최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국산학기술학회논문지 = Journal of the Korea Academia-Industrial cooperation Society, v.21 no.6, 2020년, pp.646 - 661
박지용 (성균관대학교 기술경영학과) , 이희상 (성균관대학교 기술경영학과)
Technological innovations and fast-growing new internet businesses are changing the paradigm of traditional business management, having various impacts on society. The development of internet technology is also increasing the adverse effects on technological innovation, and in particular, cybercrime...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
컴퓨터의 기술 발달의 악영향은 무엇인가? | 과거 기업은 오프라인을 통해 경영활동이 이루어졌으나 현재 기업은 인터넷 기술 혁신을 통해 일상생활과 관련된 비즈니스를 쉽고 빠르게 활용한다 [1]. 이러한 컴퓨터의 기술 발달은 인류의 문화, 경제, 사회 전반에 걸쳐서 큰 변화를 주었지만, 컴퓨터 기술의 향상은 컴퓨터와 관련된 범죄의 급격한 상승을 초래하고 있다[2]. 예를 들어 한국 경찰청 통계에 따르면 한국의 사이버범죄는 2014년에 110,109건에서 2019년 180,499건으로 빠르게 성장하고 있다[3]. | |
사이버 공격(Cyber Attack)의 정의는 무엇인가? | 문헌[40,42-43,66-68]은 기업이나 개인의 시스템, PC, 모바일 폰 등에 비밀스럽게 침투하여 피해자에게 모르게 피해를 일으키는 작업을 논의하고 있어, 시스템에 침투하여 범죄를 수행하는 “침투 기술 (Secretly Intrusion)”로 서브블록을 도출하였다. “속이는 기술(Cyber Trick)”과 “침투 기술(Secretly Intrusion)” 의 서브블록은 BMC 이론의 가치제안을 검토하여 CBM 의 빌딩블록으로 “사이버 공격(Cyber Attack)”으로 정의하였다. | |
비즈니스 모델 캔버스를 사용한 이유는 무엇인가? | 그동안의 사이버범죄는 많은 변화를 이루었으며 개인 적인 지적 호기심 또는 자기 과시를 통한 해킹에서 변화 하여 금전적 갈취, 집단적인 사회 위협, 사이버 테러 등 조직적이고 체계적인 범죄 행위가 큰 비중으로 발전하고 있다[6]. 본 연구는 사이버범죄자들이 범죄를 계획하고 실행하여 범죄 피해자로부터 의도한 결과를 얻는 것을 기업가들이 비즈니스 모델을 통해 고객들에게 가치를 창출하는 것에 비교하여 파악하는 것은 사이버범죄를 분석 하는 좋은 접근법이라는 아이디어로 연구가 시작되었다. 따라서 본 논문은 사이버범죄에 대한 구조적 파악을 위 해 비즈니스 모델 분석에서 널리 쓰이는 비즈니스 모델 캔버스(BMC: Business Model Canvas, 이하 BMC) 이론을 차용하였다. |
D. J. Teece, "Business Models, Business Strategy and Innovation", Long Range Planning, Vol.43, Issues2-3, pp.172-194, 2001. DOI: https://doi.org/10.1016/j.lrp.2009.07.003
B. Moon, J. D. McCluskey, & C. P. McCluskeyd, "A general theory of crime and computer crime: An empirical test", Journal of Criminal Justice, vol.38, Issue4, pp.767-772, 2010. DOI: https://doi.org/10.1016/j.jcrimjus.2010.05.003
https://www.police.go.kr/www/open/publice/publice0204.jsp
S. Caneppele, & M. F. Aebi, "Crime Drop or Police Recording Flop? On the Relationship between the Decrease of Offline Crime and the Increase of Online and Hybrid Crimes", Policing, Vol.13, Issue1, Pages 66-79, 2017. DOI: https://doi.org/10.1093/police/pax055
P. Hunton, "The growing phenomenon of crime and the internet; A cyber crime execution and analysis model", Computer Law & Security Review, Vol.25, Issue6, pp.528-535, 2009. DOI: https://doi.org/10.1016/j.clsr.2009.09.005
R. Bryant, Investigating digital crime, Wildy, 2008, pp.79-93.
E. Kraemer-Mbula, P. Tang, & H. Rush, "The cyber crime ecosystem; Online innovation in the shadows?", Technological Forecasting & Social Change, Vol.80, Issue3, pp.541-555, 2013. DOI: https://doi.org/10.1016/j.techfore.2012.07.002
A. Osterwalder & Y. Pigneur, Business Model Generation, Wiley, 2010, pp.20-57.
http://en.wikipedia.org/wiki/Computer_crime.
D. Halde, & K. Jaishankar, Cyber crime and the Victimization of Women: Laws, Rights, and Regulations, IGI Global, 2011, pp.12-33.
D. L. Shinder, & E. Tittel, Scene of the cyber crime: Computer forensics handbook, Syngress Publishing, 2002, pp.18-33.
http://www.mondaq.com/article.asp?articleid28603
D. Wall, Cybercrime: The transformation of crime in the information age, Malden, MA, Polity Press, 2007, pp.30-130.
http://www.police.go.kr/www/security/cyber/cyber01.jsp
https://cyberbureau.police.go.kr/prevention/nw/sub2_notitle.jsp?mid010201
https://cyberbureau.police.go.kr/prevention/nw/sub2_2_notitle.jsp?mid010202
https://cyberbureau.police.go.kr/prevention/nw/sub2_3_notitle.jsp?mid010203
A. Afuah, & C. L. Tucci, Internet Business Models and Strategies, McGraw-Hill, 2001, p.9-12.
A. Osterwalder, Y. Pigneur, & C. L. Tucci, "Clarifying Business Models: Origins, Present, and Future of the Concept", Communications of the Association or information Systems, Vol.16, No.1, pp.1-25, 2005. DOI: https://doi.org/10.17705/1CAIS.01601
R. Alt, & H. Zimmermann, "Introduction to Special Section - Business Models", Electronic Markets, Vol.11, No.1, 2001. DOI: https://doi.org/10.1080/713765630
C. Zott, R. Amit, & L. Massa, "The business model: Theoretical roots, recent developments, and future research", IESE Business School Working Paper, University of Navarra, Barcelona, Spain, No.862. 2010.
J. Ojasalo, & K. Ojasalo, "Service Logic Business Model Canvas", Journal of Research in Marketing and Entrepreneurship, Vol.20, No.1, pp.70-98, 2018. DOI: https://doi.org/10.1108/JRME-06-2016-0015
S. Keane, K. Cormican, & J. Sheahan, "Comparing how entrepreneurs and managers represent the elements of the business model canvas", Journal of Research in Marketing and Entrepreneurship, Vol.9, pp.65-74, 2018. DOI: https://doi.org/10.1016/j.jbvi.2018.02.004
A. Joyce, & R. Paquin, "The triple layered business model canvas: A tool to design more sustainable business models", Journal of Cleaner Production, Vol.135, pp.1474-1486, 2016. DOI: https://doi.org/10.1016/j.jclepro.2016.06.067
M. Urban, M. Klemm, K. Ploetner, & M. Hornung, "Airline categorisation by applying the business model canvas and clustering algorithms", Journal of Business Venturing Insights, Vol.71, pp.175-192, 2018. DOI: https://doi.org/10.1016/j.jairtraman.2018.04.005
M. Toro-Jarrin, I. Ponce-Jaramillo, & D. Guemes-Castorena, "Methodology for the of building process integration of Business Model Canvas and Technological Roadmap", Technological Forecasting and Social Change, Vol.110, pp.213-225, 2016. DOI: https://doi.org/10.1016/j.techfore.2016.01.009
B. Fritscher, & Y. Pigneur, "Classifying business model canvas usage from novice to master: A dynamic perspective", Lecture Notes in Business Information Processing, Vol.257, pp.134-151, 2016. DOI: http://dx.doi.org/10.1007%2F978-3-319-40512-4_8
M. Dudin, G. Kutsuri, I. Fedorova, S. Dzusova, & A. Namitulina, "The Innovative Business Model Canvas in the System of Effective Budgeting", Asian Social Science, Vol.11, No.7, pp.290-296, 2015. DOI: http://dx.doi.org/10.5539/ass.v11n7p290
B. Fritscher, & Y. Pigneur, "Visualizing business model evolution with the Business Model Canvas: Concept and tool", 16th IEEE Conference on Business Informatics, IEEE, Geneva, Switzerland, pp.151-158, 2014. DOI: https://doi.org/10.1109/CBI.2014.9
T. O'Neill, "The innovative business model canvas in the system of effective budgeting", Reference Services Review, Vol.43, No.3, pp.450-460, 2015. DOI: http://dx.doi.org/10.1108/RSR-02-2015-0013
B. Glaser, & A. Strauss(1967), The Discovery of Grounded Theory: Strategies for Qualitative research, Routledge, 2000, pp.21-160.
E. Babbie, The practice of social research, Wadsworth Publishing, 2012, pp.88-122.
A. Bryman, & E. Bell, Business research methods, Oxford University Press, 2015, pp. 578-604.
J. M. Corbin, & A. L. Straus, Basics of qualitative research: Techniques and procedures for developing grounded theory, Sage publications, 2007, pp. 65-297.
S. Green, "Systematic reviews and meta-analysis", Singapore medical journal, vol.46, no.6, pp.270-274, 2005.
M. N. Al-Mhiqani, R. Ahmad, W. Yassin, A. Hassan, Z. Z. Abidin, N. S. Ali, & K. H. Abdulkareem, "Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems", International Journal of Advanced Computer Science and Applications, Vol.9, Issue1, pp.499-508, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090169
B. Dupont, "Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime", Crime, Law and Social Change, Vol.67, pp. 97-116, 2017. DOI: https://doi.org/10.1007%2Fs10611-016-9649-z
D. Kao, "Exploring the cybercrime investigation framework of ATM Heist from ISO/IEC 27043:2015", International Conference on Advanced Communication Technology, Vol.67, Issue1, pp.177-182, 2017. DOI: https://doi.org/10.23919/ICACT.2017.7890079
M. A. Al-garadi, K. D. Varathan, & S. D. Ravana, "Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network", Computers in Human Behavior, Vol.63, pp.433-443, 2016. DOI: https://doi.org/10.1016/j.chb.2016.05.051
Y. Prayudi,, & S. Yusirwan, "The recognize of malware characteristics through static and dynamic analysis approach as an effort to prevent cybercrime activities", Journal of Theoretical and Applied Information Technology, Vol.77, No.3, pp.438-445, 2015.
D. de Graaf, A. F. Shosha, & P. Gladyshev, "BREDOLAB: Shopping in the Cybercrime Underworld", International Conference on Digital Forensics and Cyber Crime, Indiana, USA, pp.302-313, 2013. DOI: https://doi.org/10.1007/978-3-642-39891-9_19
A. K Sood, S. Zeadally, & R. Bansal, "Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels", IEEE Communications Magazine, Vol.55, Issue7, pp.22-28, 2017. DOI: https://doi.org/10.1109/MCOM.2017.1600969
F. Skopik, & Q. Li, "Trustworthy incident information sharing in social cyber defense alliances", IEEE Symposium on Computers and Communications, IEEE, Split, Croatia, pp.233-239, 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754951
K. K. e Silva, "Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting?", International Review of Law, Computers & Technology, Vol.32, Issue1, pp.21-36, 2018. DOI: https://doi.org/10.1080/13600869.2018.1418142
E. R. Leukfeldt, A. Lavorgna, & E. R. Kleemans, "Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime", European Journal of Criminal Policy and Research, Vol.23, No.3, pp.287-300, 2017. DOI: http://dx.doi.org/10.1007/s10610-016-9332-z
K. Hui, S. Kim, & Q. Wang, "Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks", MIS Quarterly, Vol.41, No.2, pp.497-523, 2017. DOI: http://dx.doi.org/10.25300/MISQ/2017/41.2.08
D. Kao, "Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments", The Journal of Supercomputing, Vol.72, Issue1, pp.141-160, 2016. DOI: https://doi.org/10.1007/s11227-015-1516-7
C. Konradt, A. Schillingb, & B. Wernersb, "Phishing: An economic analysis of cybercrime perpetrators", Computers and Security, Vol.58, pp.39-46, 2016. DOI: https://doi.org/10.1016/j.cose.2015.12.001
S. Pieschl, C. Kuhlmann & T. Porsch, "Beware of Publicity! Perceived Distress of Negative Cyber Incidents and Implications for Defining Cyberbullying", Journal of School Violence, Vol.14, No.1, pp.111-132, 2015. DOI: https://doi.org/10.1080/15388220.2014.971363
T. J. Holt, "Examining the Forces Shaping Cybercrime Markets Online", Social Science Computer Review, Vol.31, Issue2, pp.165-177, 2013. DOI: https://doi.org/10.1177/0894439312452998
A. K. Sood., R. Bansal, & R. J. Enbody, "Cybercrime: Dissecting the state of underground enterprise", IEEE Internet Computing, Vol.17, Issue1, pp.60-68, 2013. DOI: https://doi.org/10.1109/MIC.2012.61
M. R. J. Soudijn, & B. C. H. T Zegers, "Cybercrime and virtual offender convergence settings", Trends in Organized Crime, Vol.15, Issue2-3, pp.111-129, 2012. DOI: https://doi.org/10.1007/s12117-012-9159-z
A. Kuzmin, "State and trends of Russian cybercrime in 2011", 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, IEEE, St. Petersburg, Russia, pp.933-939, 2012. DOI: https://doi.org/10.1109/ICUMT.2012.6459794
A. Kigerl, "Routine Activity Theory and the Determinants of High Cybercrime Countries", Social Science Computer Review, Vol.30, Issue4, pp.470-486, 2011. DOI: https://doi.org/10.1177/0894439311422689
M. Redford, "U.S. and EU Legislation on Cybercrime", 2011 European Intelligence and Security Informatics Conference, IEEE, Athens, Greece, pp.34-37, 2011. DOI: https://doi.org/10.1109/EISIC.2011.38
S. McCombie, J. Pieprzyk, & P. Watters, "Cybercrime Attribution: An Eastern European Case Study", Proceedings of the 7th Australian Digital Forensics Conference, Edith Cowan University, Australian, pp.41-51, 2009. DOI: https://doi.org/10.4225/75/57b2880840ccf
A. M. Gasso, V. Fernandez-Cruz, I. Montiel, C. Martin-Fumado, & J. R. Agustina, "Retos forenses ante la cibercriminalidad social en menoresForensic challenges presented by social cybercrime in minors", Revista Espanola de Medicina Legal, Vol.45, Issue2, pp.73-76, 2019. DOI: https://doi.org/10.1016/j.reml.2018.11.003
A. S. Ahmed, S. Deb, A. S. B. Habib, M. N. Mollah, & A. S. Ahmad, "Simplistic Approach to Detect Cybercrimes and Deter Cyber Criminals", 2018 International Conference on Computer, Communication, Chemical, Material and Electronic Engineering, IEEE, Rajshahi, Bangladesh, 2018. DOI: https://doi.org/10.1109/IC4ME2.2018.8465618
E. Vasilomanolakis, S. Karuppayah, P. Kikiras, & M. Muhlhauser, "A honeypot-driven cyber incident monitor: lessons learned and steps ahead", Proceedings of the 8th International Conference on Security of Information and Networks, ACM International Conference, Sochi, Russia, pp.158-164, 2015. DOI: https://doi.org/10.1145/2799979.2799999
M. Tariq, B. Aslam, I. Rashid, & A. Waqar, "Cyber threats and incident response capability - a case study of Pakistan", 2013 2nd National Conference on Information Assurance, IEEE, Rawalpindi, Pakistan, pp.15-20, 2013. DOI: https://doi.org/10.1109/NCIA.2013.6725319
N. B. Sukhai, "Hacking and cybercrime", 2004 Information Security Curriculum Development Conference, ACM International Conference, NY, USA, pp.128-132, 2004. DOI: https://doi.org/10.1145/1059524.1059553
I.. Nadir, & T. Bakhshi, "Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques", 2018 International Conference on Computing, Mathematics and Engineering Technologies, IEEE, Sukkur, Pakistan, March 2018. DOI: https://doi.org/10.1109/ICOMET.2018.8346329
A. V. Mbaziira, & D. R. Murphy, "An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks", Proceedings of the 2nd International Conference on Compute and Data Analysis, ICCDA, IL, USA, pp.42-46, 2018. DOI: https://doi.org/10.1145/3193077.3193080
G. Settanni, Y. Shovgenya, F. Skopik, R. Graf, M. Wurzenberger & R. Fiedler, "Correlating cyber incident information to establish situational awareness in Critical Infrastructures", 2016 14th Annual Conference on Privacy, Security and Trust, IEEE, Auckland, New Zealand, pp.78-81, 2016. DOI: https://doi.org/10.1109/PST.2016.7906940
M. Eddolls, "Making cybercrime prevention the highest priority", Network Security, Vol.2016, Issue8, pp.5-8, 2016. DOI: https://doi.org/10.1016/S1353-4858(16)30075-7
M. Ionita, & V. Patriciu, "Cyber Incident Response Aided by Neural Networks and Visual Analytics", 2015 20th International Conference on Control Systems and Computer Science, IEEE, Bucharest, Romania, pp.229-233, 2015. DOI: https://doi.org/10.1109/CSCS.2015.41
F. Alrimawi, L. Pasquale, & B. Nuseibeh, "Software engineering challenges for investigating cyber-physical incidents", 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems, IEEE, Buenos Aires, Argentina, pp.34-40, 2017. DOI: https://doi.org/10.1109/SEsCPS.2017.9
M. Hopkins, & A. Dehghantanha, "Exploit Kits: The production line of the Cybercrime economy?", 2015 Second International Conference on Information Security and Cyber Forensics, IEEE, Cape Town, South Africa, pp.23-27, 2015. DOI: https://doi.org/10.1109/InfoSec.2015.7435501
J. Armin, P. Foti, & M. Cremonini, "0-Day Vulnerabilities and Cybercrime", 10th International Conference on Availability, Reliability and Security, IEEE, Toulouse, France, pp.711-718, 2015. DOI: https://doi.org/10.1109/ARES.2015.55
M. Eriksen-Jensen, "Holding back the tidal wave of cybercrime", Computer Fraud and Security, Vol.2013, No.3, pp.10-16, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70028-9
S. M. Virtanen, "Fear of Cybercrime in Europe: Examining the Effects of Victimization and Vulnerabilities", Psychiatry, Psychology and Law, Vol.23, Issue3, pp.323-338, 2017. DOI: https://doi.org/10.1080/13218719.2017.1315785
Y. Bentaleb, A. Abarda, H. Mharzi, & S. E. Hajji, "Application of latent class analysis to identify the youth population who risk being cybercrime victim on social networks", Contemporary Engineering Sciences, Vol.8, No.32, pp.1529-1534, 2015. DOI: https://doi.org/10.12988/ces.2015.58261
E. R. Leukfeldt, "Cybercrime and social ties: Phishing in Amsterdam", Trends in Organized Crime, Vol.17, Issue4, pp.231-249, 2014. DOI: https://doi.org/10.1007/s12117-014-9229-5
J. L. Bele, M. Dimc, D. Rozman, & A. S. Jemec, "Rasing awarenss of cybercrime - the use of education as a means of prevention and protection", 10th International Conference Mobile Learning 2014, Madrid, Spain, pp.281-284, 2014.
P. Gerard, N. Kapadia, J. Acharya, P. T. Chang, & Z. Lefkovitz, "Cybersecurity in Radiology: Access of Public Hot Spots and Public Wi-Fi and Prevention of Cybercrimes and HIPAA Violations", American Journal of Roentgenology, Vol.201, No.6, pp.1186-1189, 2013. DOI: https://doi.org/10.2214/AJR.12.9651
I. Lin, Y. Yen, & A. Chang, "A Study on Digital Forensics Standard Operation Procedure for Wireless Cybercrime", 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, Seoul, South Korea, pp.543-548, 2011. DOI: https://doi.org/10.1109/IMIS.2011.58
M. S. Bargh, S. Choenni, I. Mulder, & R. Pastoor, "Exploring a Warrior Paradigm to Design Out Cybercrime", 2012 European Intelligence and Security Informatics Conference, IEEE, Odense, Denmark, pp.84-90, 2012. DOI: https://doi.org/10.1109/EISIC.2012.40
G. Davis, A. Garcia, & W. Zhang "Empirical Analysis of the Effects of Cyber Security Incidents", Risk Analysis, Vol.29, No.9, pp.1304-1316, 2009. DOI: https://doi.org/10.1111/j.1539-6924.2009.01245.x
D. Manky, "Cybercrime as a service: a very modern business", Computer Fraud & Security, Vol.2013, Issue6, pp.9-13, 2013. DOI: https://doi.org/10.1016/S1361-3723(13)70053-8
C. M. M. Reep-van den Bergh, & M. Junger, "Victims of cybercrime in Europe: a review of victim surveys", Crime Science, Vol.7, No.5, 2018. DOI: https://doi.org/10.1186/s40163-018-0079-3
S. G. A. van de Weijer, R. Leukfeldt, & W. Bernasco, "Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking", European Journal of Criminology, Vol.16, Issue4, pp.486-508, 2018. DOI: https://doi.org/10.1177/1477370818773610
M. Kaakinen, T. Keipi, P. Rasanen, & A. Oksanen, "Cybercrime Victimization and Subjective Well-Being: An Examination of the Buffering Effect Hypothesis Among Adolescents and Young Adults", Cyberpsychology, Behavior, and Social Networking, Vol.21, No.20, pp.129-137, 2018. DOI: https://doi.org/10.1089/cyber.2016.0728
M. Junger, L. Montoya, P. Hartel, & M. Heydari, "Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe", 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment, Cyber SA, IEEE, London, UK, June 2017. DOI: https://doi.org/10.1109/CyberSA.2017.8073391
S. G. A. van de Weijer, & E. R. Leukfeldt, "Big Five Personality Traits of Cybercrime Victims", Cyberpsychology, Behavior, and Social Networking, Vol.20, No.7, 2017. DOI: https://doi.org/10.1089/cyber.2017.0028
A. Al-Nemrat, & C. Benzaid, "Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation", 214th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Helsinki, Finland, pp.1380-1385, August 2015. DOI: https://doi.org/10.1109/Trustcom.2015.534
W. Goucher, "Being a cybercrime victim", Computer Fraud and Security, Vol.2010, Issue10, pp.16-18, 2010. DOI: https://doi.org/10.1016/S1361-3723(10)70134-2
L. Allodi, M. Corradin, & F. Massacci, "Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned", IIEEE Transactions on Emerging Topics in Computing, Vol.4. No.1, pp.35-46, 2016. DOI: https://doi.org/10.1109/TETC.2015.2397395
A. Nagurney, "A Multiproduct Network Economic Model of Cybercrime in Financial Services", Service Science, Vol.7, No.1, pp.70-81, 2015. DOI: https://doi.org/10.1287/serv.2015.0095
A. Alazab, J. Abawajy, M. Hobbs, R. Layton, & A. Khraisat., "Crime toolkits: The productisation of cybercrime", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, Melbourne, Australia, pp.1626-1632, 2013. DOI: https://doi.org/10.1109/TrustCom.2013.273
K. L. Modecki, B. L. Barber, & L. Vernon, "Mapping Developmental Precursors of Cyber-Aggression: Trajectories of Risk Predict Perpetration and Victimization", Journal of Youth and Adolescence, Vol.42, Issue5, pp.651-661, 2013. DOI: http://dx.doi.org/10.1007/s10964-013-9938-0
G. Settanni, F. Skopik, Y. Shovgenya, & R. Fiedler, "A Collaborative Analysis System for Cross-organization Cyber Incident Handling", Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP, Rome, Italy, pp.105-116, 2016. DOI: https://doi.org/10.5220/0005688301050116
S. Romanosky, "Examining the costs and causes of cyber incidents", Journal of Cybersecurity, Vol.2, Issue2, pp. 121-135, 2016. DOI: https://doi.org/10.1093/cybsec/tyw001
A. Joode, "Effective corporate security and cybercrime", Network Security, Vol. 2011, Issue 9, pp.16-18, 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70097-6
R. Joffee, "Cybercrime: the global epidemic at your network door", Network Security, Vol.2010, Issue7, pp.4-7, 2010. DOI: https://doi.org/10.1016/S1353-4858(10)70091-X
Y. Ben-Itzhak, "Organised cybercrime and payment cards", Card Technology Today, Vol. 21, Issue2, pp.10-11, 2009. DOI: https://doi.org/10.1016/S0965-2590(09)70057-X
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.