The cyber threat landscape: Challenges and future research directions

Computers & Security - Tập 30 Số 8 - Trang 719-731 - 2011
Kim‐Kwang Raymond Choo1
1School of Computer and Information Science, University of South Australia, Mawson Lakes campus (Room F2-28), Mawson Lakes, SA 5095, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Alperovitch, 2011

2010

2010

2010

Australian Institute of Criminology (AIC). Money mules, High Tech Crime Brief No 16, 2008. Available on: http://www.aic.gov.au/publications/current%20series/htcb/1-20/htcb016.aspx [Date accessed 01.08.2011.].

2011

Baines, 2008, Online child sexual abuse: the law enforcement response

Benson, 2011

Brenner, 2008, Cybercrime haven, The Computer & Internet Lawyer, 25, 19

Broadhurst, 2011, Cybercrime and on-line safety in cyberspace, 153

2008

Choo, 2007

Choo, 2008, Organised crime groups in cyberspace: a typology, Trends in Organized Crime, 11, 270, 10.1007/s12117-008-9038-9

Choo, 2010

Choo, 2011

Choo KKR & Grabosky P forthcoming. Cyber crime. In Letizia Paoli, editor, Oxford Handbook of Organized Crime, New York: Oxford University Press.

Choo, 2007

Cohen, 1979, Social change and crime rate trends: a routine activity approach, American Sociological Review, 44, 588, 10.2307/2094589

Conti, 2010, Recruiting, development, and retention of cyber warriors despite an inhospitable culture, Small Wars Journal

Dandurand, 2007, Measures and mechanisms to strengthen international cooperation among prosecution services, Crime, Law and Social Change, 47, 261, 10.1007/s10611-007-9072-6

Drummond, 2010

Falliere, 2010

2009

2010

Felson, 1998

Glavin, 2009

Gjelten, 2011

Goldman, 2010

Grabosky, 2007, The internet, technology, and organized crime, Asian Journal of Criminology, 2, 145, 10.1007/s11417-007-9034-z

Gross, 2010

Ho, 2010

2010

2011

Jakobsson M & Juels A 2009. Server-side detection of malware infection. In Proceedings of New Security Paradigms Workshop (NSPW 2009), pp. 11–29.

Kirk, 2009

Leyden, 2010

2011

Markoff, 2010

2009

McGlasson, 2010

McMillan, 2007

McMillan, 2011

McMillan, 2011

Obama, 2009

2011

Pras, 2010

Richards, 2009

2010

Rudd, 2008

Sim, 2000

Smith, 2004

2010, Vol. XV

2011

2010

US-China Economic and Security Review Commission 2009. 2009 report to congress. http://www.uscc.gov/annual_report/2009/annual_report_full_09.pdf [Date last accessed: 06.07.11.].

US-China Economic and Security Review Commission 2010. 2010 report to congress. http://www.uscc.gov/annual_report/2010/annual_report_full_10.pdf[Date last accessed: .06.07.11.].

Yar, 2005, The novelty of ‘cybercrime’: an assessment in light of routine activity theory, European Journal of Criminology, 2, 407, 10.1177/147737080556056