Exploring a Warrior Paradigm to Design Out Cybercrime

Cyber crime increases with the advent of new online Internet services (e.g., entertainment, commerce, payment, pubic administration, social networking services). Not only do cyber criminals target governmental or public institutions, they increasingly victimize individuals and smaller organizations. At the same time, we observe that individuals and organizations steadily join forces and take a more proactive and collaborative role in war against cyber crime. In the current work we investigate examples of rising security incidents, new information security solutions and new cyber crime legislations, and elaborate upon some mismatches that exist among them. We particularly elaborate upon (the potential of) the collaborative initiatives that allow individuals to join forces and disclose cyber crime threats. We identify and/or outline a number of the research directions in legislation, social and technical arenas.

[1]  Bert-Jaap Koops De dynamiek van cybercrimewetgeving in Europa en Nederland , 2012 .

[2]  Chandan Mazumdar,et al.  A novel approach to collaborative security using attack graph , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.

[3]  Gang Liu,et al.  Smartening the crowds: computational techniques for improving human verification to fight phishing scams , 2011, SOUPS.

[4]  Gerald Friedland,et al.  Sherlock holmes' evil twin: on the impact of global inference for online privacy , 2011, NSPW '11.

[5]  Pieter H. Hartel,et al.  Cyber-crime Science = Crime Science + Information Security , 2010 .

[6]  Lawrence Lessig Privacy as Property , 2015 .

[7]  Clifford Goodman Netherlands Organization for Applied Scientific Research Medical Technology Unit (Tno) , 1988 .

[8]  Frans L. Leeuw,et al.  Cyber society and digital policies: Challenges to evaluation? 1 , 2012 .

[9]  P. Conradie,et al.  Rotterdam open data: Exploring the release of Public Sector Information through co-creation , 2012, 2012 18th International ICE Conference on Engineering, Technology and Innovation.

[10]  D. Sculley,et al.  Meaning and mining: the impact of implicit assumptions in data mining for the humanities , 2008, Lit. Linguistic Comput..

[11]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[12]  Sicco Verwer,et al.  Combining and Analyzing Judicial Databases , 2013, Discrimination and Privacy in the Information Society.

[13]  Jonathan Clough 1 Cybercrime , 2011 .