Special Issue "Developments in Cybercrime and Cybercrime Mitigation"

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (30 August 2014) | Viewed by 7672

Special Issue Editors

Dr. Mamoun Alazab
E-Mail Website
Guest Editor
ANU Cybercrime Observatory, Australian National University, Canberra ACT 0200, Australia
Dr. Ameer Al-Nemrat
E-Mail Website
Guest Editor
School of Architecture, Computing & Engineering, University of East London, Beckton, London E16 2RD, UK

Special Issue Information

Dear Colleagues,

Cybercrime is a multidisciplinary area that encompasses law, computer science, psychology, psychophysiology, economics and finance, telecommunications, data analytics, and policing. Cybercrime is a timely issue, which presents numerous and constantly evolving challenges to academic, private sector, government, and law enforcement agencies. The decentralized nature of the Internet makes this a global issue that cannot be solved by a single company or country alone. This is especially the case given the high level of sophistication, commercialization, and organization of cybercrime attacks. Cybercrime has implications for national, supranational, and international legislation, cooperation between law enforcement organizations, cooperation between the public and private sectors, and for international coordination against transnational crime. This call for papers will produce a journal on cybercrime and cyber security. Researchers, academics, and practitioners are invited to submit original work, research papers, laboratory experiments, case studies, and experience reports.

This Special Issue aims to foster state-of-the-art research in the area of cybercrime and cyber security.

Topics include, but are not limited to:

  • Ÿthe changing nature of cybercrime: threats and trends
  • Ÿcybercrime regulation, policy recommendations, and responses
  • Ÿtechnical measures to combat cybercrime: techniques, judicial processes, legal/ethical issues, and cybercrime legislations
  • Ÿelectronic evidence and criminal justice
  • Ÿcybercrime detection and prevention
  • Ÿmalware analysis, attribution, forensics, and reverse-engineering
  • Ÿspam emails, statistical analysis, and data mining
  • Ÿcybercrime victims and offenders: psychology and profiling
  • Ÿcybercrime investigations, concerning, e.g., computer and mobile forensics, online fraud, money laundering, hacking, malware, and botnets, sexual abuse of children on the Internet, software and media piracy, etc.
  • Ÿcloud security, privacy, and compliance challenges
  • Ÿmisuse of personal data and the right to online privacy vs. anonymity

Dr. Mamoun Alazab
Dr. Ameer Al-Nemrat
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.


  • cybercrime
  • cyber security
  • information security
  • malware
  • spam
  • cybercrime prevention
  • cybercrime detection
  • cloud security
  • computer forensic investigation
  • cybercrime victims
  • cybercrime offenders
  • cybercrime regulation
  • child pornography

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:


13 pages, 292 KiB  
Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users
Future Internet 2014, 6(4), 760-772; https://doi.org/10.3390/fi6040760 - 27 Nov 2014
Cited by 9 | Viewed by 6780
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview [...] Read more.
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rates of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness. Full article
(This article belongs to the Special Issue Developments in Cybercrime and Cybercrime Mitigation)
Show Figures

Graphical abstract

Back to TopTop