You are previewing Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance.
O'Reilly logo
Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance

Book Description

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
  6. Preface
    1. ABOUT THE SUBJECT
    2. ORGANIZATION OF THE BOOK
    3. EXPECTATIONS
  7. Acknowledgment
  8. Section 1: Cybercrimes Examples, Risks, and Threats
    1. Chapter 1: Cyber Attacks on Critical Infrastructure
      1. ABSTRACT
      2. INTRODUCTION
      3. CRITICAL INFRASTRUCTURE
      4. SCADA SYSTEMS FOR CRITICAL INFRASTRUCTURES
      5. FUTURE DIRECTIONS
      6. CONCLUSION
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Raptor
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND AND CHALLENGES AHEAD
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. DISCLAIMER
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Online Violence
      1. ABSTRACT
      2. INTRODUCTION
      3. WHEN RISK LIVES IN THE CHILD’S POCKET
      4. SOME CONSIDERATIONS ABOUT THE METHODOLOGY
      5. PRELIMINARY DATA ANALYSIS
      6. PROVISIONAL FINDINGS
      7. FUTURE RESEARCH DIRECTIONS
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
      11. ENDNOTES
    4. Chapter 4: Development and Mitigation of Android Malware
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TAXONOMY OF ANDROID MALWARE
      5. CLASSIFICATION OF DETECTION TECHNIQUES
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    5. Chapter 5: Answering the New Realities of Stalking
      1. ABSTRACT
      2. INTRODUCTION
      3. THE MANIFESTATION OF STALKING BEHAVIOR AND ITS DEMARCATION FROM OTHER CRIMES
      4. STALKING IN COMPARATIVE LAW
      5. SPECIAL MENTION TO SPANISH REGULATION
      6. STALKING IN THE INTERNET: CYBERSTALKING AND NEW REALITIES
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS:
    6. Chapter 6: Cyberbullying
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS
      5. TECHNOLOGICAL INTERVENTIONS
      6. FUTURE DIRECTIONS FOR RESEARCH
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    7. Chapter 7: DNA Databases for Criminal Investigation
      1. ABSTRACT
      2. INTRODUCTION
      3. CONTEXT AND BACKGROUND
      4. DNA PROFILE DATABASES
      5. TORN BETWEEN TWO TYPES OF FEAR
      6. REPERCUSSIONS OF DNA IDENTIFICATION: AN IMPERFECT METHOD?
      7. SOLUTIONS AND RECOMMENDATIONS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
      13. ENDNOTES
    8. Chapter 8: Composition of the Top Management Team and Information Security Breaches
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW AND STATEMENT OF HYPOTHESES
      4. DATA COLLECTION AND EMPIRICAL MODELS
      5. EMPIRICAL RESULTS
      6. IMPLICATIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
      10. ENDNOTES
    9. Chapter 9: Hijacking of Clicks
      1. ABSTRACT
      2. INTRODUCTION
      3. BASIC CLICKJACKING ATTACK TECHNIQUE
      4. FRAMEBUSTING PROTECTION AND ADVANCED CLICKJACKING ATTACKS
      5. CLICKJACKING ATTACK DETECTION AT THE CLIENT-SIDE
      6. CLICKJACKING ATTACK DETECTION AT THE SERVER-SIDE
      7. CLICKJACKING ATTACK DETECTION AT THE PROXY
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    10. Chapter 10: Fighting Cybercrime and Protecting Privacy
      1. ABSTRACT
      2. INTRODUCTION
      3. HOW THE BOTNETS WORK AND DESCRIPTION OF A FEW CYBERCRIME TYPES
      4. EUROPEAN LAW ON THE PROCESSING OF PERSONAL DATA ON THE DETECTION OR PROSECUTION OF CRIMINAL OFFENCES
      5. ETHICAL ISSUES
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
      9. APPENDIX 1
  9. Section 2: Cyber Security Approaches and Developments
    1. Chapter 11: Privacy Compliance Requirements in Workflow Environments
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LEGAL REQUIREMENTS AND CHALLENGES
      5. LIMITATIONS OF CURRENT SYSTEMS
      6. MODELLING REQUIREMENTS
      7. ASPECTS OF COMPLIANCE EVALUATION
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    2. Chapter 12: Forensic Readiness and eDiscovery
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FORENSIC READINESS AND THE EDISCOVERY PROCESS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    3. Chapter 13: Cybercrimes Technologies and Approaches
      1. ABSTRACT
      2. INTRODUCTION
      3. MOTIVES OF CYBERCRIMINALS
      4. CYBER INCIDENT AND SPENDING TRENDS
      5. TYPES OF CYBERATTACKS
      6. INTERNATIONAL PRIVACY LAWS
      7. U.S. PRIVACY LAWS
      8. U.S. CYBERSECURITY STRATEGY
      9. EU PRIVACY LAWS
      10. EU CYBERSECURITY STRATEGY
      11. CYBERSPACE CHALLENGES
      12. CIVIL LIBERTY AND PRIVACY CONCERNS
      13. TECHNICAL APPROACHES
      14. NON-TECHNICAL APPROACHES
      15. FUTURE RESEARCH DIRECTIONS
      16. CONCLUSION
      17. REFERENCES
      18. KEY TERMS AND DEFINITIONS
    4. Chapter 14: Cyber-Crimes against Adolescents
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CYBER-CRIME AGAINST ADOLESCENTS
      5. ISSUES, CONTROVERSIES, PROBLEMS
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    5. Chapter 15: Event Reconstruction
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITIONS
      4. CHALLENGES
      5. EVALUATION OF EXISTING APPROACHES
      6. A FRAMEWORK FOR POST-EVENT TIMELINE RECONSTRUCTION USING NEURAL NETWORKS
      7. AUTOMATED TIMELINE RECONSTRUCTION APPROACH
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    6. Chapter 16: Indirect Attribution in Cyberspace
      1. ABSTRACT
      2. INTRODUCTION
      3. DIRECT ATTRIBUTION
      4. MULTI-STAGE ATTACKS
      5. CYBER-ATTRIBUTION
      6. ISSUES, CONTROVERSIES, PROBLEMS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. ADDITIONAL READING
      11. KEY TERMS AND DEFINITIONS
      12. ENDNOTES
    7. Chapter 17: Modern Crypto Systems in Next Generation Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND OF MODERN CRYPTO SYSTEMS
      4. ISSUES AND CHALLENGES IN MODERN CRYPTOSYSTEMS
      5. POINT-TO-POINT, MULTIPOINT, AND BROADCAST
      6. SUMMARY
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    8. Chapter 18: Automatic Detection of Cyberbullying to Make Internet a Safer Environment
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TEXT MINING TECHNIQUES
      5. TEXT MINING FOR THE DETECTION OF CYBERBULLYING
      6. CONCLUSION AND FUTURE WORK
      7. ACKNOWLEDGMENT
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    9. Chapter 19: A Taxonomy of Browser Attacks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. UNDERSTANDING WEB BROWSER SECURITY
      5. TOWARDS A TAXONOMY OF BROWSER ATTACKS
      6. EVALUATION OF TAXONOMY
      7. CONCLUSION AND FUTURE WORK
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    10. Chapter 20: Defending Information Networks in Cyberspace
      1. ABSTRACT
      2. FACING CYBERSPACE SECURITY
      3. REMEMBERING INTERNET ISSUES
      4. DEFENSIVE CYBERSECURITY
      5. IN SEARCH OF BETTER SOLUTIONS
      6. WHAT CAN BE CONCLUDED
      7. REFERENCES
      8. ADDITIONAL READING
      9. KEY TERMS AND DEFINITIONS
    11. Chapter 21: Network Situational Awareness
      1. ABSTRACT
      2. INTRODUCTION
      3. CYBERSPACE: THE NEW BATTLE SPACE?
      4. NETWORK TRAFFIC VOLUMES
      5. IMPLICATIONS OF INCREASING DATA VOLUMES: FROM DATA TO INTELLIGENCE
      6. FUTURE RESEARCH DIRECTIONS: TOWARDS AN INTELLIGENT INFORMATION INFRASTRUCTURE
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    12. Chapter 22: Can Total Quality Management Exist in Cyber Security
      1. ABSTRACT
      2. INTRODUCTION
      3. TOTAL QUALITY MANAGEMENT
      4. WHAT IS CYBER SECURITY?
      5. A LOOK AT THREATS IN CYBER SECURITY
      6. A LOOK AT THREATS TO PRIVATE COMPANIES
      7. A LOOK AT THREATS TO A GOVERNMENT AGENCY
      8. MAJOR THREATS TO CYBER SECURITY
      9. CONCLUSION
      10. ACKNOWLEDGMENT
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
  10. Section 3: Legal Aspects and ICT Law
    1. Chapter 23: The Gatekeepers of Cyberspace
      1. ABSTRACT
      2. INTRODUCTION
      3. THE CIVIL RIGHTS FRAMEWORK FOR THE INTERNET IN BRAZIL (“MARCO CIVIL DA INTERNET”)
      4. COPYRIGHT AND INTERNET REGULATION: A NEBULOUS RELATIONSHIP
      5. THE PREROGATIVE OF ACCESS TO INFORMATION AND COMMUNICATION AS A HUMAN RIGHT
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 24: Surveillance, Privacy, and Due Diligence in Cybersecurity
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. ISSUES, CONTROVERSIES, PROBLEMS
      6. SOLUTIONS AND RECOMMENDATIONS: TOWARDS A DUE DILIGENCE STANDARD FOR CYBERSPACE
      7. FUTURE RESEARCH DIRECTIONS
      8. PRACTICAL IMPLICATIONS
      9. CONCLUSION
      10. REFERENCES
      11. ADDITIONAL READING
      12. KEY TERMS AND DEFINITIONS
    3. Chapter 25: A Routine Activity Theory-Based Framework for Combating Cybercrime
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ROUTINE ACTIVITY THEORY
      5. A UNIFIED FRAMEWORK
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 26: Internet of Things
      1. ABSTRACT
      2. INTRODUCTION: THE INTERNET OF THINGS
      3. BACKGROUND
      4. THE PROPOSED INCIDENT RESPONSE AND DIGITAL FORENSICS APPROACH
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    5. Chapter 27: Sticks and Stones Will Break My Euros
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SYSOP PREROGATIVE IN A EUROPEAN CONTEXT
      5. EUROPEAN CONTRACT LAW AND SYSOP PREROGATIVE
      6. HUMAN AND FUNDAMENTAL RIGHTS IN EUROPE
      7. SYSOP PREROGATIVE AND INTERNET TROLLING IN EUROPE
      8. IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS
      9. DISCUSSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    6. Chapter 28: Trolling Is Not Just a Art. It Is an Science
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE EFFECT OF MEDIA AND THE ARTS ON CRIME AND VICE VERSA
      5. MEASURING THE EFFECTS OF MEDIA CONTENT ON A PERSON’S BRAIN
      6. AN INVESTIGATION INTO THE EFFECT OF MEDIA CONSUMPTION ON EMFT PROPENSITY: CALCULATING 'KNOL' FROM ATTITUDES TO MEDIA CONTENT
      7. AUTOMATED AFFECTIVE CONTENT SCREENING: TOWARDS THE DISTRESS IN THE MIND TEST
      8. AN APPLICATION OF THE DISTRESS IN THE MIND TEST
      9. IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS
      10. DISCUSSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
  11. Section 4: Case Studies
    1. Chapter 29: Honeypots and Honeynets
      1. ABSTRACT
      2. INTRODUCTION
      3. CYBERCRIME
      4. HONEYPOTS
      5. HONEYNETS
      6. CONCLUSION
      7. FUTURE RESEARCH DIRECTIONS
      8. ACKNOWLEDGMENT
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 30: Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. ISSUES, CONTROVERSIES, PROBLEMS
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. REFERENCES
      10. KEY TERMS AND DEFINITIONS
    3. Chapter 31: Cyber Security Model of Artificial Social System Man-Machine
      1. ABSTRACT
      2. INTRODUCTION
      3. THE STOCHASTIC PETRI NET MODEL OF A FLEXIBLE MANUFACTURING SYSTEM
      4. AVAILABILITY OF FLEXIBLE MANUFACTURING SYSTEMS
      5. ILLUSTRATIVE EXAMPLE
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    4. Chapter 32: Information Disclosure on Social Networking Sites
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RESEARCH METHOD
      5. DISCUSSION OF FINDINGS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  12. Compilation of References
  13. About the Contributors