Browsing Category
Categories
There’s a gap between what people expect when they report cybercrime, and what police can…
When victims report a cybercrime they expect someone brought to justice, but that’s not always possible. Flickr/Blogtrepreneur, CC BY Cassandra Cross, Queensland University of Technology Two thirds of victims of cybercrime were not satisfied with the outcome of their reported offence, according an evaluation of the Australian Cybercrime Online Reporting Network (ACORN) that has finally
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors.
Social media crime: Clusters for a structural analysis
Ever since their coming into existence, social media have been impacting our communication behaviour and added new possibilities to it. Despite their numerous advantages, they are also increasingly becoming a breeding ground for criminal activity. In order to enhance law enforcement in that respect, a structured approach is required. In a legal perspective the term
Cyber-warfare – How the battlefield went digital
Spies and intelligence agents, wiretaps and classified documents; thanks to our extensive training through Hollywood movies, these things seem to us purely cinematic, the elements of a more or less intriguing political thriller. But things like that really do exist. It’s not unheard of that countries spy on, manipulate or sabotage each other to reach
Cyberbullying: An aid and prevention plan
School life is not always easy and all harmonious, in fact harassment and bullying pose a continuous problem. Communication technology and constantly new trending social media channels add further dimensions to the phenomenon, so that cyberbullying presents an even more complex matter. In order to protect children and teenagers the matter has to be tackled
General matters of the Horizon 2020 programme
Aside from more specific projects and calls, the European Commission’s Horizon 2020 Work Programme also deals with the fundamental structures in the field of security research and communication. To ensure the best possible outcomes for research and innovation in the European Union, the areas of research communication, frameworks and procurement needs to be improved continuously.
Management of cyber-attacks and other risks in the context of Horizon 2020
Whether it’s private citizens, small and medium-sized companies, or the public power grid, we are dependent on elaborate computer systems for routine processes. Without a properly functioning digital system, we could neither withdraw cash from an ATM or turn our lights on, as nearly everything we do in our everyday lives is in some form
The World Wide Web has irreversibly changed the way how organised crime works. Law enforcement…
Over the last decades organised crime has changed its modi operandi. Globalisation enabled wide-spread networks and easier deployment of criminal actions, while the advancements of new technology and especially the internet made organised crime more flexible. Pinning down organised crime to a certain definition is difficult, due to its diverse nature. In the past, many
Technological challenges for managing border security
When it comes to border security, conventional means seem to be unable to counter modern challenges on a large scale. A new approach is vital to address this issue more adequately. One of the main challenges is for example the management of goods and persons at the borders. Could the implementation of technology be the
Cybersecurity, Digital Privacy and data protection
As computers gain hold of nearly every facet of our lives, our reliance on them grows. Even now, the water supply, traffic light systems and supply chains of whole communities and cities rely strongly on the correct functioning of computer systems. Should these be infiltrated or manipulated, the consequences could be costly as well as