$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] Cybercrime: Understanding and addressing the concerns of stakeholders

Computers & security, v.30 no.8, 2011년, pp.803 - 814  

Martin, N. (National Centre for Information Systems Research (NCISR), College of Business and Economics, Hanna Neumann Building 021, The Australian National University, ACT 0200, Australia) ,  Rice, J.

Abstract AI-Helper 아이콘AI-Helper

Cybercrime and cybercriminal activities continue to impact communities as the steady growth of electronic information systems enables more online business. The collective views of sixty-six computer users and organizations, that have an exposure to cybercrime, were analyzed using concept...

주제어

참고문헌 (115)

  1. Journal of Adolescent Health Agatston 41 6 S59 2007 10.1016/j.jadohealth.2007.09.003 Students perspectives on cyber bullying 

  2. Computers and Security Albrechtsen 26 4 276 2007 10.1016/j.cose.2006.11.004 A qualitative study of users’ view on information security 

  3. Amoroso 1994 Fundamentals of computer security technology 

  4. Journal of Social Sciences Asokhia 23 1 13 2010 10.1080/09718923.2010.11892806 Enhancing national development and growth through combating cybercrime/Internet fraud: a comparative approach 

  5. Communications of AIS Bagchi 12 684 2003 An analysis of the growth of computer and Internet security breaches 

  6. The Computer Journal Benjamin 41 7 429 1998 10.1093/comjnl/41.7.429 Protecting IT systems from cyber crime 

  7. Communications of the ACM Bergel 43 2 17 2000 10.1145/328236.328114 Identity theft, social security numbers, and the web 

  8. Communications of the ACM Bhaskar 49 2 81 2006 10.1145/1113034.1113075 State and local law enforcement is not ready for a cyber katrina 

  9. Britz 2009 Computer forensics and cyber crime: an introduction 

  10. Canadian Journal of Educational Administration and Policy Brown 57 1 2006 Cyber-bullying: developing a policy to direct responses that are equitable and effective in addressing this special form of bullying 

  11. Journal of Criminal Justice Burns 32 5 477 2004 10.1016/j.jcrimjus.2004.06.008 Assessing law enforcement preparedness to address Internet fraud 

  12. Butcher 2011 Brodie’s suicide prompts law on bullying 

  13. Carter 2004 Law enforcement intelligence: a guide for local, state, and tribal law enforcement agencies 

  14. Chalmers 330 1992 Proceedings of the 15th annual ACM SIGIR conference on research and development in information retrieval, June 1992 Bead: explorations in information visualisation 

  15. Chen 1992 Using theory to improve program and policy evaluations 

  16. Clough 2010 Principles of cybercrime 

  17. Computers and Security Cohen 6 1 22 1987 10.1016/0167-4048(87)90122-2 Computer viruses: theory and experiments 

  18. 1995 Criminal Code Act 

  19. 2001 Cybercrime Act 

  20. 2010 Inquiry into cybercrime, house of representatives standing committee on communications 

  21. 2010 Inquiry into cyber-safety, joint select committee on cyber-safety 

  22. 2011 Review into treaties (report no. 116), joint standing committee on treaties 

  23. 2000 CSI/FBI computer crime and security survey 

  24. 2009 CSI/FBI computer crime and security survey 

  25. 2004 Convention on cybercrime 

  26. Creswell 2003 Research design: qualitative, quantitative, and mixed method approaches 

  27. Cross 2009 Australian covert bullying prevalence study (ACBPS) 

  28. IEEE Pervasive Computing Dagon 3 4 11 2004 10.1109/MPRV.2004.21 Mobile phones as computing devices: the viruses are coming! 

  29. Evaluation and Program Planning Davis 12 1 31 1989 10.1016/0149-7189(89)90019-0 Construct validity in measurement: a pattern matching approach 

  30. Denzin 2005 The handbook of qualitative research 

  31. Academy of Management Review Donaldson 20 65 1995 10.5465/amr.1995.9503271992 The stakeholder theory of the corporation: concepts, evidence and implications 

  32. Dumais 148 1998 CIKM ’98: proceedings of the 7th international conference on information and knowledge management Inductive learning algorithms and representations for text categorisations 

  33. Organization Science Freeman 15 364 2004 10.1287/orsc.1040.0066 Stakeholder theory and “the corporate objective revisited” 

  34. Journal of Information Warfare Furnell 1 2 35 2001 Categorising cybercrime and cybercriminals: the problem and potential approaches 

  35. Furnell 2001 Cybercrime: vandalizing the information society 

  36. Information Management and Security Garg 11 2 74 2003 10.1108/09685220310468646 Quantifying the financial impact of IT security breaches 

  37. Computer Geer 38 18 2005 10.1109/MC.2005.26 Malicious bots threaten network security 

  38. Communications of the ACM Gibson 48 8 37 2005 10.1145/1076211.1076236 Spyware was inevitable 

  39. Gragido 2011 Cybercrime and espionage: an analysis of subversive multi-vector threats 

  40. Hammond 2003 Identity theft: how to protect your most valuable asset 

  41. New Scientist Hecht 194 2602 60 2007 10.1016/S0262-4079(07)62542-1 When web browsers turn bad 

  42. Computer Heyman 40 5 18 2007 10.1109/MC.2007.179 New attack tricks antivirus software 

  43. Hinduja 2009 Bullying beyond the schoolyard: preventing and responding to cyberbullying 

  44. Criminal Justice Hoar 20 3 4 2005 Trends in cybercrime: the darkside of the Internet 

  45. Organizational Research Methods Jackson 5 4 307 2002 10.1177/109442802237114 Concept mapping as an alternative approach for the analysis of open-ended survey responses 

  46. Communications of the ACM Jagatic 5 10 94 2007 10.1145/1290958.1290968 Social phishing 

  47. Jain 2005 Cyber crime issues, threats and management 

  48. Jakobsson 2007 Phishing and countermeasures: understanding the increasing problem of electronic identity theft 

  49. Janczewski 2007 Cyber warfare and cyber terrorism 

  50. Evaluation and Program Planning Johnsen 23 67 2000 10.1016/S0149-7189(99)00038-5 Concept mapping in mental health: uses and adaptations 

  51. Network Security Johnson Feb 15 2006 10.1016/S1353-4858(06)70337-3 Security awareness: switch to a better programme 

  52. Klein 2011 Casey heynes breaks silence over bully video from chifley college and thoughts of suicide 

  53. Journal of Adolescent Health Kowalski 41 6 S22 2008 10.1016/j.jadohealth.2007.08.017 Electronic bullying among middle school students 

  54. Kowalski 2007 Cyber bullying: bullying in the digital age 

  55. Krippendorff 2004 Content analysis: an introduction to its methodology 

  56. IEEE Computer Lampson 37 6 37 2004 10.1109/MC.2004.17 Computer security in the real world 

  57. IEEE Computer Leavitt 38 4 20 2005 10.1109/MC.2005.134 Mobile phones: the next frontier for hackers? 

  58. 2005 Leximancer user manual version 2.25 

  59. Journal of Computers Lu 1 6 11 2006 10.4304/jcp.1.6.11-18 Cybercrime & cybercriminals: an overview of the Taiwan experience 

  60. Mansell 2006 Security challenges of networks: cyber trust and cyber crime, EDS innovation research programme discussion paper no. 5 

  61. Mansell 2005 Trust and crime in information societies 

  62. Risk Management: International Journal Martin 9 3 188 2007 10.1057/palgrave.rm.8250030 Profiling enterprise risks in large computer companies using the Leximancer software tool 

  63. Computer Law and Security Report Marshall 21 2 128 2005 10.1016/j.clsr.2005.02.004 Identity theft in an online world 

  64. IEEE Security and Privacy McCarty 1 4 87 2003 10.1109/MSECP.2003.1219079 Botnets: big and bigger 

  65. IEEE Security and Privacy McCarty 1 5 89 2003 10.1109/MSECP.2003.1236244 Automated identity theft 

  66. IEEE Software McGraw 17 5 33 2000 10.1109/52.877857 Attacking malicious code: a report to the Infosec research council 

  67. McQuade 2009 Cyber bullying: protecting kids and adults from online bullies 

  68. Communications of the ACM Mercuri 49 2 17 2006 10.1145/1125944.1125961 Scoping identity theft 

  69. Milhorn 2007 Cybercrime: how to avoid becoming a victim 

  70. Myers 2011 Responding to cyber bullying: an action tool for school leaders 

  71. Journal of General Management Nykodym 31 63 2006 10.1177/030630700603100405 Fighting cybercrime 

  72. Performance Improvement Journal Nykodym 49 5 42 2010 10.1002/pfi.20151 The managers guide to understanding, detecting and thwarting computer crime: an international performance issue 

  73. CLSR Computer Law and Security Report Nykodym 2 185 2007 Communication: a vital tool to combat cyber crime 

  74. CLSR Computer Law and Security Report Nykodym 21 408 2005 10.1016/j.clsr.2005.07.001 Criminal profiling and insider cyber crime 

  75. 2011 Crimes amendment (bullying) bill (5.04.2011) 

  76. Pfleeger 2003 Security in computing 

  77. Computers and Security Philippsohn 20 53 2001 10.1016/S0167-4048(01)01021-5 Trends in cybercrime: an overview of current financial crimes on the Internet 

  78. Computers and Security Pounder 20 311 2001 10.1016/S0167-4048(01)00406-0 Cybercrime: backdrop to the Council of Europe convention 

  79. Communications of the ACM Provos 52 4 42 2009 10.1145/1498765.1498782 Cybercrime 2.0: when the cloud turns dark 

  80. Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, October 25-27, Rio de Janeiro, Brazil 2006; pp. 41-52. 

  81. Richards 2009 The Australian Business Assessment of Computer User Security (ABACUS): a national survey. Research and public policy series no. 102 

  82. Computer Fraud and Security Riem 3 13 2001 10.1016/S1361-3723(01)00615-7 Cybercrimes of the 21st century 

  83. Computer Fraud and Security Riem 4 12 2001 10.1016/S1361-3723(01)00417-1 Cybercrimes of the 21st century 

  84. Computer Fraud and Security Riem 6 13 2001 10.1016/S1361-3723(01)00615-7 Cybercrimes of the 21st century: crimes against the individual-part 1 

  85. Rogers 2010 Cyberbullying: activities to help children and teens to stay safe in a texting, twittering, social networking world 

  86. Schell 2004 Cybercrime: a reference handbook 

  87. Schmalleger 2009 Crimes of the Internet 

  88. Computers and Security Schultz 26 1 1 2004 10.1016/j.cose.2004.01.002 Security training and awareness - fitting a square peg in a round hole 

  89. Computers and Security Schultz 24 6 425 2005 10.1016/j.cose.2005.07.002 The human factor in security 

  90. Shariff 2009 Confronting cyberbullying: what schools need to know to control misconduct and avoid legal consequences 

  91. Information Management and Computer Security Siponen 8 1 31 2000 10.1108/09685220010371394 A conceptual foundation for organizational information security awareness 

  92. Computers and Society Siponen 31 2 24 2001 10.1145/503345.503348 Five dimensions of information security awareness 

  93. Skoudis 2004 Malware: fighting malicious code 

  94. Information Management and Computer Security Smith 10 4 178 2002 10.1108/09685220210436976 Issues in cybersecurity: understanding the potential risks associated with hackers/crackers 

  95. Behaviour Research Methods Smith 38 2 262 2006 10.3758/BF03192778 Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping 

  96. Journal of Child Psychology and Psychiatry Smith 49 376 2008 10.1111/j.1469-7610.2007.01846.x Cyberbullying: its nature and impact in secondary school pupils 

  97. Sofaer 2001 The transnational dimension of cyber crime and terrorism, hoover national security forum series 

  98. Computer Fraud and Security Sommer 1 8 2004 10.1016/S1361-3723(04)00017-X The future for the policing of cybercrime 

  99. Journal of Artificial Life Spafford 1 3 249 1994 10.1162/artl.1994.1.3.249 Computer viruses as artificial life 

  100. Spears 2008 Behind the scenes: insights into the human dimension of covert bullying 

  101. Crime, Law and Social Change Speer 34 3 259 2000 10.1023/A:1008332132218 Redefining borders: the challenges of cybercrime 

  102. Information Management and Computer Security Spurling 3 2 20 1995 10.1108/09685229510792988 Promoting security awareness and commitment 

  103. Computers and Security Stanton 24 2 124 2005 10.1016/j.cose.2004.07.001 Analysis of end user security behaviours 

  104. Szor 2005 Virus research and defense 

  105. Thomas 2003 Cybercrime: law enforcement, security and surveillance in the information age 

  106. Communications of the ACM Thompson 48 8 41 2005 10.1145/1076211.1076237 Why spyware poses multiple threats to security 

  107. Thomson ME, von Solms R. An effective information security awareness program for industry. In: Proceedings of the WG 11.2 and WG 11.1 of the TC11 IFIP; 1997. 

  108. Information Management and Computer Security Thomson 6 4 167 1998 10.1108/09685229810227649 Information security awareness: educating your users effectively 

  109. Evaluation and Program Planning Trochim 12 1 1 1989 10.1016/0149-7189(89)90016-5 An introduction to concept mapping for planning and evaluation 

  110. Consulting and Clinical Psychology Trochim 62 4 766 1994 10.1037/0022-006X.62.4.766 Using concept mapping to develop a conceptual framework of staff’s views of a supported employment program for persons with severe mental illness 

  111. Health Promotion Practice Trochim 5 1 8 2004 10.1177/1524839903258020 Setting objectives for community and systems change: an application of concept mapping for planning a statewide health improvement initiative 

  112. Vacca 2003 Identity theft 

  113. Communications of the ACM Whitman 46 8 91 2003 10.1145/859670.859675 Enemy at the gate: threats to information security 

  114. Wilson 2003 Building an information technology security awareness and training program 

  115. Wooding 2003 Raising citizen awareness of information security: a practical guide. eAware program 

관련 콘텐츠

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로