"IT Governance requires public and corporate cybersecurity policies to improve fighting against cybercrime and other violations. The EU, the USA and Brazil have recently developed different regulatory approaches on the subject. Assessing how to design policies in line with them across geographies se
...
ems key for effectively managing relevant global issues. After a brief introduction, the article touches on three sample topics: online privacy, open-source platforms, and latest-generation cyber-threats to illustrate how EU, US and Brazil have taken different paths. Each sample topic is analysed in detail and followed by a conclusion indicating how possibly regional or national particularities may be pragmatically reconciled by public and corporate interested parties." (Abstract)
more
"This guide aims to help correct the imbalance in capacity and expertise between human rights defenders and cybersecurity professionals and policy-makers. At the heart of the guide is an attempt to address perhaps the fundamental barrier: the absence of clear definitions and agreed terms. It will do
...
this by closely examining three separate policy areas which are often conflated under the umbrella of cybersecurity – information security, cybercrime, and cyber conflict – unpacking their policy and legal dimensions, mapping relevant stakeholders, and outlining the issues at stake. It is hoped this will help human rights defenders engage effectively in cyber policy debates at the domestic, regional and international levels." (Overview, page 6)
more
"This paper does suggest that child abuse content is the most popular type of content on the Tor Dark Net. While law enforcement may crawl such sites, the number of requests that would be seen would be only a tiny fraction, and hence not skew the outline ratios. Similarly, denial of service attacks
...
were not observed and so are also unlikely to account for the high requests. The usage of Tor2Web may underrepresent some categories, but it is not currently clear whether, or why, such groups would exclusively use this tool." (Page 9)
more
"The scale of the Internet’s underworld is immense. The number of non-indexed web sites, known as the Deep Web, is estimated to be 400 to 500 times larger than the surface web of indexed, searchable web sites. And the Deep Web is where the dark side of the Internet flourishes. While there are plen
...
ty of law-abiding citizens and well-intentioned individuals (such as journalists, political dissidents, and whistleblowers) who conduct their online activities below the surface, the part of the Deep Web known as the Darknet has become a conduit for illegal and often dangerous activities. This policy brief outlines what the Deep Web and Darknet are, how they are accessed, and why we should care about them. For policymakers, the continuing growth of the Deep Web in general and the accelerated expansion of the Darknet in particular pose new policy challenges." (Summary)
more
"Advocates of Internet freedom need to develop more responses to cybercrime and online ethics to make sure that real concerns are not exploited by repressive governments to impose Internet controls and other measures, which violate the rights to freedom of expression and freedom of information. An i
...
mproved multi-stakeholder system of Internet governance, increased transnational cooperation and increased investment in Internet safety technology is needed to combat rising levels of cybercrime. Principles of self-regulation can and should be increasingly extended to online media and online communication to fight ethical lapses in Internet content. While the nature of the Internet can compound some of the ethical problems encountered it simultaneously displays features which can help to make self-regulation work." (Page 1)
more
"Iraq’s parliament is in the process of enacting an “Information Crimes Law” to regulate the use of information networks, computers, and other electronic devices and systems. The draft law includes vague provisions that would allow Iraqi authorities to deter legitimate criticisms of or peacefu
...
l challenges to governmental or religious officials or policies. As such, the law is part of a broad effort by authorities to suppress peaceful dissent by criminalizing legitimate information sharing and networking activities." (Back cover)
more
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining
...
contributions from many of those who have established and developed cyber research over the past 25 years and who continue to shape it in its current phase, with more recent entrants to the field who are building on this tradition and breaking new ground. Contributions reflect both the global nature of cybercrime problems, and the international span of scholarship addressing its challenges." (Publisher description)
more
"The Guide contains six main chapters. After an Introduction (Chapter 1) the Guide provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and d
...
enial-of-service attacks. The Guide also provides an overview of the challenges as they relate to the investigation and prosecution of cybercrime (Chapters 3 and 4). After a summary of some of the activities undertaken by international and regional organizations in the fight against cybercrime (Chapter 5), the Guide continues with an analysis of different legal approaches with regard to substantive criminal law, procedural law, international cooperation and the responsibility of Internet Service Providers (Chapter 6), including examples of international approaches as well as good-practice examples from national solutions." (Introduction)
more
"This report is intended to provide a framework for promoting recognition and understanding of the real risks of violence for children and young people within cyberspace and through the use of new technologies, in particular the Internet and mobile phones. It identifies the harms confronted by child
...
ren and young people in this environment and uses the data available to assess current and emerging patterns. It raises concerns about new areas where harm may occur, which may be averted if early action is taken. Finally, it makes recommendations that may be enacted by a wide range of actors to serve the best interests of all children and young people, and thus the wider society." (Executive summary)
more