Research Handbooks in Business and Management series
Edited by F. Xavier Olleros and Majlinda Zhegu
Chapter 20: A continuum of Internet-based crime: how the effectiveness of cybersecurity policies varies across cybercrime types
Internet-based crime is a pressing problem. Some crimes, such as the sale of drugs and guns and the distribution of child abuse imagery, have shifted into the applications, forums and chatrooms of the Internet. Other crimes, such as data breaches and identity theft, ransomware and distributed denial of service attacks, are launched via the infrastructure of the network. Cybersecurity policies designed to counter these activities have predictably different effects across the various types of Internet-based crime. Dark Web indexing and Internet service provider botnet mitigation strategies, as two examples, affect some forms of cybercrime more than others. In particular, this chapter outlines how Internet-based crime varies along a continuum from crime in the applications of the Internet to crime via the infrastructure of the system. It then shows how cybersecurity strategies have differential effects across the various cybercrime types.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.