Research Proposal Handout 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Research Proposal Handout

Prepared by Ismail Marzuki


State Islamic University of Sultan Syarif Kasim Riau - Indonesia

Proposed Research Topic: “Telescoped Internet Security Issues from Technical,


Business and Social Aspects.”

Background: As we know well, facts and statistics showing the number of upward trend
in cyberspace, such as: the number of users and customers are increasing rapidly, the
value of trade increased, the frequency of transactions rose sharply, the new communities
vary growing, and etc. Since more people use the Internet, then the "value" or value of the
virtual world is rising. It mean, more people who feel concerned by the existence of the
internet, from other people who want to take the advantages of the opportunities that
exist, until the criminals who seek any profit through not good actions. To be able to
reduce or mitigate the rising number of incidents of crime (criminal) in the virtual world
should know the root cause first from various aspects, such as technical, business and
social. These three areas have the most profound influence on the internet with different
interests and goals.

Purposes: Actually, this research may be one contributing factor to the point of the eight
Millennium Development Goals (MDGs), which is Developing A Global Partnership for
Development. In a partnership will always consider Risk Management, one of which is
the Security Internet. Internet is used as a medium for interaction or transactions. In
addition, the Partnership will always be built by three aspects: technical, business and
social aspects. Thus, the research aims to design a security internet framework
considered those three aspects. All three are essential in an organization, including
organizations for the Development of Global Partnerships. I can expand some approaches
for this research purposes:
1. To define internet security from the perspective of the techniques associated with
the trend of the number and variety of malicious software, the total cases of
vulnerabilities, internet security threats or attacks such as spam and spyware and
trends an increase in crimes such as phishing and identity theft, which has
resulted in economic and political losses.
2. To define internet security from the risk management business, including its
security measures based on cost benefit analysis, compliance with the security
aspects of computer systems or the internet, meeting the needs of the security
module in accordance with good governance (read: governance: transparency,
accountability, responsibility, and independence) and implementation of security
reasons for the high value of data assets and / or information held by the
company.
3. To define the characteristics of humans which is considered a state heavily
influenced by the surrounding environment, including psychological and
behavioral aspects of them as a good individual
Scope: This research will be discussed from three aspects only: Technical, business and
social aspects. So, hope it can be built to be a design framework for internet security.

Theoretical framework: Europol (2010) report that internet is a key target for
cybercrime because it contains advanced infrastructure for internet existed. As Internet
connectivity continues to spread, many organizations will be subjected on both to a larger
volume of cyber-attacks and to attacks from previously under connected areas of the
world. In other words, internet is a spot for organization crimes. The structure of
cybercrime groups marks the cleanest break to date from the traditional concept of
Organized Crime groups as hierarchical. Very often there is no obvious leadership, labor
is divided according to individual’s technical specialists, and most members know each
other from virtual world. Online forums are therefore essential introduction and
recruitment services for the digital underground economy. These both facilitate
collaboration and exhibit a degree of organization at the administrative level, enabling
criminal elements to swarm together to work on specific projects (Arquilla & Ronfeldt,
2000). Moreover, it has been argued that cybercrime’s organization lies in its automation,
which by using the force of technology dispenses with the operational requirement for
physical groupings and force of numbers (Brenner, 2002). The monetary of data is
likewise essential to cybercriminal enterprise. “Mules” are recruited via employment
search websites and social networking sites to “cash in” stolen personal and financial
information, very often in different jurisdictions to those from which the funds have been
removed. As the individuals tasked with turning data in hard cash, mules are the visible
face of cybercrime. The high-tech nature of cybercriminal activity results in a
demographic profile not traditionally associated with transnational Organized Crime –
namely, young, highly skilled individuals who are often recruited from universities.
These features find analogies in hacker culture more generally, where absence of
hierarchy, celebration of technical proficiency and comparative youth are prevailing
characteristics. This younger offending demographic is to some extent maintained by the
ready availability of exploits and attack tools on the Internet: one recent study found that
over 60 per cent of hackers surveyed were under the age of 25, and that a similar
proportion had started hacking between the ages of 10 and 15 (Chiesa, dkk, 2009). From
those

Method:
1. Collecting Data: Data needed in this research are data from literatures or references
about internet security or computer security from any book, article or jounal (any
publication), data statistics about internet crimes, and others.
2. Interviews: This step will be taken to the Prof. Dr. Richardus Eko Indrajit who
Currently appointed by the Government of the Republic of Indonesia to lead the
internet watchdog institutions SIRTII ID-Indonesia (Indonesia Security Incident
Response Team on Internet Infrastructure). Maybe He know much about data or
information for supporting this research.
3. Design and Anlysis Data: This step will be done if all the content data needed has
been collected.
4. Conclusion: To propose the clonclusion from the research that has been done.
References
EUROPOL Public Information. Threat Assessment (Abridged) Internet Facilitated
Organised Crime (IOCTA). Europe. 2010.
Council of the European Union, Council conclusions concerning an Action Plan to
implement the concerted strategy to combat cybercrime, 3010th GENERAL
AFFAIRS Council meeting, Luxembourg, 26 April 2010.
Arquilla, J. & Ronfeldt, D. Swarming and the Future of Conflict. RAND National
Security Research Division (NSRD). 2002.
Brenner, S. Organized Cybercrime? How Cyberspace May Affect the Structure of
Criminal Relationships. North Carolina Journal of Law and Technology 4: 1-50.
2002.
Chiesa, Ducci & Ciappi. Profiling Hackers: The Science of Criminal Profiling as Applied
to the World of Hacking. Boca Raton. 2009.
Wall, D. Cybercrime: The Transformation of Crime in the Information Age. Cambridge.
2007.
Hunton, P. The growing phenomenon of crime and the Internet: a cybercrime execution
and analysis model. Computer Law and Security Review 25: 528-535. 2009.
Katyal, N. Digital Architecture as Crime Control. The Yale Law Journal 112:2261-2289.
2002.
Brenner, S. & Clarke, L. Combatting cybercrime through distributed security.
International Journal of Intercultural Information Management 1.3:259-274. 2009.

You might also like