A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://link.springer.com/chapter/10.1007/978-1-4614-5218-8_4 below:

Cybercrime in Asia: Trends and Challenges

Abstract

The rapid growth in Internet use in Asia, including a tenfold or more increases in access in China, Indonesia, and India since 2002 has also been accompanied by significant increases in cybercrime. The development of commercial-scale exploit toolkits and criminal networks that focus on monetization of malware has amplified the risks of cybercrime. The law-enforcement response in Asia is briefly reviewed in the context of the 2001 Council of Europe’s Cybercrime (Budapest) Convention. We describe the nature of cybercrime (including both “hate” or content and “crime-ware” such as botnets) and compare the laws and regulations in Asian states with the provisions of the Convention. The challenges faced in developing effective cross-national policing of cybercrime in Asia are also addressed as problems emerge around cloud computing, social media, wireless/smart phone applications and other innovations in digital technology.

This is a preview of subscription content, log in via an institution to check access.

Similar content being viewed by others Notes
  1. 1.

    A worm is a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, can travel without any help from a person. The danger with a worm is its ability to replicate itself.

  2. 2.

    A botnet is a network of individual computers infected with malware. These compromised computers are also known as zombie computers. The zombies, part of a botnet under the control of the botnet controller, can then be used as remote attack tools to facilitate the sending of spam, hosting of phishing websites, distribution of malware and mounting denial of service attacks. The most commonly used are centralised and P2P modes—hence the focus on command and control servers for a botnet that may comprise of thousands of zombies.

  3. 3.

    The Symantec “APJ Internet Security Threat Report” measured malicious activity that mainly involved botnet-infected computers, bot command-and-control servers, phishing Web sites hosts, malicious code reports, spam zombies and Internet attack origins that took place or originated in each country. Rankings were based on a calculation of the mean average of the proportion of these malicious activities originating in each country (Symantec 2007a, b, 2008, 2009, 2011).

  4. 4.

    The survey includes the United States, Australia, Brazil, Canada, China, France, German, India, Italy, Japan, New Zealand, Spain, Sweden and the United Kingdom.

  5. 5.

    Rootkits are cloaking technologies usually employed by other malware programs to misuse compromised systems by hiding files, registry keys and other operating system objects from diagnostic, antivirus and security programs.

  6. 6.

    Budapest was the city in which the Convention was opened for signature November 8, 2001.

  7. 7.

    The Council of Europe (CoE), founded in 1949, comprises 45 countries, including the members of the European Union (a separate entity), as well as countries from Central and Eastern Europe. Headquartered in Strasbourg, France, the CoE was formed as a vehicle for integration in Europe, and its aims include agreements and common actions in economic, social, cultural, legal and administrative matters.

  8. 8.

    Only after ratification by five states (including at least three from members of the CoE) will the Convention enter into force. Albania, Croatia, Estonia, Hungry and Lithuania were the first five states to ratify the Convention.

  9. 9.

    For more detail description and discussion of the Convention, please see Weber (2003) and Broadhurst (2006b).

  10. 10.

    The countries investigated include Australia, China, Hong Kong, India, Indonesia, Japan, Malaysia, New Zealand, Philippines, Singapore, South Korea, Taiwan, Thailand and Vietnam.

References

Download references

Author information Authors and Affiliations
  1. Australian Research Council Centre for Excellence in Security and Policing, Australian National University, Canberra, ACT, Australia

    Roderic Broadhurst Ph.D.

  2. City University of Hong Kong, Kowloon, Hong Kong

    Lennon Y. C. Chang Ph.D.

Corresponding author

Correspondence to Roderic Broadhurst Ph.D. .

Editor information Editors and Affiliations
  1. Department of Sociology, University of Macau, Taipa, Macao, Macao

    Jianhong Liu

  2. Centre for Criminology and Criminal Just, University of Manchester, Manchester, United Kingdom

    Bill Hebenton

  3. School of Criminology, National Taipei University, Taipei, Taiwan R.O.C.

    Susyan Jou

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter Cite this chapter

Broadhurst, R., Chang, L.Y.C. (2013). Cybercrime in Asia: Trends and Challenges. In: Liu, J., Hebenton, B., Jou, S. (eds) Handbook of Asian Criminology. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5218-8_4

Download citation

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.3