{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:41:47Z","timestamp":1654130507085},"reference-count":28,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Since the EU Cybercrime Convention in 2000 (EU 2001), there has been a clear recognition of the accelerating threats to society posed by those who would exploit computers for crime and the logical progression to cyber-terrorism and cyberwarfare. Since that time the capacity to deal with cybercrime (crimes involving the use of computers) has improved but the problem has grown alarmingly. The European Commission recognises the increasing threat of cybercrime and has committed significant research and development funding in seeking to protect the community from cybercrime and cyberwar. This paper discusses a new European Commission funded project ECENTRE \u2013 England's Cybercrime Centre of Excellence Network for Training, Research and Education. On 20th December 2012 the European Commission signed the \u20ac0.935million (\u00a3760,000) contract for the project. The contract is awarded under the Programme Prevention of and Fight against Internet Crime Targeted Call \u2013 ISEC 2011 Action Grants\u2013 Project Number HOME\/2011\/ISEC\/AG\/INT\/4000002226. The author is the Project Manager and Principal Investigator for the project. ECENTRE forms part of a wider European network of centres of excellence to share expertise, promote best practice and provide training opportunities for law enforcement across the EU. The challenges in establishing effecting cooperation and sharing are discussed. The considerable problem of keeping pace with the fast-developing, complex, problem posed by threats to national infrastructure, organisations and individuals is examined; highlighting the role of education as a fundamental weapon in the fight. The more we know about a threat (real or potential) \u2013 the better protected against it we become.<\/p>","DOI":"10.4018\/ijcwt.2013100102","type":"journal-article","created":{"date-parts":[[2014,4,9]],"date-time":"2014-04-09T14:26:13Z","timestamp":1397053573000},"page":"10-21","source":"Crossref","is-referenced-by-count":0,"title":["The EU ECENTRE Project"],"prefix":"10.4018","volume":"3","author":[{"given":"Denis","family":"Edgar-Nevill","sequence":"first","affiliation":[{"name":"Centre for Cybercrime Forensics, Canterbury Christ Church University, Canterbury, United Kingdom"}]}],"member":"2432","reference":[{"key":"ijcwt.2013100102-0","unstructured":"AMEinfo. (2012). Oman\u2019s CERT designated as Regional Cyber Security Centre in Arab World. Retrieved December 15, 2012, from http:\/\/www.ameinfo.com\/omans-cert-designated-regional-cyber-security-322828"},{"key":"ijcwt.2013100102-1","unstructured":"Apple. (2013). iTunes U. Apple in Education. Retrieved from http:\/\/www.apple.com\/education\/itunes-u\/"},{"key":"ijcwt.2013100102-2","unstructured":"Arsene, L. (2012). China\u2019s cyber militia threatens US cyberspace. Hot for Security. Retrieved November 7, 2012, from http:\/\/www.hotforsecurity.com\/blog\/chinas-cyber-militia-threatens-us-cyberspace-4313.html"},{"key":"ijcwt.2013100102-3","unstructured":"Australia, C. E. R. T. (2013). CERT Australia. Retrieved from https:\/\/www.cert.gov.au\/"},{"key":"ijcwt.2013100102-4","unstructured":"BBC. (2011). South Korea hit by cyber attacks. BBC News. Retrieved March 4, 2011, from http:\/\/www.bbc.co.uk\/news\/technology-12646052"},{"key":"ijcwt.2013100102-5","unstructured":"BBC. (2013). Web creator sir time berners-lee criticises spy agencies. BBC News. Retrieved from http:\/\/www.bbc.co.uk\/news\/uk-24844427"},{"key":"ijcwt.2013100102-6","unstructured":"BBCa. (2013). Spy chiefs face public grilling. BBC News live webcast. Retrieved from http:\/\/www.bbc.co.uk\/news\/uk-politics-24848186"},{"key":"ijcwt.2013100102-7","unstructured":"BCS CFSG. (2013). British Computer Society Cybercrime Forensic Specialist Group. Retrieved from http:\/\/www.bcs.org\/category\/10468"},{"key":"ijcwt.2013100102-8","unstructured":"Bracey, C., & Edgar-Nevill, D. (2007, September 6-7). Prosecuting low-level computer crime in the UK. In Proceedings of the 1st International Conference on Cybercrime Forensics Education and Training (CFET 2007), Canterbury Christ Church University, UK. ISBN 1899253-041"},{"key":"ijcwt.2013100102-9","unstructured":"Burn-Murdoch, J. (2012). The latest police cuts data: Where have they hit hardest? The Guardian, 11th September 2012. Retrieved from http:\/\/www.guardian.co.uk\/news\/datablog\/2012\/sep\/11\/police-cuts-reduce-force-sizes-data"},{"key":"ijcwt.2013100102-10","unstructured":"Centre (2013) Cybercrime centres of excellence network for training research and education. EU. Retrieved from http:\/\/www.2centre.eu\/"},{"key":"ijcwt.2013100102-11","unstructured":"Coelho, H. (2012). Mandatory cyber security standards pose risk to competitiveness. Experts Say. Business Technology report, distributed with The Daily Telegraph & The Sunday Telegraph, 17th December 2012. Retrieved from http:\/\/biztechreport.co.uk\/2012\/12\/experts-warn-mandatory-standards-on-cyber-security-harm-competitiveness\/"},{"key":"ijcwt.2013100102-12","unstructured":"EC3. (2013). European cybercrime centre (EC3). Europol. Retrieved from https:\/\/www.europol.europa.eu\/ec3"},{"key":"ijcwt.2013100102-13","unstructured":"ECENTRE. (2012). ECENTRE (England\u2019s Centre of Excellence for Cybercrime Training Research and Education), EU. Prevention of and Fight against Internet Crime Targeted Call \u2013 ISEC 2011 Action Grants\u2013 Project Number HOME\/2011\/ISEC\/AG\/INT\/4000002226"},{"key":"ijcwt.2013100102-14","unstructured":"EU. (2011). Cyber security: EU prepares to set up computer emergency response team for EU institutions. Europa. Retrieved from http:\/\/europa.eu\/rapid\/press-release_IP-11-694_en.htm"},{"key":"ijcwt.2013100102-15","unstructured":"Gilad, A. (2012). Israel prepares itself for cyber attacks. ALMONITOR. Retrieved from http:\/\/www.al-monitor.com\/pulse\/security\/2013\/01\/cyber-attacks-are-a-new-form-of.html"},{"key":"ijcwt.2013100102-16","unstructured":"Godart, B. (2013). EC3 and Europol, presentation by Benoit Godart, Head of Outreach and Support EC3 at the opening of the Centre for Cybercrime Forensics. Canterbury Christ Church University, 6th November 2013."},{"key":"ijcwt.2013100102-17","unstructured":"ISEC. (2013). Prevention of and fight against crime. EU. Retrieved from http:\/\/ec.europa.eu\/dgs\/home-affairs\/financing\/fundings\/security-and-safeguarding-liberties\/prevention-of-and-fight-against-crime\/index_en.htm"},{"key":"ijcwt.2013100102-18","unstructured":"Law Lords Department. (2008). Judgments - Mckinnon V government of The United States of America and another. House of Lords, UK. Retrieved from http:\/\/www.publications.parliament.uk\/pa\/ld200708\/ldjudgmt\/jd080730\/mckinn-1.htm"},{"key":"ijcwt.2013100102-19","unstructured":"Leyden, J. (2011). Spooks take the wheel in UK\u2019s \u00a3650m cyber-war operations. The Register, 28th November 2011. Retrieved from http:\/\/www.theregister.co.uk\/2011\/11\/28\/cyber_security_strategy_analysis\/"},{"key":"ijcwt.2013100102-20","unstructured":"Paganini, P. (2012). Ponemon statistics on cost of cybercrime for 2012. Infosec Island. Retrieved from http:\/\/www.infosecisland.com\/blogview\/22541-Ponemon-Statistics-on-Cost-of-Cybercrime-for-2012.html"},{"key":"ijcwt.2013100102-21","unstructured":"PostNote. (2011). Cyber security in the UK, Houses of Parliament. Parliamentary Office of Science and Technology, Number 389, September 2011."},{"key":"ijcwt.2013100102-22","unstructured":"SDI. (2012). Strategic defence intelligence yearbook 2012. Berenice Baker (Ed.). Retrieved from http:\/\/viewer.zmags.com\/publication\/cc63a17c#\/cc63a17c\/1"},{"key":"ijcwt.2013100102-23","unstructured":"Segal, A. (2011). Idea\u2019s about China\u2019s cyber command. Asia Unbound, 27th December 2011. Retrieved from http:\/\/blogs.cfr.org\/asia\/2011\/12\/27\/ideas-about-chinas-cyber-command\/"},{"key":"ijcwt.2013100102-24","unstructured":"Segal, A. (2012). The rise of Asia\u2019s cyber militias. The Atlantic, 23rd February 2012. Retrieved from http:\/\/www.theatlantic.com\/international\/archive\/2012\/02\/the-rise-of-asias-cyber-militias\/253487\/"},{"key":"ijcwt.2013100102-25","unstructured":"TTOI. (2012). CERT-In, electronics companies team up to combat cyber threat. The Times of India, 6th December 2012. Retrieved from http:\/\/articles.timesofindia.indiatimes.com\/2012-12-06\/security\/35646489_1_cert-cyber-attacks-electronics"},{"key":"ijcwt.2013100102-26","unstructured":"US. (2013). U.S. Army cyber command. Retrieved from http:\/\/www.arcyber.army.mil\/"},{"key":"ijcwt.2013100102-27","unstructured":"Wikidot. (2013). Stuxnet. Wikidot The Virus Encyclopaedia. Retrieved from http:\/\/virus.wikidot.com\/stuxnet"}],"container-title":["International Journal of Cyber Warfare and Terrorism"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=105188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:05:58Z","timestamp":1654128358000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcwt.2013100102"}},"subtitle":["Education as a Defensive Weapon in the War Against Cybercrime"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcwt.2013100102","relation":{},"ISSN":["1947-3435","1947-3443"],"issn-type":[{"value":"1947-3435","type":"print"},{"value":"1947-3443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}