Cyber crime
Research Topic
Language: English
This is a research topic created to provide authors with a place to attach new problem publications.
Research problems linked to this topic
- Maximising opportunities from digital forensics in relation to crime prevention and detection
- How will the use of generative AI to create ‘deepfakes’ that manipulate people’s likeness (face, body, voice) evolve? What is the psychological impact of being deepfaked, and what harmful uses (e.g. intimate image abuse, fraud, reputational damage) will develop and increase?
- Constructing secure evidential cases against offenders in a changing technological context.
- Closing the window between becoming aware of a potential technical exploit and action to plug the vulnerability reduces exposure to systems compromise. How can we best apply automation across government’s cyber security practices to ensure that potential exploits are addressed as quickly as possible? What are the risks and opportunities? What are the dependencies on other technology? Are there ethical or considerations in this area?
- Capability against money laundering and other illicit transactions, including relating to alternative currencies.
- How will AI affect existing kinds of harmful online content (e.g. online abuse, scams) and what new kinds of online harmful content might it give rise to?
- Approaches that deter people from getting involved in cyber crime, moving deeper into cyber crime and/or reoffending.
- Real world threat detection and mitigation capability, ensuring minimal impact on privacy rights. This includes the exploitation of more of the electromagnetic spectrum; compressive sensing; connectivity; use of video analytics; the internet of things; wider use of smart technologies including tracking and remote systems; advanced materials; informatics. ###Threats in the stream of commerce (including people, vehicles, freight, parcels; to detect threats to safety, security, economy, health):
- Improving investigative outcomes and detection rates, particularly in relation to crime with a digital footprint
- Preventing criminal, hostile or mischievous use of autonomous and unmanned systems, or attacks of the systems themselves, especially through “security by design”.
- Use of technology by organised criminals, and changes to the threat due to future technologies.
- Developing assurances and standards for technology designed to safely and effectively respond to instances of malicious, illegal use of autonomous and unmanned systems across sectors.
- The nature and extent of business crime.
- How much of an obstacle is cyber-security in the development of the UK’s digital trade capacity?
- Common insights across different “hidden crimes”.