Cyber crime: a portrait of the landscape

被引:10
作者
Furnell, Steven [1 ]
Dowling, Samantha [2 ]
机构
[1] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth, Devon, England
[2] Home Off, London, England
关键词
Internet; Fraud; Hacking; Malware; Ransomware; Cyber crime;
D O I
10.1108/JCRPP-07-2018-0021
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Purpose The purpose of this paper is to review current evidence in relation to scale and impacts of cyber crime, including various approaches to defining and measuring the problem. Design/methodology/approach A review and analysis of survey evidence is used to enable an understanding of the scope and scale of the cyber crime problem, and its effect upon those experiencing it. Findings The analysis evidences that cyber crime exists in several dimensions, with costs and harms that can be similarly varied. There is also a sense that, moving forward, the "cyber" label will become somewhat redundant as many crimes have the potential to have a technology component. Research limitations/implications The key evidence in this particular discussion has some geographic limitations, with much of the discussion focussed upon data drawn from the Crime Survey for England and Wales, as well as other UK-based sources. However, many of the broader points still remain more widely relevant. Practical implications This study helps in: better understanding the range and scale of cyber crime threats; understanding how the cyber element fits into the wider context of crime; improving the appreciation of what cyber crime can mean for potential victims; and recognising the cost dimensions, and the implications for protection and response. Social implications The discussion will help businesses and individuals to have a better appreciation of the cyber crime threat, and what ought to be considered in response to it. Originality/value The discussion is based upon recent evidence, and therefore represents a more up-to-date view of the cyber crime landscape than reviews already available in earlier literature.
引用
收藏
页码:13 / 26
页数:14
相关论文
共 25 条
[1]  
Anderson R., 2012, Measuring the cost of cyber crime
[2]  
[Anonymous], 2016, HEIGHT DDOS THREAT P
[3]  
[Anonymous], 2018, Statistical Bulletin
[4]  
[Anonymous], 2017, Statistical Bulletin
[5]  
[Anonymous], 2017, WIRED
[6]  
[Anonymous], 2017, Internet Security Threat Report
[7]  
Audit Commission, 2005, ICT FRAUD AB 2004 UP
[8]  
Bisson D., 2017, CAR WASH SECURITY FL
[9]  
Brand S., 2000, EC SOCIAL COSTS CRIM
[10]  
DCMS, 2018, Technical Report