2020 Cybercrime Economic Costs: No Measure No Solution

Governments needs reliable data on crime in order to both devise adequate policies, and allocate the correct revenues so that the measures are cost-effective, i.e., The money spent in prevention, detection, and handling of security incidents is balanced with a decrease in losses from offences. The analysis of the actual scenario of government actions in cyber security shows that the availability of multiple contrasting figures on the impact of cyber-attacks is holding back the adoption of policies for cyber space as their cost-effectiveness cannot be clearly assessed. The most relevant literature on the topic is reviewed to highlight the research gaps and to determine the related future research issues that need addressing to provide a solid ground for future legislative and regulatory actions at national and international levels.


INTRODUCTION
In a response to the 2015 CyberROAD survey question to stakeholders: "Have you experienced a cybercriminal action in the last 5 years?" 78% of the respondents responded they had, either in a personal capacity (31%) or through work (47%). When asked "To make the Internet a safer place and to fight cybercrime, what are the topics we should research into?", most respondents rated "Better metrics and statistics on cybercrime" as their 2nd choice (from 6) in order of importance. 1 .
Cybercrime has climbed to the top tier in the National Security Strategy of many EU states e.g. France, the Netherlands and the UK, becoming the #1 threat above organized crime and fraud generally. However as indicated within a recent 2013 study for the European Parliament -Directorate General for Internal Policies "The Economic, Financial & Social Impacts of Organized Crime in the EU", "estimates of cybercrime costs are highly contested". It [1] 1 CyberROAD Survey Page, http://cyberroad.eu concludes by saying "So is cybercrime a threat, and to whom? It is a threat to all of us. The question is how much of a threat, and how can we better understand how much of a threat it is." [1] Using property crime, for example, as a comparison, in most countries the metrics are mostly readily available. In the US, the FBI's "Uniform Crime Report" [2] details how many offenses were committed nationally in 2011 (9,063,173) and of what type (burglary 24%, larceny 68% and motor vehicle theft 7.9%). It is not too difficult from this point on to provide an accurate estimate of the cost of overall property crime to the US economy in 2011 (€14bn). "However, when enquiring about the direct costs of cybercrime to any economy, individual industries, or companies and you get no straight answers." [3] Worryingly, it seems that awareness of the extent of the problem has advanced very little over the years. At the turn of the millennium cybercrime was recognised as "the organized crime of the 21st century." [4] An article published in Bloomberg Business in 2006, announced that in the previous year, for the first time, "proceeds from cybercrime were greater than proceeds from the sale of illegal drugs, according to an adviser to the U.S. Treasury Dept." [5]. In truth, we are no closer now in knowing how accurate an assessment that was, despite the vast sums spent in the meanwhile. The 2006 Bloomberg article and the problems it summarises could have been written today.
Certainly, there is no lack of reporting on the cost of cybercrime; these make the headlines on a regular basis. But how well do these stand up on closer inspection? Without fundamentally accurate data, how do we know where the research money should be spent? How can policy makers plan for the future? How can boards budget correctly? How can risk be evaluated when data is patchy and unverifiable?
As part of the CyberROAD project this area was viewed from its core foundations. The project established a perspective of where the state of the art is now and needs to be to meet the challenges of the future.

A. Overview
The aim of the CyberROAD project is to develop a cybercrime and cyber-terrorism research roadmap. Using the knowledge gained in their own areas of expertise, partners from academia, industry, computer security, and legal enforcement agencies, will provide a thorough picture of the current scenario. Through the depiction of future scenarios the most relevant research gaps will be identified and set against the findings from survey-based analyses of stakeholders needs. These will be mapped out to execute a wide-ranging and comprehensive roadmap of the research areas that are needed in order to face forthcoming threats leading up to 2020.

B. The Basics
To review the current economic state-of-the-art an analysis was made of some of the readily accessible data that is fundamental to a study on cybercrime metrics. A variety of sources provided a surprisingly large amount of information. Taken at face value these yield a set of straightforward figures on some of the most contentious issues in cybercrime. In summary: 1) Costs of Cybercrime * The annual cost to the global economy from cybercrime is more than €300 billion Euros [6] * Cost of cybercrime for the EU 0.4% of its GDP 2 = €13 billion / annum [7] Sample EU countries estimates for the cost of cybercrime 3 : * Poland: € 377 million /annum * Germany: € 2.6 billion /annum * UK: € 2 billion /annum * Cybercriminal revenues (estimate of the cybercrime market itself) €15 billion / annum 4 [8] * Market for security products and services €50 billion / annum [9] 2) Examples of Cybercrime Metrics * 3 Billion Users of the Internet (~39% world population) [10] * Over 200 billion emails processed / day [11] * 917.9 million Websites (variable) -39 million / month added (4%) [10] * IP addresses -IPv4 = 4,294,967,296 (2¡³²) -IPv6 = 128-bits (2¹²΄) [12] * 2.3 billion mobile-cellular subscriptions worldwide [13] * 1.4 million Browser user agents -bots [14] 3) Technical and Quantitiative Metrics of Cybercrime Activity Indicators * 85% of processed emails are spam [15] * 7% of all URLs malicious [16] 2 Estimate of average -range is up to 0.9% of GDP -high-income countries incur higher losses. 3 [20] * € 7.9 million is the average annualized cost of data breaches [21] * 10.4% net increase cost of data breaches over the past year [21] * 250,000 -500,000 malicious binaries / day [22] * ~280 million malicious binaries collected [22] * 6 / 10 million unique IP's sink holed / day [22] * 900,000 malicious domains / day [22] * 500 of 52,000 ASNs worldwide (4%) account for hosting 85% of malicious activity [23] C Overview of Current Estimates The above examples demonstrate that a variety of data types on cybercrime metrics are available. This is a good starting point. The next step involves evaluating which statistics have value and how they can be used to provide a solid scientific foundation for further study. . A significant amount of groundwork needs to be covered to attain a practicable framework but the increase in trust derived will effect greater value and improved outcomes. For example, it may be simpler to compute a single "cost" figure for a whole sector at any one time, which is how cybercrime figures are often portrayed, but unless this stands up to scrutiny the exercise is a complete waste of time and resources. An effective way of working out how, for example, loss of reputation is "costed" is important as these sums may vary enormously. For instance, a blanket approach may not be accurate enough for budgetary and insurance purposes. The development of a working model is an essential research area if the impact of cybercrime is to be fully understood and appreciated.

III. THE CYBERROAD CYBERCRIME SURVEY
The CyberROAD project designed a broad-based survey in order to gain an understanding of the impact of cybercrime on stakeholders which could be weighed against current research results. It was decided to follow the Delphi approach 5 consisting of an initial poll followed by 2 further questionnaires where participants of the first round are invited to complete at least one, or possibly two, subsequent polls. Answers from the first survey are used to generate more specific questions in the following rounds. A principal area of the CyberROAD surveys centres on "The cost of cybercrime" in relation to everyday life and business.

1) Purpose
The purpose of the CyberROAD survey is to explore and establish the needs of stakeholders and to find out what they see as the potential threats both now and into the future. As perceived threats may be different from real threats, it is important to try to correlate stakeholders' experiences of cybercrime with the situation as reflected in current reports and analyses. A mismatch between the two can be costly in terms of money spent on research and to stakeholders' understanding of what should or could be done to alleviate risk, i.e., are the right threats being targeted at present?, Can a blanket approach to security be taken or would a more flexible system be of more benefit?
2) Methodology, Survey 1 was prepared using specialist online software and designed along the lines of the Delphi method. The questions for this survey were of a generic nature as the intention was for Surveys 2 & 3 to explore resultant themes at a deeper level. To exploit the CyberROAD Cybercrime Survey a number of distribution methods were employed by project partners. These included the project website, a dedicated website, announcements via social media, and prompting by email to interested parties. The surveys were split into two versions: one for English speakers worldwide and the other translated into Polish and aimed at Polish users.

3) Macro to micro (world, Europe, Poland case specific)
For the purposes of the CyberROAD project it was decided that the greatest value would be obtained from a comparative study using participants worldwide but with a bias towards European citizens. Using the Delphi method for the surveys made it possible to drawdown in orderto probe further using selective criteria, if required. For a European project, it made sense to compare the region with others at a macro level i.e., world, and also at a micro level i.e., a specific country: Poland. Poland was selected because it is one of the larger EU countries and is also represented by a national CERT team (CERT Polska) in the CyberROAD consortium. The participation of a national CERT allowed for easier access to various statistics on the threats affecting Poland and good potential outreach to other entities in the country as well as the general public which is especially important when disseminating surveys.

4) Initial findings
Cybercrime was seen by survey respondents as a problem rooted primarily in economic interests and in technology.
One of the findings of the survey was that most respondents consider "better education of users of the Internet" as the single most important topic that should be researched in order to make the Internet a safer place (75% of respondents). "Improved technology for our networks and operating systems" scored the next highest in the very important category (only 58% viewed this as very important), while "better laws and regulations" were viewed as very important by only 40%. Most respondents, however, rated "Better metrics and statistics on cybercrime" as their 2nd choice after selecting their top choice of topic for more research.
Indeed, the above responses seem to correlate with the response to another question, concerning training within their organization: 59% of respondents were not trained in cybersecurity issues at all or only if there was a problem (note: we included "don't know" responses in this category as well).
Even though many respondents considered cybercrime to be a concern and many had been victims either personally or as part of their organization (as many as 78%) most respondents declared that the main consequence of the cybercrime action was inconvenience (50% of respondents). Nevertheless, many claimed enormous losses to their country or worldwide economy as a result of cybercrime in general (although the most respondents said they had no idea what the losses where). It is unclear where these numbers are from, but it is worth noting that these were the highest possibilities in the question that they could choose from. Perhaps this seemingly contradictory response (large losses vs the primary loss being inconvenience) is due in part to the term "cybercrime" being often understood in very different ways, as other responses in the survey indicated.
Another very visible problem is the relatively low reporting rate of cybercrime to the Police (44% of cybercrime cases not reported) and/or national CERTs (72% of cybercrime cases not reported). This is followed up by a low successful prosecution rate: only 8% of the cases were successfully prosecuted.
Information sharing in general was found to be a problem (only 43% respondents said they or their organization shared information on cyber-attacks) -an issue that also hinders effective measurement of cybercrime.
The responses to the Polish survey (the same survey but translated into Polish) were in many aspects similar, but in general tended to show slightly worse results in regard to user awareness and experiences with cybercrime. In part, this is possibly because the responder base was nearly the opposite of the English speaking one (consumer group vs a more specialist group). A comparison of Poland vs world statistics will be the subject of further research.
Overall, however, the initial findings appear to confirm that there is a tangible need for better definitions, metrics and statistics for cybercrime together with more training. Initial analyses tends to support the view that current definitions on cybercrime are confusing to stakeholders whose experiences do not align with the information readily available. This mismatch of messages is a stumbling block in cybercrime prevention which could be alleviated with better quantification. This area requires further investigation.

IV. REVIEW OF THE STATE-OF-THE-ART OF THE METRICS
AND ECONOMICS OF CYBERCRIME Within the last 5 years (2011 to Jan 2015) there are 3,920 web searchable scholarly articles, papers and books relating to the "economics or costs of cybercrime" 6 . Added to this is the wide spectrum of commercial sources collecting, collating and disseminating related information and data, some of which is not publically accessible.
An in-depth comparative study of all relevant reports is outside the remit of the CyberROAD project and instead a sample of typical studies and reports were reviewed.
Five major studies on the theme of the "cost of cybercrime" were selected as representative of their genre, together with one quantitative study with a focus on a specific attack type, and one study that specifically tackles the issue of the cost of privacy, the related cost of identity theft and data breaches relating to personal data. The studies either present a breakdown on the "cost of cybercrime", offer recommendations and advice on how costing and metrics can be improved or convey specific quantitative data. The studies selected come from academia, consumer groups, technology providers and policy advisors and align to the criteria of the CyberROAD Triad approach.
This short overview reveals commonalities among the studies, if not their methodologies, which point the way to a number of identifiable research gaps. Firstly, the degree to which data is considered as open and publically accessible depends on the viewpoint. The intended motive and aims of the data provider, which may altruistic in nature or commercially interested, is difficult to quantify. It follows that any related data is regarded with suspicion and its validity questioned; whose data can be trusted, how can a "trusted" environment be measured? Methodologies used to collect and collate information can be unique to the entity, unclear or not fully disclosed. Data may be incomplete in the wake of a lack of standard modus operandi, guidelines on best practices or benchmarks for the measurement of data.

A. Anderson Et Al Study
Although more than 100 different sources of data on cybercrime were counted in early 2012, the "first systematic study of the costs of cybercrime" [24] concludes that available statistics are "insufficient and fragmented" (Anderson et al, p12). The unequivocal message is that a lack of cohesion between different sources clouds the issue, leads to inconsistency of data and engenders mistrust of the numbers. As a consequence policy makers, who depend upon reliable figures, are left with little to go on, while the problem's true extent is obscured by the absence of easy-to-understand metrics. This report supports the widely held opinion that despite eye-catching headlines suggesting otherwise, it remains the case that few straightforward numbers exist on cybercrime and its true cost politically, economically, socially and morally.
This "Cost of Cybercrime" study details a simplified framework for standardizing measurements, arrived at by decomposing an earlier, and much criticized [25], report from Detica [26], where "difficult to assess" categories were used. Anderson et al suggest that "cost to society" can be calculated through the application of "sum of direct losses, indirect losses, and defense costs", to "known data" on cybercrime and supporting infrastructures. The definition of cybercrime needs to have an integral baseline, from which the criteria for measurement is determined, and it is necessary for boundaries between traditional, transitional and modern crimes to remain flexible as society's dependence on cyberspace continues to increase. Using this method, the report claims that "new computer crimes" actually cost only "tens of pence/cents" per person and not the vast sums as reported elsewhere.
Within this study "known data" consists of main types of cybercrime; online payment card fraud, online banking fraud, industrial cyber-espionage and extortion, fake antivirus, etc. Within the "Infrastructure Supporting Cybercrime" grouping "known data" is used on Botnets, Botnet mitigation by This report sets a good precedent but further research is required in this area as a whole.

B. Ponemon Institute Study.
Since 2009, The Ponemon Institute has been conducting "The Cost of Cyber Crime Study" [21]. The Ponemon Institute is an independent U.S.-based research group with the aim of informing the private and public sector on how to "…improve upon their data protection initiatives and enhance their brand and reputation as a trusted enterprise…" [27] Ponemon Institute research is used by major corporations, U.S. federal and state departments, consumer groups and is widely publicized by a variety of media outlets. This report was sponsored by HP Enterprise Security.
The 2014 Ponemon Institute report is based on the findings from surveys conducted with 257 organizations using a crosssection of industry sectors in 7 countries -U.S.A, U.K., Germany, Australia, Japan, France and the Russian Federation. The research is field-based via interviews with senior-level personnel "...about their organizations" "actual cybercrime incidents..." from large sized entities with more than 1,000 direct connections to the network or its systems (enterprise seats).
The total cost incurred by an organization is analyzed using criteria such as the "costs to detect, recover, investigate and manage the incident response" along with costs that "result in after-the-fact activities and efforts to contain additional costs from business disruption and the loss of customers" but excluding the cost of "expenditures and investments made to sustain an organization's security posture or compliance with standards, policies and regulations".
An initial comparison of the Anderson et al study to the Ponemon Institute report reveals an immediate and common problem within this field of inquiry. For example, both reports use valid research techniques but comparison is untenable as different criteria and methodologies are employed in gathering and collating the material. Here are two studies with the same title but with a diverse approach to the research matter. It is, therefore, unsurprising that the results are disparate.
The research gap uncovered here points to the use of "difficult to assess" categories, a criticism levelled against the Detica study in Anderson et al's report, but could equally apply to a number of recent studies. Further research is needed to ascertain how much trust can be placed in figures that are hard to substantiate.

C. McAfee Annual Cybercrime Reports
The McAfee report of June 2014 "Net Losses: Estimating the Global Cost of Cybercrime" [7] reviews the accuracy of its own evaluation early on under the section header "Estimating global loss from incomplete data" (p4), "International agreement on a standard definition of cybercrime would improve the ability to collect consistent data." Despite this data accuracy warning, McAfee appraises that the inclusion of certain additional indirect costs, such as reputational damage, show the "…full effect of cybercrime on the global economy." Sources for this report range from "the German Office for the Protection of the Constitution, the Netherlands Organization for Applied Scientific Research (TNO), China's Peoples Public Security University, the European Commission, the Australian Institute of Criminology Research, Malaysia's Chief Technical Officer, and estimates by government agencies in other countries and consulting and cybersecurity companies around the world".
McAfee aggregates data from sources within 51 countries "…who account for 80% of global income," and uses what is "publically available" from resources on IP theft, fraud, or recovery costs with additional field-based data from public servants and subject specialists. Adjustments are applied to account for regional differences and to arrive at an estimated global cost. The results for individual countries are available as separate reports.
The lack of effort made by most countries in collecting data on cybercrime losses, along with widespread inconsistencies and poor quality of the data that is gathered, is a re-occurring theme in this report. The three example methods used to "extrapolate a global loss figure" highlight this very problem. Method 1 uses the loss by high-income countries to deduce a global total, method 2 totals the amount for all countries where open source data is available, and method 3 "aggregate costs as a share of regional incomes." The report goes on to acknowledge the inadequacies of these methods which, due to the lack of reliable data, could either be an "overestimate" or "underestimate" of the true cost of cybercrime worldwide.
The research gaps presented by the McAfee report point directly to the lack of reliable data. Despite being a multinational company with a global outreach, McAfee is unsure of its own results and deemed it necessary to express its doubts about the ability to collect and collate accurate and reliable data.
A further research gap relates to the role of the corporate entity in this field. Is it possible to assess whether information delivered from the private sector is always b own agenda? Many different types of organ provide critical services and share data to he cyber-attacks. How can these be more effe trusted, to provide the types of figures that a can be done to improve the availability of around the world? Who can be trusted to pr in other countries? Should this be a independent entity?

D. East West Institute Study
One of the few global studies into the n methods of measurement was undertaken in West Institute (EWI) [28], an international, for-profit policy organization that focusse critical challenges. "Measuring the Cyber [29] examines how trusted metrics a benchmarks can be established, and a truste collection entity created, both research identified in this review. The EWI study solution to this problem that involves private aimed at promoting trust and cooperati concludes with three recommendations "…volunteers from all sectors-ICT, services, transportation, retail, medical and these out.
Existing information sharing entities against "Target Criteria" (Fig.3) based on Governance-Related, Breadth-Related a Related. Results of the "Gap Analysis" are format (Fig.4). Commercial entities are excluded on the they are seen as likely to try to influence m whether or not this perception is justified." T Analysis" reveals that not a single entity reac Criteria, one achieved 5 out of 7, and 5 s giving justification to EWI's call for the cr entity for data measurement, as one could no

E. Applying the EWI Gap Analysis in Cyber
In Deliverable 2.1 Section 4.4.2 w CyberROAD would define its roadmap goal and explorative means, supported by avail partner CyberDefcon's observatory 7 . The E study shows the critical nature of quantit measurement of cybercrime costing. To test of the observatory tool it was measured a Scope of Target Criteria". The results are det 7 http://globalsecuritymap.com biased towards its nizations currently elp protect against ectively used, and are missing. What f data in countries rovide this service role for a new, need for improved n 2013 by the East non-partisan, notes on confronting rcrime Problem" and performance ed centralized data gaps previously "presents a bold e sector leadership ion". The report and calls for energy, financial others…" to carry are benchmarked n three key areas: and Informatione reported in table riteria grounds that, "… market conditions, The resulting "Gap ched all the Target scored 4 out of 7, eation of a trusted ot "be found". rROAD we outlined how s, using normative able data such as EastWest Institute tative data in the out the suitability against the "EWI tailed in Figure 5. The "Global Security Map other entity used in the EWI s "Focus" when matched to th Institute. In the context of Cyb "Focus" would more appro opposed to "incidents", as this the needs of this project.. Acco the CyberROAD project, appli assessing the suitability of sele Security Map" passes the demonstrates two points: 1) methodology in matching a sam 2) Modifying the criteria i assessment tool to be app requirements. There may be value in wid corporate entities who are w standards or benchmarked crite data. Further research is neede used to assess the suitability need.

W I Gap Analysis
" surpasses the scores of every sample but misses the target on he criteria determined by the berROAD the target criteria for opriately be "knowledge", as measure has more relevance to ording to the criteria required in ied to the EWI methodology in ected "candidates", the "Global "trust" test. This exercise ) The value of this type of mple set against specific criteria, n "Focus" enables the EWI plied according to individual ed to assess the "Global Security Map" dening the sample set to include willing to be tested against set eria to verify the quality of their ed into how similar tools can be of data providers according to

F. Neustar UK annual DDOS Report 2014
In May 2014 Neustar published its second annual "UK DDoS Attacks and Impact Report" [30]. Neustar began as an operating unit managing large datasets under Lockheed Martin, a global aerospace, defense, security and advanced technology company. Today, Neustar handles billions of DNS queries and millions of text messages and phone calls. The report is based on findings from Neustar's survey of 331 UK companies across a variety of industries including financial services, technology, retail, government/public sector, health care, energy/utility, telecommunications, e-commerce, Internet services and media.
The scope of the inaugural 2012 survey was further developed with additional questions for the latest report. Each question targets specific information and data builds into a year-on-year profile of DDoS patterns and related changes. Examples questions include: What are the sizes and velocities of DDoS attacks? How long are DDoS attacks lasting?, Are DDoS attacks a bigger or smaller threat to your business versus a year ago?, and, How often were you attacked?
This seems a simple yet effective way of gathering quantifiable information and a good example of how the data can be displayed in an easy-to-understand format.
Even though this report appears to provide a model template for measurement and metrics there are still a number of issues when tested by the EWI method of analysis. Straightaway, it seems that Neustar would not qualify as a "trusted" data provider using the EWI suitability method due to its for-profit status. So, to what extent can this data be trusted? In the absence of benchmarks or standards, this is an unknown entity. Further research is required in this area to establish the criteria for cross-industry best practices and benchmarks.
Private, public and non-profits may each have a role to play in improving measurement and metrics. Used in this way, metrics can point to security vulnerabilities and provide a valuable source for gap analysis research. The Neustar report specifically highlights the vulnerability of the DNS/NTP servers to amplification attacks, when there are server misconfigurations. As a vulnerability, this has been highlighted by several other sources 8 . Any data, no matter what the source, should be viewed as a potential valuable asset, and put to the test. Currently, the problem is not so much "bad data" as a lack of testing of its worthiness. (Acquisti et al. 2015) 'The Economics of Privacy' study (Acquisti et al. 2015) [31] provides an updated survey on the economics of privacy. The main focus is not on the abuse of personal data stored on computers, nor on data breaches, but on the value that can be attached to private data.

G. The Economics of Privacy
As soon as people consent to the use of their data for marketing purposes, than the value of the data can be 8 http://www.pcworld.com/article/2013109/report-open-dnsresolvers-increasingly-abused-to-amplify-ddos-attacks.html associated to the gain that the user may acquire in terms of discounts or other privileges in their purchasing activities. On the other hand, when personal data is stolen or misused, than the task of assigning a cost based on worth is still an open problem.
This study clearly points out the three factors affecting the value of private data stored and shared over the Internet: individual responsibility, market competition, and government regulation. Individual responsibility requires awareness of the benefits and risks that sharing data brings in itself. Market competition exists to the extent to which to a value can be attached to this data. Finally, governments can regulate this market as it happens in other sectors.
At present, this topic is addressed in different ways in the EU and the US. While EU is steering towards government regulation on the management of private data, the US is drawing a framework that would allow different sectors to self-regulate this market. It turns out that no clear figure currently exists on the value of data breaches when related to individual data.

V. GAP ANALYSIS
An analysis of a small sample of the many studies available reveals a number of key areas where more research would be of major benefit. Despite the lack of a common methodology where a like-for-like comparison becomes problematic, it is possible to thematically group the exposed research gaps. In this study the groups form into five key areas. The key groups are:  The groups surrounding the "Pivot of Trust" provide a structured foundation for the study of the research gaps in relation to current scenarios. Each group is a worthy standalone subject in its own right. Groups may overlap to a larger or lesser degree and may be disproportionate in terms of the subject range and extent but, in terms of importance to Trust, each is of equal value.
As a scientific discipline, cybercrime is still in its infancy. Value can, therefore, be gained from the evolutionary experiences of other sciences. For example, research without some form of taxonomy would be chaotic in any area.
Accuracy of data is fundamental to other scientific research areas and is dependent upon tried and tested metrics for measurement. In some disciplines unreliable or untrustworthy data could be life threatening. With the advent of the Internet of Things, this could become a critical issue. Measurement is an essential, too, of risk assessment.
The issue of trusted data is emerging as an important topic as a result of this analysis. What trust is and how to quantify this is an element that has significant impact at ground-level involving perceptions as well as real events.
Trust and metrics are interwoven with the field of standards and benchmarks. Standards in industry are a cornerstone to improved safety, reliability and trust. Currently, this is not the case in the cybersecurity industry.
Initially, it would seem that the most importance place for more research would be in additional study of threats but it has emerged that this is only one of several key elements. More funds for study in this area are always welcomed but it is essential to know if the money is being spent on the right type of investigation. To know this with any certainty there has to be a greater understanding of the metrics and measurement of all disciplines.
A number of research gaps have been identified and grouped into themes as depicted in Fig. 6. The interplay of trust with each of these has also been highlighted. These themes will be investigated further during the course of the CyberROAD project. In the following sub-sections the importance of measuring economic costs on the state of cybercrime in 2020 is enumerated from current scenarios and weighed against some of the in findings from the CyberROAD Cybercrime Survey 1.

A. Current scenario
At present, the vast majority of governments addressed cyber security more within the framework of national defense rather than from the point of view of the protection of individual, social, end economic assets. We believe one of the main reason lies in the lack of clear figures on the real impact of computer incidents that prevents understanding • The extension of the threat (i.e., number of computers, individual, enterprises, etc. that have been victims of attacks) • The total loss that was caused by attacks, both in terms of tangible and intangible assets In such a scenario, it is quite difficult if not impossible, to take decisions on • The policies to set up in terms of education, training, awareness, as well as in terms of software and system verification and certification • The money to spend to implement the above policies, are today quite limited as the real impact in terms of saving is not well defined.
In fact, laws and regulations need to be grounded on reliable data, that clearly shows how the money spent in prevention and monitoring actually decrease the likelihood of more serious consequences.
It turns out that the current scenario poses a serious threat as the lack of coordinated and focused actions from the legislative and government bodies paves the way for various forms of criminal activities that, if not properly tracked and recorded, does not provide evidence of the existence of a real threat.

B. Future scenario
A desirable future scenario is one in which governments can rely on solid methodologies to collect reliable figures about the real impact of cybercrime on companies, individuals and the public sector in order to take decisions, and allocate budget that is proportionate to the real threat. In this scenario -individuals, companies and the like have a high level of awareness on the possible uses of their data by public and private bodies, thus assigning a value to their data -the market is mature enough so that a value can be assigned to each piece of information -it is mandatory to disclose cyber-attacks and data breaches to a central authority, associating the costs incurred in terms of lost assets, lost business, repair/refactoring of software, and of business procedures. -the above obligation implies that novel techniques are in place that allow assessing the influence of the attack and data breach On the basis of past data, and of the actual market values, cost estimates are possible. Consequently, it is possible to devise policies that are cost-effective in containing the vulnerability of software and systems, handling security incidents, and preventing their rapid diffusion.

C Question of Trust
The notion of Trust is central in the security domain, as all the relationships among people, associations, companies, etc. are based on trust. Moreover, when decisions are to be taken on the policies needed to prevent security incidents, reliable information is needed on the probability of the events, on the data that can be targeted by attacks, and on the value of data loss and recovery. Consequently, sound metrics on the number of cybercrime events, their effects, and the damage that actually was caused from incidents is necessary for defence and recovery actions.

1) What is "trusted" data?
Trusted data needs an agreed upon protocol for its acquisition, the measurements to be performed on the data, and the ways to securely store the data to prevent data pollution.
This chain can be enforced by clear national and supra national regulations that must require a uniform way for assessing the value of the assets in terms of data of companies, and the requirement to communicate any incident that has incurred, as well as a method for measuring the reach of the incident.
Incidents must be collected by a central point that ensures the correct processing of all data. This process in the EU is currently carried out by ENISA in an effort to provide for such trusted data. Metrics and protocols of communications still needs to be tailored in order to provide for data that should be not only complete, but also reliable.

2) Who can be "trusted" with data?
The adherence to standardized metrics and protocols allows trusting the party that provides such data. In other words, the protocols for gathering, processing and sending data to the central authority should provide in itself a mean to assess the trust in those data.

3) The role of public sector / private sector /government/ governance, in information sharing
The experience in UK (cyber essentials) and in the USA (NIST CyberSecurity Framework) show that metrics and procedures have to be found by a joint effort of the private sector and the government. While the government acts as the central point for standardization of metrics and procedures that allows the production of official statistics, private companies must help devising the set of mechanism that can be actually implemented and represent the optimal trade-off between the cost of the solution and the data needed for the final assessment.

V CONCLUSIONS
Reliable data is a fundamental on which revenues and budgets rely from the top at government level down to board level and individual stakeholders. To understand a problem, to know what is and how to tackle it, is a task that presents greater challenges when size and extent of that problem remains very much shrouded in mystery. The CyberROAD project is working towards a roadmap for cybercrime and cyberterrorism to reveal the research gaps that can help policy makers make more informed decision on where money should be directed to return the best possible outcomes.
Cybercrime as a subject of study is still in its infancy and much can be learned from the evolutionary development of other recently established sciences. To begin, a clear taxonomy is an essential element from which a framework for further study can be developed. Our investigation of current and future scenarios via focused surveys and comparison of the cost of cybercrime reports reveals a number of research gaps that require attention if the scenarios outlined are to be achieved by 2020. Fundamental to the issue is the ability to quantify what we have and where we want to go. Currently, there is a mis-match between the experiences of stakeholders and the information to hand which can be improved with quantification of the issues and a reliable model for costing. Central to this information is the issue of trust, as without it there will be no confidence in the way forward with more time and money being wasted. Indeed, it is not an exaggeration to say that without quantification and measurement there will be no solution to the problem of cybercrime by 2020 or beyond. VI.