Sunday, May 17, 2020

EXAMINING THE CHALLENGES OF POLICING ECONOMIC CYBERCRIME IN THE UK

When preparing this review use was made of trialling numerous AI (artificial intelligence) tools to assist in the collection of standard definition terms and the article's reference sources. The purpose in using AI tools is determine if the tools produce inaccuracies and, if it is found, such tools can accurately produce validated results this could assist Digital Forensics, Incident Response, Cyber Security, Law Enforcement and the Criminal Justice System etc.

EXAMINING THE CHALLENGES OF POLICING ECONOMIC CYBERCRIME IN THE UK
Güvenlik Bilimleri Dergisi, Şubat 2020,UGK Özel Sayısı, 113-134

DOI:10.28956/ gbd.695956


  • Introduction:

     The advent of the Internet and its commercial applications have significantly changed the way the authors socialise, shop or communicate.
  • It is argued that the commercial application of the Internet has provided new opportunities for the commission of the traditional crime, but it has given rise to new forms of crimes (Wall, 2007b; Lee, Holt, Burruss, and Bossler, 2019).
  • Action Fraud reported that Internet users lost £34.6m as a result of cybercrime between April and September 2018, which indicates a %24 rise when compared to the previous 6 months (BBC, 2019)
  • Objectives:

     The aims of this research were two-fold: documenting the problems experienced by police officers working in cybercrime departments and discerning police officers’ perceptions related to the role of police in the wider policing assemblage.
  • Methods:

     In order to address this knowledge gap in the literature, ten semi-structured interviews were conducted with police officers working in cybercrime departments in the UK and three semi-structured interviews were done with experts working on IT departments of the local governments.
  • The research was conducted according to the Declaration of Helsinki (World Medical Association, 2001).
  • Interviewees were provided participant information sheets explaining interview and transcription processes prior to interviews.
  • Participants were asked to sign consent forms before the interviews.
  • Interviews were conducted face-to-face at police departments.
  • Interviews were recorded and transcribed verbatim by authors after the interviews
  • Results:

     Analysis of interviews conducted with police officers and cybercrime experts suggests that policing economic cybercrime is a multidimensional complex issue involving both national and international actors together with police forces.
  • Interviews with police officers revealed the lack of international cooperation as the key challenge to policing economic cybercrime.
  • Participants acknowledged that non-European countries were reluctant to share information related to online perpetrators.
  • “The companies sit in Luxemburg, Panama or Gibraltar are reluctant to share information.
  • It is difficult to catch them and bring to the jurisdiction crime happened.” (Participant 4)
  • Conclusion:

     Despite the growing cyber threat and cybersecurity concerns among the public, there is a lack of empirical research on discerning the challenges of policing economic cybercrime.
  • This result which confirms the previous studies indicates that governments or international and transnational actors have failed to collaborate to combat cybercrime globally.National and international initiatives such as UK Cybercrime Strategy 2016/2021 place emphasis upon reducing disparities among national jurisdictions and creating strong coordination between policing bodies and other private and governmental actors of cybersecurity to alleviate policing problems of cybercrime (Ellis and Mohan, 2019)
  • Despite these efforts, there is lack of empirical studies on this issue.
  • ENISA or another agency should actively seek to collaborate with non-EU countries
 
ARTICLE REFERENCE SOURCES
 
  • Akhgar, B., Choras, M., Brewster, B., Bosco, F., Veermeersch, E., Luda, V., Puchalski, D., and Wells, D. (2016) 'Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism', pp. 295-322 in B. Akhgar and B. Brewster (eds) Combatting cybercrime and cyberterrorism: challenges, trends and priorities: Springer. 
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., Moore, T., and Savage, S. (2013) 'Measuring the Cost of Cybercrime', pp. 265300 in The economics of information security and privacy: Springer.
  • Barthelemy, J. (2003) 'The seven deadly sins of outsourcing', Academy of Management Perspectives 17(2): 87-98. 
  • Bayley, D. H., and Shearing, C. D. (1996) 'The future of policing', Law Society Review 30: 585. 
  • BBC (2019) UK cyber-crime victims lose £190,000 a day. Available at: https://www.bbc.co.uk/news/uk-47016671 (Accessed:14/09/2019.
  • Blanco Hache, A. C., and Ryder, N. (2011) '’Tis The Season to (be Jolly?) WiseUp to Online Fraudsters. Criminals on The Web Lurking to Scam Shoppers this Christmas: A Critical Analysis of the United Kingdom's Legislative Provisions and Policies to Tackle Online Fraud', Information & Communications Technology Law 20(1): 35-56.
  • Boes, S., and Leukfeldt, E. R. (2017) 'Fighting Cybercrime: A Joint Effort' in R. M. Clark and S. Hakim (eds) Cyber-physical security: protecting critical infrastructure at the state and local level: Springer. 
  • Bond, E., and Tyrrell, K. (2018) 'Understanding revenge pornography: A national survey of police officers and staff in England and Wales', Journal of interpersonal violence: 0886260518760011. 
  • Bossler, A. M., and Holt, T. J. (2012) 'Patrol officers' perceived role in responding to cybercrime', Policing: an international journal of police strategies & management 35(1): 165-181. 
  • Braun, V., and Clarke, V. (2006) 'Using thematic analysis in psychology', Qualitative research in psychology 3(2): 77-101. 
  • Brenner, S. W. (2001) 'Is There Such a Thing as' Virtual Crime'?'. 
  • ---. (2004) 'Cybercrime Metrics: Old Wine, New Bottles?', VA. JL & TECH. 9: 13. ---. (2007) 'The Council of Europe’s Convention on Cybercrime', pp. 207-221 in J. 
  • Balkin, J. Grimmelmann, E. Katz, N. Kozlovski, S. Wagman and T. Zarsky (eds) Cybercrime: digital cops in a networked environment: NYU Press.
  • Brenner, S. W. (2010) Cybercrime: Criminal Threats from Cyberspace: USA: Prager. 
  • Button, M. (2019) Private policing: Routledge. 
  • Casey, E. (2011) 'Language of Computer Crime Investigation', pp. 35-48 in E. Casey (ed.), Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. London: Elsevier. 
  • Clough, J. (2014) 'A World of Difference: The Budapest Convention of Cybercrime and the Challenges of Harmonisation', Monash UL Rev. 40: 698. 
  • Dolliver, D. S., and Poorman, K. (2018) 'Understanding Cybercrime', pp. 139-160 in P. L. Reichel and R. Randa (eds) Transnational Crime and Global Security [2 volumes]: ABC-CLIO. Ellis, R., and Mohan, V. (2019) Rewired: Cybersecurity Governance: John Wiley & Sons. European Commission (2007) Towards a General Policy on the Fight Against Cyber Crime Available at: https://eur-lex.europa.eu/LexUriServ/ LexUriServ.do?uri= COM:2007:0267:FIN:EN:PDF.--- (2019) The EU cybersecurity certification framework. Available at:https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-certificationframework (Accessed:17/08/2019. 
  • Finn, B. M. (2019) 'Recommendations for a hybridized public private law enforcement approach'. Garland, D. (1996) 'THE LIMITS OF THE SOVEREIGN STATEStrategies of Crime Control in Contemporary Society', The British journal of criminology 36(4): 445-471. 
  • Gercke, M. (2012) Understanding Cybercrimes: Phenomena, Challenges and Legal Response: International Telecommunication Union. 
  • Gordon, S., and Ford, R. (2006) 'On the Definition and Classification of Cybercrime', Journal in Computer Virology 2(1): 13-20. 
  • Grabosky, P., and Smith, R. (2001) 'Telecommunications Fraud in the Digital Age: the Convergence of Technologies', pp. 23-43 in D. Wall (ed.), Crime and the Internet. London: Routledge. 
  • Grabosky, P. N. (2001) 'Virtual criminality: Old wine in new bottles?', Social & Legal Studies 10(2): 243-249. 
  • Graham, L. (2017) Cybercrime costs the global economy $450 billion: CEO. Available at: https://www.cnbc.com/2017/02/07/cybercrime-costs-the-globaleconomy-450-billion-ceo.html (Accessed:06/08/2019 2019). 
  • Hadlington, L., Lumsden, K., Black, A., and Ferra, F. (2018) 'A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime', Policing: A Journal of Policy and Practice. 
  • Hayes, N. (1997) 'Theory-led thematic analysis: Social identification in small companies'. 
  • Holt, T. J., Bossler, A. M., and Fitzgerald, S. (2010) 'Examining state and local law enforcement perceptions of computer crime', Crime on-line: Correlates, causes, and context: 221-246. 
  • Holt, T. J., Burruss, G. W., and Bossler, A. M. (2018) 'An examination of English and Welsh constables’ perceptions of the seriousness and frequency of online incidents', Policing and Society: 1-16. 
  • Holt, T. J., Lee, J. R., Liggett, R., Holt, K. M., and Bossler, A. (2019) 'Examining perceptions of online harassment among constables in England and Wales', International Journal of Cybersecurity Intelligence & Cybercrime 2(1): 24-39. 
  • Home Office (2014) The Serious and Organised Crime Strategy, London. 
  • --- (2018) CONTEST: The United Kingdom’s Strategy for Countering Terrorism, London. 
  • James, J. I., and Gladyshev, P. (2015) A Survey of International Cooperation in Digital Investigations, International Conference on Digital Forensics and Cyber Crime (pp. 103-114): Springer. 
  • Joh, E. E. (2019) 'Policing the smart city', International Journal of Law in Context 15(2): 177-182. 
  • Koops, B.-J. (2010) 'The internet and its opportunities for cybercrime'. 
  • Kshetri, N. (2010a) 'The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures', pp. 1-34 in The Global Cybercrime Industry: Springer. 
  • ---. (2010b) 'Structure of Cybercrime in Developing Economies', pp. 165-188 in The Global Cybercrime Industry: Springer. 
  • ---. (2013) 'Cybercrime and cyber-security issues associated with China: some economic and institutional considerations', Electronic Commerce Research 13(1): 41-69.
  • Lam, P. T. (2019) 'Public–Private Partnerships for Fire, Police, and Ambulance Services', pp. 153-165 in Public Private Partnerships: Springer. 
  • Lee, J. R., Holt, T. J., Burruss, G. W., and Bossler, A. M. (2019) 'Examining English and Welsh Detectives’ Views of Online Crime', International Criminal Justice Review: 1057567719846224. 
  • Levi, M., Doig, A., Gundur, R., Wall, D., and Williams, M. L. (2015) The Implications of Economic Cybercrime for Policing: City of London Corporation. Available at: https://www.cityoflondon.gov.uk/business/economicresearch-and-information/research-publications/Documents/Research2015/Economic-Cybercrime-FullReport.pdf. (Accessed:11 June 2017). 
  • Maguire, M., and Delahunt, B. (2017) 'Doing a thematic analysis: A practical, stepby-step guide for learning and teaching scholars', AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education 9(3). 
  • Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., and Ignatuschtschenko, E. (2013) 'Comprehensive Study on Cybercrime', United Nations Office on Drugs and Crime, Tech. Rep. 
  • Nouh, M., Nurse, J. R., Webb, H., and Goldsmith, M. (2019) 'Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement', arXiv preprint arXiv:1902.06961. 
  • Pathak, P. (2016) 'The Review of Terms and Concepts Used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals', International Journal of Advanced Research in Computer Science 7(1). 
  • Petee, T. A., Corzine, J., Huff-Corzine, L., Clifford, J., and Weaver, G. (2010) 'Defining” Cyber-crime”: Issues in Determining the Nature and Scope of Computer-related Offenses,”', Futures Working Group 5: 6-11. 
  • Reinhart, R. J. (2018) One in Four Americans Have Experienced Cybercrime. Available at: https://news.gallup.com/poll/245336/one-four-americansexperienced-cybercrime.aspx (Accessed:08/09/2019. 
  • Ruddell, R., Thomas, M. O., and Patten, R. (2011) 'Examining the roles of the police and private security officers in urban social control', International Journal of Police Science & Management 13(1): 54-69. 
  • Sandywell, B. (2013) 'On the Globalisation of Crime: the Internet and New Criminality', pp. 56-84 in Handbook of internet crime: Willan. 
  • Summerville, A. (2017) Protect against the fastest-growing crime: cyber attacks. Available at: https://www.cnbc.com/2017/07/25/stay-protected-from-the-ussfastest-growing-crime-cyber-attacks.html (Accessed:06/08/2019 2019). ↩
  • Taylor, G. (2002) 'The Council of Europe Cybercrime Convention a Civil Liberties Perspective', Retrieved June 13: 2006. 
  • The Council of Europe Convention on Cybercrime. (2001) Convention on Cybercrime. In T. C. o. Europe (Ed.). Budapest: European Treaty Series - No. 185.
  • Thomas, D., and Loader, B. (2000) 'Cybercrime: Law Enforcement, Security and Surveillance in the Information Age' in D. Thomas and B. Loader (eds) Cybercrime: Law enforcement, security and surveillance in the information age. London: Routledge. 
  • UN Congress. (2000) Crimes Related to Computer Networks, 10th United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Vienna: United Nations.
  • UN Manual (1994) United Nations Manual on the Prevention and Control of Computer-Related Crime. Available at: http://216.55.97.163/wpcontent/themes/bcb/bdf/int_regulations/un/CompCrims_UN_Guide.pdf (Accessed:21/03/2017).
  • Wall, D. S. (2005) 'Digital Realism and the Governance of Spam as Cybercrime', European journal on criminal policy and research 10(4): 309-335. 
  • ---. (2007a) Cybercrime: The transformation of crime in the information age: Polity.
  • ---. (2007b) Cybercrime: The Transformation of Crime in the Information Age: Cambridge: Polity Press.
  • ---. (2008) 'Cybercrime, Media and Insecurity: The Shaping of Public Perceptions of Cybercrime', International Review of Law, Computers & Technology 22(12): 45-63.
  • ---. (2010) 'Policing Cybercrimes: Situating the Public Police in Networks of Security Within Cyberspace (Revised May 2010)', Police Practice and Research 8(2): 183-205.
  • ---. (2013a) 'Criminalising Cyberspace: The Rise of the Internet as a ‘Crime Problem’', pp. 106-121 in Handbook of Internet Crime: Willan.
  • ---. (2013b) 'Policing Identity Crimes', pp. 29-52 in D. S. Wall and M. L. Williams (eds) Policing cybercrime: networked and social media technologies and the challenges for policing: Taylor & Francis. 
  • Wall, D. S., and Williams, M. (2014) Policing cybercrime: networked and social media technologies and the challenges for policing: Routledge. 
  • Williams, M., and Levi, M. (2015) 'Perceptions of the ecrime Controllers: Modelling the Influence of Cooperation and Data Source Factors', Security Journal 28(3): 252-271. 
  • World Medical Association. (2001) 'World Medical Association Declaration of Helsinki. Ethical principles for medical research involving human subjects', Bulletin of the World Health Organization 79(4): 373.
  • Yar, M. (2005) 'The Novelty of 'Cybercrime’ an Assessment in Light of Routine Activity Theory', European Journal of Criminology 2(4): 407-427. 
  • ---. (2013a) Cybercrime and Society: Sage. ---. (2013b) 'The Private Policing of Internet Crime' in Y. Jewkes and M. Yar (eds) ↩
 

No comments: