Contents
Foreword
Abbreviations
Executive summary
Key findings
Key recommendations
Chapter 1 - Introduction
Aim
Scope
Methodology and acknowledgements
Chapter 2 - The state of the Internet
Chapter 3 - Crime areas
3.1 Crime-as-a-Service
3.2 Malware
3.3 Child sexual exploitation online
3.4 Payment fraud
3.5 Criminal finances online
3.6 Crimes relating to social engineering
3.7 Data breaches and network intrusions
3.8 Vulnerabilities of critical infrastructure
Chapter 4 - Facilitators and relevant factors
4.1 Social networking
4.2 Anonymisation tools
4.3 Internet governance
4.4 The future is already here
4.4.1 Big Data
4.4.2 Internet of Everything
4.4.3 Cloud computing and services
Chapter 5 - Geographical distribution
Chapter 6 - Law enforcement
Chapter 7 – Conclusions
Appendices
A1. Academic advisors
A2. Cyber legislation
A3. Cyberpsychology
A4. Data protection
Copyright
Footnotes