Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers

Research Article

Dealing with the Problem of Cybercrime

Download93 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-19513-6_1,
        author={Ali Alkaabi and George Mohay and Adrian McCullagh and Nicholas Chantler},
        title={Dealing with the Problem of Cybercrime},
        proceedings={Digital Forensics and Cyber Crime. Second International ICST Conference, ICDF2C 2010, Abu Dhabi, United Arab Emirates, October 4-6, 2010, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2012},
        month={5},
        keywords={Cybercrime Computer Crime CoE Convention on Cybercrime},
        doi={10.1007/978-3-642-19513-6_1}
    }
    
  • Ali Alkaabi
    George Mohay
    Adrian McCullagh
    Nicholas Chantler
    Year: 2012
    Dealing with the Problem of Cybercrime
    ICDF2C
    Springer
    DOI: 10.1007/978-3-642-19513-6_1
Ali Alkaabi1,*, George Mohay1,*, Adrian McCullagh1,*, Nicholas Chantler1,*
  • 1: Queensland University of Technology
*Contact email: a.alkaabi@isi.qut.edu.au, g.mohay@qut.edu.au, a.mccullagh@qut.edu.au, a.chantler@qut.edu.au

Abstract

Lack of a universally accepted and comprehensive taxonomy of cybercrime seriously impedes international efforts to accurately identify, report and monitor cybercrime trends. There is, not surprisingly, a corresponding disconnect internationally on the cybercrime legislation front, a much more serious problem and one which the International Telecommunication Union (ITU) says requires ‘the urgent attention of all nations’. Yet, and despite the existence of the Council of Europe Convention on Cybercrime, a proposal for a global cybercrime treaty was rejected by the United Nations (UN) as recently as April 2010. This paper presents a refined and comprehensive taxonomy of cybercrime and demonstrates its utility for widespread use. It analyses how the USA, the UK, Australia and the UAE align with the CoE Convention and finds that more needs to be done to achieve conformance. We conclude with an analysis of the approaches used in Australia, in Queensland, and in the UAE, in Abu Dhabi, to fight cybercrime and identify a number of shared problems.