Contents
Next

Contents

  1. Foreword
  2. Abbreviations
  3. Executive summary
  4. Key findings
  5. Key recommendations
  6. Chapter 1 - Introduction
    1. Aim
    2. Scope
    3. Methodology and acknowledgements
  7. Chapter 2 - The state of the Internet
  8. Chapter 3 - Crime areas
    1. 3.1 Crime-as-a-Service
    2. 3.2 Malware
    3. 3.3 Child sexual exploitation online
    4. 3.4 Payment fraud
    5. 3.5 Criminal finances online
    6. 3.6 Crimes relating to social engineering
    7. 3.7 Data breaches and network intrusions
    8. 3.8 Vulnerabilities of critical infrastructure
  9. Chapter 4 - Facilitators and relevant factors
    1. 4.1 Social networking
    2. 4.2 Anonymisation tools
    3. 4.3 Internet governance
    4. 4.4 The future is already here
      1. 4.4.1 Big Data
      2. 4.4.2 Internet of Everything
      3. 4.4.3 Cloud computing and services
  10. Chapter 5 - Geographical distribution
  11. Chapter 6 - Law enforcement
  12. Chapter 7 – Conclusions
  13. Appendices
    1. A1. Academic advisors
    2. A2. Cyber legislation
    3. A3. Cyberpsychology
    4. A4. Data protection
  14. Copyright
  15. Footnotes