The Internet Organised Crime Threat Assessment: iOCTA 2015
The report lists a number of key recommendations to address the growing phenomenon of cybercrime and identifies several priority topics to inform the definition of operational actions for EU law enforcement in the framework of the EMPACT Policy Cycle. These include concrete actions under the three m...
Corporate Author: | |
---|---|
Format: | Electronic Book |
Language: | English |
Published: |
Den Haag
Europol
2015
|
In: | Year: 2015 |
Online Access: |
Volltext (kostenfrei) Volltext (kostenfrei) |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | 1760328987 | ||
003 | DE-627 | ||
005 | 20241009011922.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210611s2015 xx |||||o 00| ||eng c | ||
020 | |a 9789295200654 |9 978-92-95200-65-4 | ||
024 | 7 | |a 10.2813/03524 |2 doi | |
035 | |a (DE-627)1760328987 | ||
035 | |a (DE-599)KXP1760328987 | ||
035 | |a (OCoLC)1459220139 | ||
035 | |a (EUP)vtls000388548 | ||
035 | |a (DE-627-1)108183041 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
245 | 0 | 4 | |a The Internet Organised Crime Threat Assessment |b iOCTA 2015 |c Europol |
264 | 1 | |a Den Haag |b Europol |c 2015 | |
300 | |a 74 Seiten |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access | |
520 | |a The report lists a number of key recommendations to address the growing phenomenon of cybercrime and identifies several priority topics to inform the definition of operational actions for EU law enforcement in the framework of the EMPACT Policy Cycle. These include concrete actions under the three main mandated areas - child sexual exploitation, cyber attacks, and payment fraud - such as targeting certain key services and products offered as part of the Crime-as-a-Service model, addressing the growing phenomenon of live-streaming of on-demand abuse of children, or targeted actions with relevant private sector partners against online payment fraud. The report also identifies several cross-cutting crime enablers such as bulletproof hosting, illegal trading sites on Darknets and money muling and laundering services that require concerted and coordinated international law enforcement action. | ||
540 | |a All rights reserved | ||
610 | 2 | 7 | |0 (DE-588)5098525-5 |0 (DE-627)132918269 |0 (DE-576)194702391 |a Europäische Union |2 gnd |
650 | 0 | 7 | |0 (DE-588)4043830-2 |0 (DE-627)104189177 |0 (DE-576)209057513 |a Organisiertes Verbrechen |2 gnd |
650 | 0 | 7 | |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
650 | 4 | |a Fight against crime | |
650 | 4 | |a Organised Crime | |
650 | 4 | |a common strategy | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Software | |
650 | 4 | |a network server | |
650 | 4 | |a Internet | |
650 | 4 | |a prevention of delinquency | |
650 | 4 | |a Digital technology | |
650 | 4 | |a Child Pornography | |
650 | 4 | |a Terrorism | |
650 | 4 | |a Data Protection | |
650 | 4 | |a Report | |
710 | 2 | |a Europol |e Herausgebendes Organ |0 (DE-588)10028615-X |0 (DE-627)335250114 |0 (DE-576)198833474 |4 isb | |
856 | 4 | 0 | |u https://doi.org/10.2813/03524 |m X:EUP |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://www.europol.europa.eu/sites/default/files/documents/europol_iocta_web_2015.pdf |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-330-EUO | ||
951 | |a BO | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3936933057 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1760328987 | ||
LOK | |0 005 20210611141939 | ||
LOK | |0 008 210611||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |