Challenges priorities and policies: Mapping the research requirements of cybercrime and cyberterrorism stakeholders

2Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The following chapter provides an in depth look at a broad selection challenges related to Cybercrime and Cyberterrorism, as identified through prolonged engagement with a multitude of horizontal and vertical cyber-security stakeholders. Out of six critical areas identified, the two leading causes, were through the evolving rate of technology, and, the subsequent lack of education, awareness and training. These two underlying factors further influenced and affected the severity of the additional four critical areas; the capability of investigators, cooperation and information sharing, legislative systems and data protection, and, organisational and societal resilience. Through the consultation and elicitation of information from over 90 individual domain experts, practitioners and security stakeholders, the research of this chapter is dedicated towards improving international awareness towards leading threats, vulnerabilities, and challenges to the continually evolving sphere of cybersecurity.

Cite

CITATION STYLE

APA

Wells, D., Brewster, B., & Akhgar, B. (2016). Challenges priorities and policies: Mapping the research requirements of cybercrime and cyberterrorism stakeholders. In Advanced Sciences and Technologies for Security Applications (pp. 39–51). Springer. https://doi.org/10.1007/978-3-319-38930-1_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free