Cybercrime During the SARS-CoV-2 Pandemic -  - E-Book

Cybercrime During the SARS-CoV-2 Pandemic E-Book

0,0
142,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved. In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 370

Veröffentlichungsjahr: 2023

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.


Ähnliche


Table of Contents

Cover

Title Page

Copyright Page

Introduction

I.1. The context

I.2. Literature review: works on the theme “cybercrime and Covid”

I.3. Our research questions

I.4. References

1 The Evolution of Cybercrime During the Covid-19 Crisis

1.1. Introduction

1.2. Observing the evolution of cybercrime

1.3. Has the global geography of cyberattacks changed?

1.4. Conclusion

1.5. Appendix

1.6. References

2 The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada

2.1. Introduction

2.2. The impacts of the SARS-CoV-2 pandemic

2.3. Cybercrime and SARS-CoV-2

2.4. The evolution of cybercrime in North America during the pandemic

2.5. Discussion

2.6. Conclusion

2.7. Acknowledgments

2.8. References

3 Online Radicalization as Cybercrime: American Militancy During Covid-19

3.1. Introduction

3.2. A new typology of cybercrime

3.3. Internet connectivity and violent militancy

3.4. The pre-pandemic domestic threat landscape

3.5. The domestic threat landscape of the pandemic

3.6. Pandemic accelerationism

3.7. From virtual to real-life criminality

3.8. Online radicalization during Covid-19

3.9. A new methodological paradigm for online radicalization?

3.10. Conclusion: meta-radicalization as cybercrime

3.11. References

4 Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions

4.1. Introduction: Brazilian cybercrime and the Covid crisis impact

4.2. Cybercrime in the literature and the Brazilian case

4.3. A theoretical model for international cooperation

4.4. The evolution of cybercrime in Brazil

4.5. The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime

4.6. Managing international cooperation without having the best tools

4.7. Difficulties with cooperation: joints, mortises, and notches

4.8. Conclusion: what to expect from the future?

4.9. References

4.10. Appendix: List of interviews and questions

5 Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal?

5.1. Introduction

5.2. The impact of the Covid-19 pandemic on cybercrime

5.3. Evolution of cybercrime in Portugal

5.4. Online identity theft (OIT)

5.5. Fear of (online) crime

5.6. The present study

5.7. Conclusion

5.8. References

6 A South African Perspective on Cybercrime During the Pandemic

6.1. Introduction

6.2. International rankings

6.3. Cybercrime and related legislation

6.4. Cybersecurity incidents

6.5. Discussion

6.6. Conclusion

6.7. References

List of Authors

Index

Other titles from ISTE in Science, Society and New Technologies

End User License Agreement

List of Tables

Chapter 1

Table 1.1 Summary of the cybercrime data sources used in this chapter

Table 1.2 List of variables confronted with data on cybercrime

Table 1.3 Typology of cyber-incidents recorded by Malaysia CERT (1998-2022)

Table 1.4 Evolution in the number of complaints relating to content on the Int...

Chapter 2

Table 2.1 Number of increasing cybercrimes reported to IC3 from 2018 to 2020 [...

Table 2.2 Number of stable cybercrimes reported to IC3 from 2018 to 2020 [INT ...

Table 2.3 Decreasing number of cybercrimes reported to IC3 from 2018 to 2020 [...

Table 2.4 Proportion of each type of cyberattack in the United States in 2020 ...

Chapter 4

Table 4.1 Domains with most complaints to SaferNet from 2006 to mid-2021.

Table 4.2 Categories of complaints to SaferNet demanding content removal (2017...

Table 4.3 Correlation of the Cybercrime Convention and Brazilian law.

Chapter 5

Table 5.1 Descriptive results of the sociodemographic variables for both sampl...

Table 5.2 Descriptive statistics of the main variables of the present study

Table 5.3 Prevalence of online victimization during the Covid-19 pandemic

Chapter 6

Table 6.1 Annual ranking and number of complaints outside the United States to...

Table 6.2 Comparison of annual complaints ranking and cumulative Covid numbers...

Table 6.3 Annual ITU cybersecurity index rankings for South Africa [ITU 17, IT...

Table 6.4 Difference in fraud from South Africa versus globally

Table 6.5 Disinformation/misinformation in South Africa (data source: [MMA 22b...

List of Illustrations

Chapter 1

Figure 1.1 Internet sales as a percentage of UK total retail sales, November 2...

Figure 1.2 Evolution in the number of individuals using the Internet around th...

Figure 1.3 Rate of Internet use in the population (reconstructed from data pub...

Figure 1.4 The evolution of cybercrime in India. Curves reconstructed from dat...

Figure 1.5 Evolution of cybercrime in India (number of cases, number of arrest...

Figure 1.6 Number of cyber incidents reported to CERT.in (reconstructed from C...

Figure 1.7 Total of cyber incidents reported to the CERT in Malaysia, from Jan...

Figure 1.8 Evolution in the number of cyber incidents reported to the CERT in ...

Figure 1.9 Cyber incidents reported to the CERT in Malaysia, from January 2020...

Figure 1.10 The two curves (cyber incidents reported, evolution of the mobilit...

Figure 1.11 Curve of cyber incidents versus “stringency” and “health and conta...

Figure 1.12 The number of reported cyber incidents is negatively correlated wi...

Figure 1.13 Evolution in the number of cyber incidents versus mobility index (...

Figure 1.14 Annual evolution in the number of cyber incidents recorded by the ...

Figure 1.15 Evolution in the total number of cyber incidents recorded by CERT....

Figure 1.16 Number of cyber incidents reported to CERT.Br in 2020 (graph recon...

Figure 1.17 Evolution in the number of spamming cases recorded by CERT.br duri...

Figure 1.18 Evolution of the “stay-at-home requirements” index for China, from...

Figure 1.19 Respective evolution of the “stay-at-home” index and the number of...

Figure 1.20 Respective evolution of the “stay-at-home” index and the number of...

Figure 1.21 Respective evolution of the “stay-at-home” index and the number (i...

Figure 1.22 Respective evolution of the “stay-at-home” index and the number of...

Figure 1.23 Respective evolution of the “stay-at-home” index and the number of...

Figure 1.24 Respective evolution of the “stay-at-home” index and the number of...

Figure 1.25 Respective evolution of the “stay-at-home” index and overall incid...

Figure 1.26 Respective evolution of the “stay at home” index and overall incid...

Figure 1.27 Number of cyber operations recorded monthly by the CSIS from April...

Figure 1.28 Number of cyber operations recorded yearly by the CSIS from April ...

Figure 1.29 Cyberattacks – CFR data – annual frequency for each attack motive ...

Figure 1.30 Distribution of cyberattacks worldwide, according to CSIS reports,...

Figure 1.31 Distribution of cyberattacks around the world, according to CSIS r...

Figure 1.32 Total number of known malware (in millions). Reconstructed from da...

Figure 1.33 Number of new malware software/month (in millions). Reconstructed ...

Figure 1.34 Evolution of CVSS depending on their level of severity over time (...

Figure 1.35 Change in the proportion (in %) of CVSS severity levels (curves re...

Figure 1.36 United Kingdom, companies facing cyber risks. Histogram reconstruc...

Chapter 2

Figure 2.1 Confirmed cases of Covid-19 in Canada [WHO 22a]

Figure 2.2 United States of America’s situation [WHO 22b]

Figure 2.3 Cybercrime categories by the Royal Canadian Mounted Police [GRC 14]

Chapter 4

Figure 4.1 Article 36 criteria for the European Commission to assess the data ...

Figure 4.2 Classification of national systems for legal interoperability asses...

Figure 4.3 Federal procedures against cybercrime by law enforcement personnel.

Chapter 6

Figure 6.1 New reported cases for Covid-19 in South Africa [WHO 21]

Figure 6.2 Complaints and ranking for South Africa [IC3 13, IC3 14, IC3 15, IC...

Figure 6.3 South Africa and global changes in digital fraud (data source: [TRA...

Figure 6.4 Disinformation and Covid cases (data sources: [MMA 22b, WHO 21])

Guide

Cover Page

Title Page

Copyright Page

Introduction

Table of Contents

Begin Reading

List of Authors

Index

Other titles from ISTE in Science, Society and New Technologies

WILEY END USER LICENSE AGREEMENT

Pages

iii

iv

ix

x

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxx

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

2

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

211

212

213

214

215

216

217

218

219

220

221

222

223

224

Cybersecurity Setcoordinated byDaniel Ventre

Volume 3

Cybercrime During the SARS-CoV-2 Pandemic (2019-2022)

Evolutions, Adaptations, Consequences

Edited by

Daniel VentreHugo Loiseau

First published 2023 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:

ISTE Ltd

John Wiley & Sons, Inc.

27-37 St George’s Road

111 River Street

London SW19 4EU

Hoboken, NJ 07030

UK

USA

www.iste.co.uk

www.wiley.com

© ISTE Ltd 2023The rights of Daniel Ventre and Hugo Loiseau to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.

Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group.

Library of Congress Control Number: 2022950071

British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISBN 978-1-78630-801-6