Author:
Erik H.A. van de Sandt
Search for other papers by Erik H.A. van de Sandt in
Current site
Google Scholar
PubMed
Close
Free access

Abbreviations

acm

Authority for Consumers and Markets

adm

Automated or autonomous decision-making

af

Anti-forensics

ai

Artificial intelligence

aml

Anti-money laundering

apt

Advanced persistent threat

atm

Automated teller machine

bes

Business enterprise servers

bka

Bundeskriminalamt

bph

bulletproof hoster

cc

Command-and-control server

ca

Certificate authority

CaaS

Cyber-crime-as-a-service

cav

Counter antivirus services

cba

Cost-benefit analyses

ccs

Cyber crime science

ccTLD

Country code top-level domain

cctv

Closed-circuit television

cert

Computer emergency response team

cia

Confidentiality, integrity and availability

cis

Commonwealth of Independent States

cpted

Crime prevention through environmental design cri-hr Cyber criminal community in high-risk areas cri-lr Cyber criminal community in low-risk areas

crisp-dm

Cross Industry Standard Process for Data Mining

cs

Computer science

csam

Child sexual abuse material

dccp

Dutch Code of Criminal Procedure

DDoS

Distributed denial-of-service

DevSec

Deviant security

dna

Deoxyribonucleic acid

dpa

Dutch Police Act

dpc

Dutch Penal Code

EC3

European Cyber Crime Centre of Europol

echr

European Convention on Human Rights

ectf

Electronic Crimes Task Force

els

Empirical legal scholarship

empact

European Multidisciplinary Platform Against Criminal Threats

epo

Electronic purchase order

EU

European Union

fbi

Federal Bureau of Investigation

gdp

Gross domestic product

gps

Global positioning system

gt

Grounded Theory

ic

Intercultural communication

IC4

International Cyber Crime Coordination Cell

icd

Incentive centered designs

id

Identity document

igci

Global Complex for Innovation of interpol

imei

International mobile equipment identity

imsi

International mobile subscriber identity

IoC

Indicator of compromise

ip

Internet protocol

isac

Information Sharing and Analysis Center

isp

Internet service provider

it

Information technology

jcat

European Joint Cybercrime Action Taskforce

jit

Joint investigation team

kyc

Know-your-customer

L2TP

Layer 2 Tunneling Protocol

lea

Law enforcement agency

lka

Landeskriminalamt

mac

Media access control

mbr

Master boot record

ml

Machine learning

mlat

Mutual legal assistance treaty

mo

Method of operation

MoU

Memoranda of understanding

nca

National Crime Agency

ncfta

National Cyber-Forensics Training Alliance

nci

National critical infrastructure

ncsc

National Cyber Security Center

nEPO

Non-electronic purchase order

ngo

Non-governmental organization

nhtcu

National High Tech Crime Unit

ntd

Notice-and-takedown

otr

Off-the-Record Messaging

P2p

Peer-to-peer

pet

Privacy-enhancing technology

pki

Public key infrastructure

pm

Private message system

ppi

Pay-per-install

ram

Random-access memory

rcp

Rational choice perspective

rdp

Remote desktop protocol

s/mime

Secure/Multipurpose Internet Mail Extensions

sbu

Security Service of Ukraine

sec-hr

Cyber security community in high-risk areas

sec-lr

Cyber security community in low-risk areas

sms

Short message system

socks

Socket Secure protocol

sql

Structured query language

ssl

Secure sockets layer

swat

Special weapons and tactics unit

swift

Society for Worldwide Interbank Financial Telecommunication

ttp

Tactics, techniques and procedures

US

United States

usss

United States Secret Service

vm

Virtual machine

vpn

Virtual private network