142,99 €
The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved. In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 370
Veröffentlichungsjahr: 2023
Cover
Title Page
Copyright Page
Introduction
I.1. The context
I.2. Literature review: works on the theme “cybercrime and Covid”
I.3. Our research questions
I.4. References
1 The Evolution of Cybercrime During the Covid-19 Crisis
1.1. Introduction
1.2. Observing the evolution of cybercrime
1.3. Has the global geography of cyberattacks changed?
1.4. Conclusion
1.5. Appendix
1.6. References
2 The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada
2.1. Introduction
2.2. The impacts of the SARS-CoV-2 pandemic
2.3. Cybercrime and SARS-CoV-2
2.4. The evolution of cybercrime in North America during the pandemic
2.5. Discussion
2.6. Conclusion
2.7. Acknowledgments
2.8. References
3 Online Radicalization as Cybercrime: American Militancy During Covid-19
3.1. Introduction
3.2. A new typology of cybercrime
3.3. Internet connectivity and violent militancy
3.4. The pre-pandemic domestic threat landscape
3.5. The domestic threat landscape of the pandemic
3.6. Pandemic accelerationism
3.7. From virtual to real-life criminality
3.8. Online radicalization during Covid-19
3.9. A new methodological paradigm for online radicalization?
3.10. Conclusion: meta-radicalization as cybercrime
3.11. References
4 Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions
4.1. Introduction: Brazilian cybercrime and the Covid crisis impact
4.2. Cybercrime in the literature and the Brazilian case
4.3. A theoretical model for international cooperation
4.4. The evolution of cybercrime in Brazil
4.5. The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime
4.6. Managing international cooperation without having the best tools
4.7. Difficulties with cooperation: joints, mortises, and notches
4.8. Conclusion: what to expect from the future?
4.9. References
4.10. Appendix: List of interviews and questions
5 Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal?
5.1. Introduction
5.2. The impact of the Covid-19 pandemic on cybercrime
5.3. Evolution of cybercrime in Portugal
5.4. Online identity theft (OIT)
5.5. Fear of (online) crime
5.6. The present study
5.7. Conclusion
5.8. References
6 A South African Perspective on Cybercrime During the Pandemic
6.1. Introduction
6.2. International rankings
6.3. Cybercrime and related legislation
6.4. Cybersecurity incidents
6.5. Discussion
6.6. Conclusion
6.7. References
List of Authors
Index
Other titles from ISTE in Science, Society and New Technologies
End User License Agreement
Chapter 1
Table 1.1 Summary of the cybercrime data sources used in this chapter
Table 1.2 List of variables confronted with data on cybercrime
Table 1.3 Typology of cyber-incidents recorded by Malaysia CERT (1998-2022)
Table 1.4 Evolution in the number of complaints relating to content on the Int...
Chapter 2
Table 2.1 Number of increasing cybercrimes reported to IC3 from 2018 to 2020 [...
Table 2.2 Number of stable cybercrimes reported to IC3 from 2018 to 2020 [INT ...
Table 2.3 Decreasing number of cybercrimes reported to IC3 from 2018 to 2020 [...
Table 2.4 Proportion of each type of cyberattack in the United States in 2020 ...
Chapter 4
Table 4.1 Domains with most complaints to SaferNet from 2006 to mid-2021.
Table 4.2 Categories of complaints to SaferNet demanding content removal (2017...
Table 4.3 Correlation of the Cybercrime Convention and Brazilian law.
Chapter 5
Table 5.1 Descriptive results of the sociodemographic variables for both sampl...
Table 5.2 Descriptive statistics of the main variables of the present study
Table 5.3 Prevalence of online victimization during the Covid-19 pandemic
Chapter 6
Table 6.1 Annual ranking and number of complaints outside the United States to...
Table 6.2 Comparison of annual complaints ranking and cumulative Covid numbers...
Table 6.3 Annual ITU cybersecurity index rankings for South Africa [ITU 17, IT...
Table 6.4 Difference in fraud from South Africa versus globally
Table 6.5 Disinformation/misinformation in South Africa (data source: [MMA 22b...
Chapter 1
Figure 1.1 Internet sales as a percentage of UK total retail sales, November 2...
Figure 1.2 Evolution in the number of individuals using the Internet around th...
Figure 1.3 Rate of Internet use in the population (reconstructed from data pub...
Figure 1.4 The evolution of cybercrime in India. Curves reconstructed from dat...
Figure 1.5 Evolution of cybercrime in India (number of cases, number of arrest...
Figure 1.6 Number of cyber incidents reported to CERT.in (reconstructed from C...
Figure 1.7 Total of cyber incidents reported to the CERT in Malaysia, from Jan...
Figure 1.8 Evolution in the number of cyber incidents reported to the CERT in ...
Figure 1.9 Cyber incidents reported to the CERT in Malaysia, from January 2020...
Figure 1.10 The two curves (cyber incidents reported, evolution of the mobilit...
Figure 1.11 Curve of cyber incidents versus “stringency” and “health and conta...
Figure 1.12 The number of reported cyber incidents is negatively correlated wi...
Figure 1.13 Evolution in the number of cyber incidents versus mobility index (...
Figure 1.14 Annual evolution in the number of cyber incidents recorded by the ...
Figure 1.15 Evolution in the total number of cyber incidents recorded by CERT....
Figure 1.16 Number of cyber incidents reported to CERT.Br in 2020 (graph recon...
Figure 1.17 Evolution in the number of spamming cases recorded by CERT.br duri...
Figure 1.18 Evolution of the “stay-at-home requirements” index for China, from...
Figure 1.19 Respective evolution of the “stay-at-home” index and the number of...
Figure 1.20 Respective evolution of the “stay-at-home” index and the number of...
Figure 1.21 Respective evolution of the “stay-at-home” index and the number (i...
Figure 1.22 Respective evolution of the “stay-at-home” index and the number of...
Figure 1.23 Respective evolution of the “stay-at-home” index and the number of...
Figure 1.24 Respective evolution of the “stay-at-home” index and the number of...
Figure 1.25 Respective evolution of the “stay-at-home” index and overall incid...
Figure 1.26 Respective evolution of the “stay at home” index and overall incid...
Figure 1.27 Number of cyber operations recorded monthly by the CSIS from April...
Figure 1.28 Number of cyber operations recorded yearly by the CSIS from April ...
Figure 1.29 Cyberattacks – CFR data – annual frequency for each attack motive ...
Figure 1.30 Distribution of cyberattacks worldwide, according to CSIS reports,...
Figure 1.31 Distribution of cyberattacks around the world, according to CSIS r...
Figure 1.32 Total number of known malware (in millions). Reconstructed from da...
Figure 1.33 Number of new malware software/month (in millions). Reconstructed ...
Figure 1.34 Evolution of CVSS depending on their level of severity over time (...
Figure 1.35 Change in the proportion (in %) of CVSS severity levels (curves re...
Figure 1.36 United Kingdom, companies facing cyber risks. Histogram reconstruc...
Chapter 2
Figure 2.1 Confirmed cases of Covid-19 in Canada [WHO 22a]
Figure 2.2 United States of America’s situation [WHO 22b]
Figure 2.3 Cybercrime categories by the Royal Canadian Mounted Police [GRC 14]
Chapter 4
Figure 4.1 Article 36 criteria for the European Commission to assess the data ...
Figure 4.2 Classification of national systems for legal interoperability asses...
Figure 4.3 Federal procedures against cybercrime by law enforcement personnel.
Chapter 6
Figure 6.1 New reported cases for Covid-19 in South Africa [WHO 21]
Figure 6.2 Complaints and ranking for South Africa [IC3 13, IC3 14, IC3 15, IC...
Figure 6.3 South Africa and global changes in digital fraud (data source: [TRA...
Figure 6.4 Disinformation and Covid cases (data sources: [MMA 22b, WHO 21])
Cover Page
Title Page
Copyright Page
Introduction
Table of Contents
Begin Reading
List of Authors
Index
Other titles from ISTE in Science, Society and New Technologies
WILEY END USER LICENSE AGREEMENT
iii
iv
ix
x
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
xxi
xxii
xxiii
xxiv
xxv
xxvi
xxvii
xxviii
xxix
xxx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
2
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
211
212
213
214
215
216
217
218
219
220
221
222
223
224
Cybersecurity Setcoordinated byDaniel Ventre
Volume 3
Edited by
Daniel VentreHugo Loiseau
First published 2023 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd
John Wiley & Sons, Inc.
27-37 St George’s Road
111 River Street
London SW19 4EU
Hoboken, NJ 07030
UK
USA
www.iste.co.uk
www.wiley.com
© ISTE Ltd 2023The rights of Daniel Ventre and Hugo Loiseau to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988.
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s), contributor(s) or editor(s) and do not necessarily reflect the views of ISTE Group.
Library of Congress Control Number: 2022950071
British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISBN 978-1-78630-801-6