Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 22, 2024 Fri

Time: 11:34 am

Results for internet crimes (u.k.)

3 results found

Author: Aston, Helen

Title: Protecting Children Online: Teachers' Perspectives on eSafety - Full Report

Summary: This report provides an analysis of the responses to 11 questions from a bespoke NFER online teacher survey, using NFER's Teacher Voice Panel, that took place in January 2012. Supporting information about the survey is also provided. The questions covered the topics of e-safety, cyberbullying, pupil use of mobile phones and social networking. We present the results by school phase (primary and secondary) in the main body of the report, and provide a regional breakdown of data in the appendix. More detailed analysis is available on a set of interactive web-based tables produced separately (in Pulsar Web). The report commissioned by the Department for Education's Vital Programme (delivered by the Open University) and compiled by NFER will be used to inform communications about teachers' professional development and content for courses as Vital aims to help educational establishments use IT to add value to lessons and find new ways to engage learners. A Vital role is to support teachers in extending and sharing their expertise, and re-taking ownership of teaching as a discipline. Michael Gove recently commented: One of the greatest changes can be seen in the lives of children and young people, who are at ease with the world of technology and who communicate, socialise and participate online effortlessly. Clearly, schools have an important role to play in introducing children and young people to technology and teaching them to navigate it and capitalise on the opportunities it offers in a safe way. As the use of technology increases -- and use of the internet and smartphones (among 12 -- 15 year olds) has increased since 2010 according to OFCOM2 -- it becomes ever more important to ensure that teachers are equipped to teach e-safety skills to pupils. The survey data that we have collected provides a nationally representative snapshot of teachers' views about e-safety.

Details: Slough, U.K.: National Foundation for Educational Research, 2012. 65p.

Source: Internet Resource: Accessed March 21, 2012 at http://www.nfer.ac.uk/nfer/publications/95001/95001.pdf

Year: 2012

Country: United Kingdom

URL: http://www.nfer.ac.uk/nfer/publications/95001/95001.pdf

Shelf Number: 124642

Keywords:
Cyberbullying (U.K.)
Internet Crimes (U.K.)
Internet Safety (U.K.)
Schools (U.K.)
Social Networking (U.K.)

Author: Anderson, Ross

Title: Measuring the Cost of Cybercrime

Summary: In this paper we present what we believe to be the rst systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs { both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now `cyber' because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we nd that traditional o ences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/Euros/dollars a year; transitional frauds cost a few pounds/Euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be roughly comparable to what the criminals earn, while for the latter they may be an order of magnitude more. As a striking example, the botnet behind a third of the spam sent in 2010 earned its owners around US$2.7m, while worldwide expenditures on spam prevention probably exceeded a billion dollars. We are extremely inecient at ghting cybercrime; or to put it another way, cybercrooks are like terrorists or metal thieves in that their activities impose disproportionate costs on society. Some of the reasons for this are well-known: cybercrimes are global and have strong externalities, while traditional crimes such as burglary and car theft are local, and the associated equilibria have emerged after many years of optimisation. As for the more direct question of what should be done, our gures suggest that we should spend less in anticipation of cybercrime (on antivirus, rewalls, etc.) and more in response { that is, on the prosaic business of hunting down cyber-criminals and throwing them in jail.

Details: Berlin: Workshop on the Economics of Information Security, 2012. 31p.

Source: Conference Report: Internet Resource: Accessed August 14, 2012 at http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

Year: 2012

Country: United Kingdom

URL: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf

Shelf Number: 126027

Keywords:
Computer Crime (U.K.)
Costs of Crime (U.K.)
Cybercrimes (U.K.)
Internet Crimes (U.K.)

Author: Great Britain. House of Commons. Science and Technology Committee

Title: Malware and cyber crime

Summary: Malware comes in different forms. A novel way cybercrime is being perpetrated on individuals is through the use of artificial dialogue systems that are flirting chatbots, such as CyberLover. This kind of malware penetrates instant messaging platforms (eg MSN Messenger) and Internet chatrooms. The unaware individual is tricked into believing they are chatting to a human in cyberspace when in fact a social engineering attack is taking place in an attempt to steal identity and conduct financial fraud. This kind of threat will increase as the sophistication of artificial dialogue systems improves. Detecting deception by this type of malware is crucial. Through recognition of “human conversation” and identification of artificial dialogue, the risk of identity theft can be mitigated preventing loss of funds, and reducing psychological misery.

Details: London: The Stationary Office, 2012. 2 vols.

Source: Twelfth Report of Session 2010-12: Internet Resource: Accessed August 22, 2012 at http://www.publications.parliament.uk/pa/cm201012/cmselect/cmsctech/1537/1537vw.pdf

Year: 2012

Country: United Kingdom

URL: http://www.publications.parliament.uk/pa/cm201012/cmselect/cmsctech/1537/1537vw.pdf

Shelf Number: 126101

Keywords:
Computer Crimes (U.K.)
Cybercrimes (U.K.)
Internet Crimes (U.K.)