERT System and Network Security Practices, in Proceedings of Fifth National Colloquium for Information and communications systems Security Education, George Mason University, Fairfax, Virginia, 22-24 May. Retrieved 23 Novemer 2017, from http://www.theebusinesssite.com/PPT/Secu reWebsites769468/769498_Reading_Class8- CERT_Network_Hardening.pdf
  • [2].American Society for Industrial Security (ASIS). (2004). Cybercrime-Fighting Tools Still Lacking, Security Management, number 40.
  • [3].Anderson, R. (2001). Why Information Security Is Hard--an Economic Perspective, in Proceedings of the 17th Annual Computer Security Applications Conference, Washington, DC: IEEE Computer Society. Retrieved 23 Novemer 2017, from http://www.acsac.org/2001/papers/110.pdf
  • [4].Behar, R. (1997). Who's Reading Your Email? Fortune, number 66, pp. 57-70.
  • [5].Bequai, A. (1978). Computer Crime, Lexington, Massachusetts, Toronto: Lexington Books.
  • [6].Carter, D. L. (1995). Computer Crime Categories, Law Enforcement Bulletin, U. S. Department of Justice: Federal Bureau of Investigation, volume 64, number 7, pp. 21-26.
  • [7].CCIPS. (2006). Computer Intrusion Cases. Retrieved 23 Novemer 2017, from http://www.usdoj.gov/criminal/cybercrime/ cccases.html
  • [8].Centre for Strategic and International Studies (CSIS). (1998). Cybercrime Cyberterrorism Cyberwarfare: Averting an Electronic Waterloo (CSIS Task Force Report), Centre for Strategic and International Studies.
  • [9].Clark, F. and Diliberto, K. (1996). Investigating Computer Crime, Boca Raton, Florida: CRC Press LLC.
  • [10]. Collin, B. C. (1999). The Future of Cyberterrorism: Where the Physical and Virtual Worlds Converge, 11th Annual International Symposium Criminal Justice Issues. Retrieved 23 Novemer 2017, from http://www.crimeresearch.org/library/Cyberter.htm
  • [11]. Conly, Catherine H. (1991). Organizing for Computer Crime Investigation and Prosecution, Darby, PA: Diane Publishing.
  • [12]. Cook, D. (1997). Poverty, Crime and Punishment, London: CPAG.
  • [13]. CSI. (2000). CSI/FBI 2000 Computer Crime and Security Survey.
  • [14]. CSI. (2005). CSI/FBI 2005 Computer Crime and Security Survey.
  • [15]. Daler, T., Gulbrandsen, R., Melgrd, B. and Sjølstad, T. (1989). Security of Information and Data, Chichester: Ellis Horwood.
  • [16]. Davidson, A. (14 April 2003). Decentralization, Disease and Terrorism. Retrieved 23 Novemer 2017, from http://www.eclicktick.com/decentralization __disease_and_terrorism__.htm
  • [17]. Dnes, A. W. (2000). The Economics of Crime, in N. G. Fielding, A. Clarke and R. Witt. (eds.). The Economic Dimensions of Crime, London: Palgrave, 2000, pp. 70- 81.
  • [18]. Dong, S. & Li, X. (2016). Besieged privacy in social networking services. International Journal of Electronic Security and Digital Forensics. Vol. 8, Issue 3. pp. 224-233. Retrieved 23 November 2017, from https://www.inderscienceonline.com/doi/pd f/10.1504/IJESDF.2016.077447. DOI: 10.1504/IJESDF.2016.077447
  • [19]. Feldman, P. (1993). The Psychology of Crime, New York, NY: Cambridge University Press.
  • [20]. Felson, M. (2002). Crime and Everyday Life, third edition, Thousand Oaks, California: SAGE Publications.
  • [21]. Fields, G. (6 April 2004). Cyberexperts and Engineers Wanted by FBI, Wall Street Journal, B1.
  • [22]. Gelbstein, E., and Kamal, A.( 2002). Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats and Cyber-security, the United Nations Information and Communications Technology Task Force and the United Nations Institute for Training and Research.
  • [23]. Grabosky, P. (2000). Cyber Crime and Information Warfare, The Transnational Crime Conference convened by the Australian Institute of Criminology in association with the Australian Federal Police and Australian Customs Service and held in Canberra, 9-10 March. Retrieved 23 Novemer 2017, from http://www.aic.gov.au/conferences/transnat ional/grabosky.pdf
  • [24]. Gray, C. M. (1979). The Costs of Crime: Review and Overview, in C. M. Gray. (ed.). The Costs of Crime, Beverly Hills, CA: SAGE Publications, pp. 13-32.
  • [25]. Greenberg, M. S. and Ruback, R. B. (1985). A Model of Crime Victim Decision Making, Victimology: An International Journal, volume 10, pp. 600-616.
  • [26]. Hatcher, M. and co-workers. (1999). Computer Crimes, American Criminal Law Review, volume 36.
  • [27]. Hoo, J. S. (2000). How Much is Enough? A Risk Management Approach to Computer Security, Centre for International Security and Cooperation Working Paper. Retrieved 23 Novemer 2017, from http://iisdb.stanford.edu/pubs/11900/soohoo.pdf
  • [28]. Institute for Security Technology Studies (ISTS). (2002). Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Needs Assessment.
  • [29]. International Monetary Fund (IMF). (2002). Global Financial Stability Report, A Quarterly on Market Developments and Issues, International Monetary Fund.
  • [30]. Johnson, T. A. (2006). Forensic Computer Crime Investigation, Boca Raton, Florida: Taylor and Francis Group.
  • [31]. Kelly, J. X. (2002). Cybercrime - High Tech Crime, JISC Legal Information Service - University of Strathclyde. Retrieved 23 November 2017, from http://www.jisc.ac.uk/legal/index.cfm?nam e=lis_cybercrime
  • [32]. Kingdon, J. (1994). Shooting the Messenger: The Liability of Internet Service Providers for Prohibited Expression. Retrieved 23 Novemer 2017, from http://www.catalaw.com/logic/docs/jkisps.htm
  • [33]. Lee, M. and co-workers. (1999). Electronic Commerce, Hackers, and the Search for Legitimacy: A Regulatory Proposal, Berkeley Technological Law Journal, volume 14, number 2, pp. 839- 885.
  • [34]. Levinson, D. (ed.). (2002). Encyclopedia of Crime and Punishment, Newbury Park, CA: Sage Publications.
  • [35]. Li, X. (2008a). The Criminal Phenomenon on the Internet: Hallmarks of Criminals and Victims Revisited Through Typical Cases Prosecuted. University of Ottawa Law & Technology Journal, 5, 125−140.
  • [36]. Li, X. (2008b). Cybercrime and Deterrence: Networking Legal Systems in the Networked Information Society. (University of Turku). Turku, Finland: University of Turku.
  • [37]. Loeb, M. P. (1 April 2004). The True Cost of Cybercrime, Network Computing.
  • [38]. London School of Economics and Political Science. (2001). Cybercrime: the Challenge to Leviathan?. Retrieved 23 Novemer 2017, from http://www.lse.ac.uk/clubs/hayek/Essays/c ybercrime.htm
  • [39]. Mandia, K. and Prosise, C. (2003). Incident Response and Computer Forensics, Emeryville, California: McGraw-Hill/Osborne.
  • [40]. McAfee. (2005). Virtual Criminology Report: North American Study into Organized Crime and the Internet.
  • [41]. McConnell International. (2000). Cyber Crime . . . and Punishment? Archaic Laws Threaten Global Information. Retrieved 23 Novemer 2017, from http://www.witsa.org/papers/McConnellcybercrime.pdf.
  • [42]. McCullagh, D. (19 August 2004). Punishment Fails to Fit the Cybercrime, ZDNet United Kingdom. Retrieved 23 Novemer 2017, from http://www.crimeresearch.org/news/19.08.2004/574/
  • [43]. McKenna, B. (2003). United Kingdom Police Promise Charter to Guard Good Names, Computers and Security, volume 22, number 1, pp. 38-40.
  • [44]. Miethe, T. D. (1995). Fear and Withdrawal from Urban Life, in Wesley G. Skogan, ed. Reactions to Crime and Violence, Thousand Oaks, London, New Delhi: SAGE Periodicals Press, pp. 14-27.
  • [45]. Miettinen, J. E. (1996). Survey of Hacking in Finland in the 1990s- Summary of the Results, Oulu: University of Oulu.
  • [46]. Mitchell, C. (2012). The Cyber Crime Threat on Mobile Devices. Retrieved 23 Novemer 2017, from chrismitchell.net/Papers/tcctom.pdf
  • [47]. Mitchell, S. D., and Banker, E. A. (1998). Private Intrusion Response, Harvard Journal of Law and Technology, volume 11, number 3, pp. 699-732.
  • [48]. Mohay, G., Byron, C., Vel, O., McKemmish R., and Anderson, A. (2003). Computer and Intrusion Forensics, Norwood, Massachusetts: Artech House.
  • [49]. Molnar, J. (1987). Putting Computer-related Crime in Perspective, Journal of Policy Analysis and Management, volume 6, number 4, Privatization: Theory and Practice, pp. 714- 716.
  • [50]. NPA. (1998). The Situation of High-tech Crime and the Suppression of Police, Japan Police White Paper, Tokyo: National Police Agency.
  • [51]. Nycum, S. H. (1983). Testimony on Computer Security before the U. S. Senate Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, Computers and Society, volume 13, number 4 and volume 14, Nos. 1, 2, and 3.
  • [52]. Pethia, R. D. (2001). Information Technology—Essential But Vulnerable: How Prepared Are We for Attacks? Before the House Committee on Government Reform,
  • [53]. Philip, A. R. (2002). The Legal System and Ethics in Information Security, SANS Institute, 2002. Retrieved 23 Novemer 2017, from http://www.securitydocs.com/go/1604
  • [54]. Radzinowicz, L. and King, J. (1977). The Growth of Crime: The International Experience, London: Hamish Hamilton.
  • [55]. Roush, W. (1995). Hackers: Taking a Bite Out of Computer Crime, Technology Review.
  • [56]. Salgado, R. P. (2001). Working with Victims of Computer Network Hacks, USA Bulletin, volume 49, number 2.
  • [57]. Schneier, B. (2004). Hacking the Business Climate for Network Security, Computer, volume 37, number 4, pp. 87- 89.
  • [58]. Sieber, U. (1998). Legal Aspects of Computer-Related Crime in the Information Society, The COMCRIMEStudy for the European Commission. Retrieved 23 Novemer 2017, from http://ec.europa.eu/archives/ISPO/legal/en/ comcrime/sieber.html
  • [59]. Sinrod, E. J., and Reilly, W. P. (2000). Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws, Computer and High Technology Law Journal, volume 16, pp. 177-232.
  • [60]. Smith, R. G., Grabosky, P. and Urbas, G. (2004). Cyber Criminals on Trial, Cambridge: The Press Syndicate of the University of Cambridge.
  • [61]. Sofaer, A. D. and Goodman, S. E. (eds.). (2001). The Transnational Dimension of Cyber Crime and Terrorism, Hoover Institution, pp. 35-68.
  • [62]. Speer, D. L. (2000). Redefining Borders: The Challenges of Cybercrime, Crime, Law and Social Change, volume 34, pp. 259-273.
  • [63]. Stanley, T. J. (1995). Optimal Penalties for Concealment of Crime, Economics Working Paper Archive.
  • [64]. Stephenson, P. (2000). Investigating Computer-Related Crime, Boca Raton: Florida: CRC Press LLC.
  • [65]. Stoll, C. (1988). Stalking the Wily Hacker, Communication of the ACM, volume 31, number 5, 484-497. Reprinted in C. Dunlop and R. Kling (eds.) Computerization and Controversy: Value Conflicts and Social Choices, San Diego: Academic Press, 1991, pp. 524-532.
  • [66]. Telang, R, and Wattel, S. (2005). Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis, Presented at the Fourth Workshop on Economics and Information Security, Boston, 1-3 June.
  • [67]. Thompson, D. (1989). Police Powers - Where’s the Evidence? Proceedings of The Australian Computer Abuse Inaugural Conference.
  • [68]. Tullock, G. (1967). The Welfare Costs of Tariffs, Monopolies and Theft, Western Economic Journal, volume 5, pp. 224-232.
  • [69]. UNCJIN. (1999). International Review of Criminal Policy -United Nations Manual on the Prevention and Control of Computer-Related Crime, International Review of Criminal Policy, nos. 43 and 44.
  • [70]. Vacca, J. R. (2005). Computer Forensic: Computer Crime Scene Investigation, Hingham, Massachusetts: Charles River Media.
  • [71]. Vamosi, R. (10 September 2003). Make the Punishment Fit the Cybercrime, CNET Reviews. Retrieved 23 Novemer 2017, from http://reviews.cnet.com/4520- 3513_7-5073597-1.html
  • [72]. Walsh, D. P. (1983). Visibility, in Dermot Walsh and Adrian Poole (eds), A Dictionary of Criminology, London, Boston, Melbourne and Henley: Routledge and Kegan Paul.
  • [73]. Wasik, M. (1991). Crime and the Computer, Oxford: Clarendon Press.
There are 73 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Xingan Li This is me

Publication Date September 1, 2018
Published in Issue Year 2018 Volume: 7 Issue: 3

Cite

IEEE X. Li, “Crucial Elements in Law Enforcement against Cybercrime”, IJISS, vol. 7, no. 3, pp. 140–158, 2018.