Dealing with the problem of cybercrime


Autoria(s): Alkaabi, Ali; Mohay, George M.; McCullagh, Adrian J.; Chantler, Alan N.
Contribuinte(s)

Baggili, Ibrahim

Data(s)

2010

Resumo

Lack of a universally accepted and comprehensive taxonomy of cybercrime seriously impedes international efforts to accurately identify, report and monitor cybercrime trends. There is, not surprisingly, a corresponding disconnect internationally on the cybercrime legislation front, a much more serious problem and one which the International Telecommunication Union (ITU) says requires „the urgent attention of all nations‟. Yet, and despite the existence of the Council of Europe Convention on Cybercrime, a proposal for a global cybercrime treaty was rejected by the United Nations (UN) as recently as April 2010. This paper presents a refined and comprehensive taxonomy of cybercrime and demonstrates its utility for widespread use. It analyses how the USA, the UK, Australia and the UAE align with the CoE Convention and finds that more needs to be done to achieve conformance. We conclude with an analysis of the approaches used in Australia, in Queensland, and in the UAE, in Abu Dhabi, to fight cybercrime and identify a number of shared problems.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/38894/

Publicador

ICST

Relação

http://eprints.qut.edu.au/38894/1/c38894.pdf

http://www.d-forensics.org

Alkaabi, Ali, Mohay, George M., McCullagh, Adrian J., & Chantler, Alan N. (2010) Dealing with the problem of cybercrime. In Baggili, Ibrahim (Ed.) Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, ICST, Abu Dhabi.

Direitos

Copyright 2010 ICST

TRANSFER OF COPYRIGHT AGREEMENT Copyright to the above work (including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) is hereby transferred to the ICST effective as of the date of this agreement, on the understanding that the work has been accepted for publication by ICST. However, each of the Author(s) retains the following rights: 1. All other proprietary rights to the work such as patent. 2. Permission to make digital or hard copies of part or all of this work for personal or classroom use in granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ICST must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 3. The right to revise the work. 4. The right to post author-prepared versions of the work covered by ICST copyright in a personal collection on their own Home Page and on a publicly accessible server of their employer. Such posting is limited to noncommercial access and personal use by others, and must include this notice both embedded within the full text file and in the accompanying citation display as well, i.e.: 5. The right of an employer who originally owned copyright to distribute definitive copies of its author-employees work within its organization. Posting these works for world access requires explicit permission from ICST.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #089999 Information and Computing Sciences not elsewhere classified #Cybercrime #Computer Crime #CoE Convention on Cybercrime
Tipo

Conference Paper