viernes, 14 de diciembre de 2018

Cybercrime: interdisciplinary approaches to cutting crime and victimisation in cyber space

Cybercrime: interdisciplinary approaches to cutting crime and victimisation in cyber space



Cybercrime: interdisciplinary approaches to cutting crime and victimisation in cyber space

New Content Item
Edited by
Shujun Li, Professor of Cyber Security, School of Computing, University of Kent, UK – Lead Guest Editor
Michael Levi, Professor of Criminology, School of Social Sciences, Cardiff University, UK – Guest Co-Editor
David Maimon, Associate Professor, Department of Criminology and Criminal Justice, University of Maryland, USA – Guest Co-Editor
Kim-Kwang Raymond Choo, Cloud Technology Endowed Associate Professor, Department of Information Systems and Cyber Security, University of Texas at San Antonio, USA – Guest Co-Editor
Gianluca Stringhini, Senior Lecturer (Associate Professor), Department of Computer Science & Department of Security and Crime Science, University College London (UCL), UK – Guest Co-Editor
‘Cybercrime’ has developed from the old narrower concepts of computer crime and e-crime into a much broader concept covering many different forms of criminal activity in cyber space. Although some law enforcement agencies use ‘cyber-dependent crime’ and ‘cyber-enabled crime’ to classify cybercrime, the boundary between cybercrime and traditional forms of crime has never been clear cut and is becoming increasingly blurred due to the level of hyper-connectivity in today’s highly digitized and networked world. The ubiquitous use of the Internet and smart mobile devices in people’s everyday lives, the wide adoption of cloud based services by industry and government, and, for example, the advent of the Internet of Things (IoT), the Internet of Everything (IoE), and the Cyber-Physical Systems (CPSs), lead to the widely accepted belief that almost all criminal activities have some cyber elements. As a consequence, digital forensics (or cyber forensics) have become an essential part of almost all crime investigation processes of law enforcement around the world.
In the last two decades or so, a lot of research has been done on cybercrime. However, there is a clear fragmentation problem: researchers in different disciplines (e.g. criminology and computer science) tend to publish their work in their own fields and do not write for a wider audience. This has been changing recently due to the creation of some interdisciplinary outlets such as the Crime Science Journal, but it is still rare to see research papers on cybercrime that target a truly interdisciplinary audience with both researchers and practitioners in mind. Crime science focuses on improving the detection, prevention and understanding of crime and disorder.
This special issue is one of the first attempts to bring together cybercrime researchers from different fields by encouraging them to publish papers on cutting cybercrime that can benefit researchers and practitioners from a wider spectrum including crime science and computer science.
  1. Content Type:Research

    Pump-and-dump schemes are fraudulent price manipulations through the spread of misinformation and have been around in economic settings since at least the 1700s. With new technologies around cryptocurrency tra...
    Authors:Josh Kamps and Bennett Kleinberg
    Citation:Crime Science 2018 7:18
    Published on: 
  2. Content Type:Theoretical Article

    In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In this practice, a white-hat hacker who finds a vulnerability in ...
    Authors:Marleen Weulen Kranenbarg, Thomas J. Holt and Jeroen van der Ham
    Citation:Crime Science 2018 7:16
    Published on: 

No hay comentarios: