Work Package 3

Evidence Based Analysis                      Through Key Behavioural Use Cases


D3.1 Report on existing and emerging cyber behavioural concerns

The Report on existing and emerging cyber behavioural concerns has been designed to provide a foundational, contextual overview of key identified threats, vulnerabilities and challenges for societal risk from the many varied forms of online criminality. In order to evaluate the dangers to the public of emerging cyber threats, this deliverable contains an initial state of the art summary of the leading threats and emerging challenges taken from literature review, desk based analysis. The conclusion of this initial stage research is that most commonly agreed upon critical threats identified are from; hacking, illegal access, illegal interception, data interference, malware writing, online child sexual exploitation, financial fraud, and, extremist radicalisation. Furthermore, the specific emerging challenges for these common threats, that are likely to cause significant future damage were listed as: The availability and simplification of ‘off the shelf’ advanced phishing kits for purchase on the dark web, the complexity and sophistication of modern remote access attacks being able to infiltrate networks and systems from afar, as well as through exploiting vulnerabilities in the wealth of IoT devices that are increasingly common place in modernity.


D3.2 Report on vulnerable actor behavioural radicalisation

Half of the world population is at risk of becoming a victim of any form of internet or computer-related crime. With increasing internet penetration, new opportunities arise providing a pool of offenders engaging in cybercrime. Modern terrorism modern uses the Internet as an opportunity to spread propaganda and to influence individuals to follow their cause (i.e. radicalisation, recruitment). As a result of an extensive literature review, 165 eligible studies were found and examined. Furthermore, single cases of radicalisation and violent radical acts were examined and incorporated exemplary. The Report on vulnerable actor behavioural radicalisation will summarize the recent literature reviews based on influential factors regarding radicalisation and present those within different domains, and therefore contribute to the scientific endeavours in the field of radicalisation and enable government agencies (e.g. LEA) to better understand and identify factors associated with radicalisation. Additionally, in the long run, this report contributes to an improvement regarding prevention of violent extremism.


D3.3 Report on influential actor behavioural radicalisation

The aim of the Report on influential actor behavioural radicalisation is to pave the way towards a new approach for the prevention of online radicalization in Europe combining two research methodologies: the social movements’ theory (Della Porta, 1995) and integrated threat theory (Stephan and Stephan, 1993, 1996).

The document is the result of an integrated research methodology which bridges the gaps between the theoretical and the empirical research, combining data from the case analysis (Chapter 3 ‘Use Case Analysis’) contrasted with the judicial and policing fr amework.


D3.4 End user recommendations on best practices for the reduction and remedy of Online Behavioural Radicalisation

… coming soon!


D3.5 Living Lab report on CaaS

… coming soon!


D3.6 Report on the citizens' current perceptions and understanding of cybercrime

… coming soon!