Abstract
This paper presents an overview of certain risks posed by cyber abuse in the business context. It does not in any way represent a definitive study of this very complex area which is in a state of constant flux to the extent that the laws of nations cannot keep pace with the challenges of today let alone tomorrow. This paper therefore gives warning of this phenomenon and focusses on the role of business to its management and staff and others affected by its IT structure. The paper gives some analysis of the threats from cyber-crime and abuse from a variety of government agencies and other bodies. The underlying theme is one of caution and warning of the enemy within organisations and outside who use cyber-attack as a means to an end.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Consumer Survey, Office of Fair Trading.
- 2.
The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.
- 3.
The Internet Crime Complaint Centre. Partners: The Federal Bureau of Investigation, Bureau of Justice Assistance U.S. Department of Justice and the National White Collar Crime Centre.
- 4.
2012 Internet Crime Report IC3 p.15. www.ic3.gov.
- 5.
- 6.
Internet Security Threat Report” – Symantec, October 2009.
- 7.
Home Office June 2014.
- 8.
Home Office June 2014.
- 9.
Home Office June 2014.
- 10.
Home Office June 2014.
- 11.
Cabinet Office https://www.gov.uk/government/organisations/cabinet- office. Accessed: 10/02/15.
- 12.
2014 Information Security Breaches Survey sponsored by the Department for Business Innovation and Skills.
- 13.
Jahankhani, H., Al-Nemrat, A., Hosseinian-far, A. (2014) “Cybercrime classification and characteristics” in Cybercrime and Cyber Terrorism Investigators’ Handbook, Elsevier, ISBN 978-1447126829. And in Jahankhani, H. (2013) “Developing a model to reduce and/ or prevent cybercrime victimization among the user individuals”, in Strategic Intelligence Management, Springer, ISBN 978-0124071919.
- 14.
Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15.
- 15.
Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Paras 3 and 3.1. Accessed: 10/02/15.
- 16.
Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15 Summary.
- 17.
Cabinet Office https://www.gov.uk/government/publications/ 10 steps to cyber security advice sheet. Accessed: 10/02/15.
- 18.
Ernst & Young. Ever-increasing fraud risks in the IT and ITeS sector. (2011) p.4.
- 19.
For an example of the concerns raised at the highest levels of international arbitration see; Michael Reynolds PhD (LSE) Ethics in International Arbitration. Legal Ethics December 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Reynolds, M. (2015). The Enemy Within: The Challenge for Business from Cyber-attack. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-23276-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23275-1
Online ISBN: 978-3-319-23276-8
eBook Packages: Computer ScienceComputer Science (R0)