최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Computers & security, v.30 no.8, 2011년, pp.803 - 814
Martin, N. (National Centre for Information Systems Research (NCISR), College of Business and Economics, Hanna Neumann Building 021, The Australian National University, ACT 0200, Australia) , Rice, J.
Cybercrime and cybercriminal activities continue to impact communities as the steady growth of electronic information systems enables more online business. The collective views of sixty-six computer users and organizations, that have an exposure to cybercrime, were analyzed using concept...
Journal of Adolescent Health Agatston 41 6 S59 2007 10.1016/j.jadohealth.2007.09.003 Students perspectives on cyber bullying
Computers and Security Albrechtsen 26 4 276 2007 10.1016/j.cose.2006.11.004 A qualitative study of users’ view on information security
Amoroso 1994 Fundamentals of computer security technology
Journal of Social Sciences Asokhia 23 1 13 2010 10.1080/09718923.2010.11892806 Enhancing national development and growth through combating cybercrime/Internet fraud: a comparative approach
Communications of AIS Bagchi 12 684 2003 An analysis of the growth of computer and Internet security breaches
The Computer Journal Benjamin 41 7 429 1998 10.1093/comjnl/41.7.429 Protecting IT systems from cyber crime
Communications of the ACM Bergel 43 2 17 2000 10.1145/328236.328114 Identity theft, social security numbers, and the web
Communications of the ACM Bhaskar 49 2 81 2006 10.1145/1113034.1113075 State and local law enforcement is not ready for a cyber katrina
Britz 2009 Computer forensics and cyber crime: an introduction
Canadian Journal of Educational Administration and Policy Brown 57 1 2006 Cyber-bullying: developing a policy to direct responses that are equitable and effective in addressing this special form of bullying
Journal of Criminal Justice Burns 32 5 477 2004 10.1016/j.jcrimjus.2004.06.008 Assessing law enforcement preparedness to address Internet fraud
Butcher 2011 Brodie’s suicide prompts law on bullying
Carter 2004 Law enforcement intelligence: a guide for local, state, and tribal law enforcement agencies
Chalmers 330 1992 Proceedings of the 15th annual ACM SIGIR conference on research and development in information retrieval, June 1992 Bead: explorations in information visualisation
Chen 1992 Using theory to improve program and policy evaluations
Clough 2010 Principles of cybercrime
Computers and Security Cohen 6 1 22 1987 10.1016/0167-4048(87)90122-2 Computer viruses: theory and experiments
1995 Criminal Code Act
2001 Cybercrime Act
2010 Inquiry into cybercrime, house of representatives standing committee on communications
2010 Inquiry into cyber-safety, joint select committee on cyber-safety
2011 Review into treaties (report no. 116), joint standing committee on treaties
2000 CSI/FBI computer crime and security survey
2009 CSI/FBI computer crime and security survey
2004 Convention on cybercrime
Creswell 2003 Research design: qualitative, quantitative, and mixed method approaches
Cross 2009 Australian covert bullying prevalence study (ACBPS)
IEEE Pervasive Computing Dagon 3 4 11 2004 10.1109/MPRV.2004.21 Mobile phones as computing devices: the viruses are coming!
Evaluation and Program Planning Davis 12 1 31 1989 10.1016/0149-7189(89)90019-0 Construct validity in measurement: a pattern matching approach
Denzin 2005 The handbook of qualitative research
Academy of Management Review Donaldson 20 65 1995 10.5465/amr.1995.9503271992 The stakeholder theory of the corporation: concepts, evidence and implications
Dumais 148 1998 CIKM ’98: proceedings of the 7th international conference on information and knowledge management Inductive learning algorithms and representations for text categorisations
Organization Science Freeman 15 364 2004 10.1287/orsc.1040.0066 Stakeholder theory and “the corporate objective revisited”
Journal of Information Warfare Furnell 1 2 35 2001 Categorising cybercrime and cybercriminals: the problem and potential approaches
Furnell 2001 Cybercrime: vandalizing the information society
Information Management and Security Garg 11 2 74 2003 10.1108/09685220310468646 Quantifying the financial impact of IT security breaches
Computer Geer 38 18 2005 10.1109/MC.2005.26 Malicious bots threaten network security
Communications of the ACM Gibson 48 8 37 2005 10.1145/1076211.1076236 Spyware was inevitable
Gragido 2011 Cybercrime and espionage: an analysis of subversive multi-vector threats
Hammond 2003 Identity theft: how to protect your most valuable asset
New Scientist Hecht 194 2602 60 2007 10.1016/S0262-4079(07)62542-1 When web browsers turn bad
Computer Heyman 40 5 18 2007 10.1109/MC.2007.179 New attack tricks antivirus software
Hinduja 2009 Bullying beyond the schoolyard: preventing and responding to cyberbullying
Criminal Justice Hoar 20 3 4 2005 Trends in cybercrime: the darkside of the Internet
Organizational Research Methods Jackson 5 4 307 2002 10.1177/109442802237114 Concept mapping as an alternative approach for the analysis of open-ended survey responses
Communications of the ACM Jagatic 5 10 94 2007 10.1145/1290958.1290968 Social phishing
Jain 2005 Cyber crime issues, threats and management
Jakobsson 2007 Phishing and countermeasures: understanding the increasing problem of electronic identity theft
Janczewski 2007 Cyber warfare and cyber terrorism
Evaluation and Program Planning Johnsen 23 67 2000 10.1016/S0149-7189(99)00038-5 Concept mapping in mental health: uses and adaptations
Network Security Johnson Feb 15 2006 10.1016/S1353-4858(06)70337-3 Security awareness: switch to a better programme
Klein 2011 Casey heynes breaks silence over bully video from chifley college and thoughts of suicide
Journal of Adolescent Health Kowalski 41 6 S22 2008 10.1016/j.jadohealth.2007.08.017 Electronic bullying among middle school students
Kowalski 2007 Cyber bullying: bullying in the digital age
Krippendorff 2004 Content analysis: an introduction to its methodology
IEEE Computer Lampson 37 6 37 2004 10.1109/MC.2004.17 Computer security in the real world
IEEE Computer Leavitt 38 4 20 2005 10.1109/MC.2005.134 Mobile phones: the next frontier for hackers?
2005 Leximancer user manual version 2.25
Mansell 2006 Security challenges of networks: cyber trust and cyber crime, EDS innovation research programme discussion paper no. 5
Mansell 2005 Trust and crime in information societies
Risk Management: International Journal Martin 9 3 188 2007 10.1057/palgrave.rm.8250030 Profiling enterprise risks in large computer companies using the Leximancer software tool
Computer Law and Security Report Marshall 21 2 128 2005 10.1016/j.clsr.2005.02.004 Identity theft in an online world
IEEE Security and Privacy McCarty 1 4 87 2003 10.1109/MSECP.2003.1219079 Botnets: big and bigger
IEEE Security and Privacy McCarty 1 5 89 2003 10.1109/MSECP.2003.1236244 Automated identity theft
IEEE Software McGraw 17 5 33 2000 10.1109/52.877857 Attacking malicious code: a report to the Infosec research council
McQuade 2009 Cyber bullying: protecting kids and adults from online bullies
Communications of the ACM Mercuri 49 2 17 2006 10.1145/1125944.1125961 Scoping identity theft
Milhorn 2007 Cybercrime: how to avoid becoming a victim
Myers 2011 Responding to cyber bullying: an action tool for school leaders
Journal of General Management Nykodym 31 63 2006 10.1177/030630700603100405 Fighting cybercrime
Performance Improvement Journal Nykodym 49 5 42 2010 10.1002/pfi.20151 The managers guide to understanding, detecting and thwarting computer crime: an international performance issue
CLSR Computer Law and Security Report Nykodym 2 185 2007 Communication: a vital tool to combat cyber crime
CLSR Computer Law and Security Report Nykodym 21 408 2005 10.1016/j.clsr.2005.07.001 Criminal profiling and insider cyber crime
2011 Crimes amendment (bullying) bill (5.04.2011)
Pfleeger 2003 Security in computing
Computers and Security Philippsohn 20 53 2001 10.1016/S0167-4048(01)01021-5 Trends in cybercrime: an overview of current financial crimes on the Internet
Computers and Security Pounder 20 311 2001 10.1016/S0167-4048(01)00406-0 Cybercrime: backdrop to the Council of Europe convention
Communications of the ACM Provos 52 4 42 2009 10.1145/1498765.1498782 Cybercrime 2.0: when the cloud turns dark
Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, October 25-27, Rio de Janeiro, Brazil 2006; pp. 41-52.
Richards 2009 The Australian Business Assessment of Computer User Security (ABACUS): a national survey. Research and public policy series no. 102
Computer Fraud and Security Riem 3 13 2001 10.1016/S1361-3723(01)00615-7 Cybercrimes of the 21st century
Computer Fraud and Security Riem 4 12 2001 10.1016/S1361-3723(01)00417-1 Cybercrimes of the 21st century
Computer Fraud and Security Riem 6 13 2001 10.1016/S1361-3723(01)00615-7 Cybercrimes of the 21st century: crimes against the individual-part 1
Rogers 2010 Cyberbullying: activities to help children and teens to stay safe in a texting, twittering, social networking world
Schell 2004 Cybercrime: a reference handbook
Schmalleger 2009 Crimes of the Internet
Computers and Security Schultz 26 1 1 2004 10.1016/j.cose.2004.01.002 Security training and awareness - fitting a square peg in a round hole
Computers and Security Schultz 24 6 425 2005 10.1016/j.cose.2005.07.002 The human factor in security
Shariff 2009 Confronting cyberbullying: what schools need to know to control misconduct and avoid legal consequences
Information Management and Computer Security Siponen 8 1 31 2000 10.1108/09685220010371394 A conceptual foundation for organizational information security awareness
Computers and Society Siponen 31 2 24 2001 10.1145/503345.503348 Five dimensions of information security awareness
Skoudis 2004 Malware: fighting malicious code
Information Management and Computer Security Smith 10 4 178 2002 10.1108/09685220210436976 Issues in cybersecurity: understanding the potential risks associated with hackers/crackers
Behaviour Research Methods Smith 38 2 262 2006 10.3758/BF03192778 Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping
Journal of Child Psychology and Psychiatry Smith 49 376 2008 10.1111/j.1469-7610.2007.01846.x Cyberbullying: its nature and impact in secondary school pupils
Sofaer 2001 The transnational dimension of cyber crime and terrorism, hoover national security forum series
Computer Fraud and Security Sommer 1 8 2004 10.1016/S1361-3723(04)00017-X The future for the policing of cybercrime
Journal of Artificial Life Spafford 1 3 249 1994 10.1162/artl.1994.1.3.249 Computer viruses as artificial life
Spears 2008 Behind the scenes: insights into the human dimension of covert bullying
Crime, Law and Social Change Speer 34 3 259 2000 10.1023/A:1008332132218 Redefining borders: the challenges of cybercrime
Information Management and Computer Security Spurling 3 2 20 1995 10.1108/09685229510792988 Promoting security awareness and commitment
Computers and Security Stanton 24 2 124 2005 10.1016/j.cose.2004.07.001 Analysis of end user security behaviours
Szor 2005 Virus research and defense
Thomas 2003 Cybercrime: law enforcement, security and surveillance in the information age
Communications of the ACM Thompson 48 8 41 2005 10.1145/1076211.1076237 Why spyware poses multiple threats to security
Thomson ME, von Solms R. An effective information security awareness program for industry. In: Proceedings of the WG 11.2 and WG 11.1 of the TC11 IFIP; 1997.
Information Management and Computer Security Thomson 6 4 167 1998 10.1108/09685229810227649 Information security awareness: educating your users effectively
Evaluation and Program Planning Trochim 12 1 1 1989 10.1016/0149-7189(89)90016-5 An introduction to concept mapping for planning and evaluation
Consulting and Clinical Psychology Trochim 62 4 766 1994 10.1037/0022-006X.62.4.766 Using concept mapping to develop a conceptual framework of staff’s views of a supported employment program for persons with severe mental illness
Health Promotion Practice Trochim 5 1 8 2004 10.1177/1524839903258020 Setting objectives for community and systems change: an application of concept mapping for planning a statewide health improvement initiative
Vacca 2003 Identity theft
Communications of the ACM Whitman 46 8 91 2003 10.1145/859670.859675 Enemy at the gate: threats to information security
Wilson 2003 Building an information technology security awareness and training program
Wooding 2003 Raising citizen awareness of information security: a practical guide. eAware program
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.