메뉴 건너뛰기




Volumn 23, Issue 2, 2006, Pages 76-87

Cyber-warfare threatens corporations: Expansion into commercial environments

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION WARFARE; IS MANAGER; MILITARY ISSUES;

EID: 33645149750     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1201/1078.10580530/45925.23.2.20060301/92675.8     Document Type: Review
Times cited : (27)

References (82)
  • 1
    • 6244245533 scopus 로고    scopus 로고
    • Virtual defense
    • Adams, J. (2001). Virtual Defense. Foreign Affairs, 80(3), 98-112.
    • (2001) Foreign Affairs , vol.80 , Issue.3 , pp. 98-112
    • Adams, J.1
  • 3
    • 33645142767 scopus 로고    scopus 로고
    • Millennium project calls for declaration of global information warfare against transnational organized crime; corruption, money laundering, terrorism funding by organized crime should be treated as national security threat
    • February 10
    • Ascribe. (2003). Millennium Project Calls for Declaration of Global Information Warfare against Transnational Organized Crime; Corruption, Money Laundering, Terrorism Funding by Organized Crime Should Be Treated as National Security Threat Ascribe Newswire, February 10.
    • (2003) Ascribe Newswire
  • 4
    • 33645154463 scopus 로고    scopus 로고
    • China boosts information warfare development with vast research centers
    • September 27
    • Associated Press. (2002). China Boosts Information Warfare Development with Vast Research Centers. Associated Press Worldstream, September 27.
    • (2002) Associated Press Worldstream
  • 5
  • 6
    • 33645148966 scopus 로고    scopus 로고
    • Officials break up russian extortion ring
    • Aug 3
    • The Australian. (2004). Officials Break up Russian Extortion Ring The Australian, Aug 3, p. C03.
    • (2004) The Australian
  • 8
    • 1242343843 scopus 로고    scopus 로고
    • Information warfare across the Taiwan strait
    • Bolt, P. J., and Brenner, C. (2004). Information Warfare across the Taiwan Strait. Journal of Contemporary China, 13(38), 129.
    • (2004) Journal of Contemporary China , vol.13 , Issue.38 , pp. 129
    • Bolt, P.J.1    Brenner, C.2
  • 13
    • 0036662690 scopus 로고    scopus 로고
    • Information warfare
    • Cronin, B. (2002a). Information Warfare. Library Journal, 127(12), p. 54.
    • (2002) Library Journal , vol.127 , Issue.12 , pp. 54
    • Cronin, B.1
  • 14
    • 85032070768 scopus 로고    scopus 로고
    • Information warfare: Peering inside pandora's postmodern box
    • Cronin, B. (2002b). Information Warfare: Peering inside Pandora's Postmodern Box. Library Journal, 50(6), 279-294.
    • (2002) Library Journal , vol.50 , Issue.6 , pp. 279-294
    • Cronin, B.1
  • 15
    • 0033212218 scopus 로고    scopus 로고
    • Information warfare: Its applications in military and civilian contexts
    • Cronin, B., and Crawford, H. (1999). Information Warfare: Its Applications in Military and Civilian Contexts. Information Society, 15(4), 257-264.
    • (1999) Information Society , vol.15 , Issue.4 , pp. 257-264
    • Cronin, B.1    Crawford, H.2
  • 16
    • 33645143482 scopus 로고    scopus 로고
    • Imperatives of information operations and information warfare
    • A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
    • Dearth, D. H. (1998). Imperatives of Information Operations and Information Warfare. In A. D. Campen and D. H. Dearth (Eds.), Cyberwar 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
    • (1998) Cyberwar 2.0: Myths, Mysteries, and Reality
    • Dearth, D.H.1
  • 17
    • 33645162701 scopus 로고    scopus 로고
    • Operationalizing software
    • A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
    • deCaro, C. (1998). Operationalizing Software. In A. D. Campen and D. H. Dearth (Eds.), Cyberware 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
    • (1998) Cyberware 2.0: Myths, Mysteries, and Reality
    • Decaro, C.1
  • 18
    • 84898362929 scopus 로고    scopus 로고
    • Identity-theft on the rise, FTC warns
    • September 4
    • DeMarrais, K. (2003). Identity-Theft on the Rise, FTC Warns. Knight Ridder Business News, September 4, pp. 1-4.
    • (2003) Knight Ridder Business News , pp. 1-4
    • DeMarrais, K.1
  • 20
    • 33847063484 scopus 로고    scopus 로고
    • Retrieved Aug 10, 2005, May 2003
    • Department of Homeland Security. (2005). Information Sharing and Analysis Centers. Retrieved Aug 10, 2005, from www.dhs.gov/dhspublic/display?theme= 73&content=1375; original content from www.caio.gov, May 2003.
    • (2005) Information Sharing and Analysis Centers
  • 22
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber-economy
    • Dutta, A., and McCrohan, K. (2002). Management's Role in Information Security in a Cyber-Economy. California Management Review, 45(1), 67-87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 23
    • 84898136943 scopus 로고    scopus 로고
    • Press conference with attorney general john ashcroft; FBI director robert mueller; and FTC chairman timothy J. Muris
    • May 16
    • Federal News Service. (2003). Press Conference with Attorney General John Ashcroft; FBI Director Robert Mueller; and FTC Chairman Timothy J. Muris. Federal News Service Inc., May 16.
    • (2003) Federal News Service Inc.
  • 24
    • 84886764674 scopus 로고    scopus 로고
    • A systems view of information warfare
    • Friman, H. (2001). A Systems View of Information Warfare. Journal of Information Warfare, 7(1), 25-32.
    • (2001) Journal of Information Warfare , vol.7 , Issue.1 , pp. 25-32
    • Friman, H.1
  • 25
    • 0037412283 scopus 로고    scopus 로고
    • A new webmaster's guide to firewalls and security
    • Frolick, M. N. (2003). A New Webmaster's Guide to Firewalls and Security. Information Systems Management, 20(1, Winter), 29-34.
    • (2003) Information Systems Management , vol.20 , Issue.1 WINTER , pp. 29-34
    • Frolick, M.N.1
  • 26
    • 85013136025 scopus 로고    scopus 로고
    • The financial impact of IT security breaches: What do investors think?
    • Garg, A., Curtis, J., and Halper, H. (2003). The Financial Impact of IT Security Breaches: What Do Investors Think? Information Systems Security, 12(1), 22-34.
    • (2003) Information Systems Security , vol.12 , Issue.1 , pp. 22-34
    • Garg, A.1    Curtis, J.2    Halper, H.3
  • 28
    • 84876643897 scopus 로고    scopus 로고
    • February 14. Retrieved Aug. 10, 2005
    • Geralds, J. (2003). Hacker Insurance Set to Rocket, February 14. Retrieved Aug. 10, 2005, from http://www.vnunet.com/news/1138789
    • (2003) Hacker Insurance Set to Rocket
    • Geralds, J.1
  • 31
    • 33645151025 scopus 로고    scopus 로고
    • Net attacks down but sophistication is up
    • January 30
    • Gross, G. (2003). Net Attacks Down but Sophistication Is Up. IDG News Service, January 30.
    • (2003) IDG News Service
    • Gross, G.1
  • 32
    • 33645138595 scopus 로고    scopus 로고
    • U.S. tally in online-crime sweep: 150 charged
    • August 26
    • Hansell, S. (2004). U.S. Tally in Online-Crime Sweep: 150 Charged. New York Times, August 26.
    • (2004) New York Times
    • Hansell, S.1
  • 33
    • 33645133742 scopus 로고    scopus 로고
    • Concepts in information warfare
    • Hutchinson, W. (2002). Concepts in Information Warfare. Logistics Information Management, 15(5/6), 410-413.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 410-413
    • Hutchinson, W.1
  • 34
    • 73849132370 scopus 로고    scopus 로고
    • Retrieved Aug. 10, 2005
    • Information Systems Audit and Control Association (ISACA). (2005). Overview and History. Retrieved Aug. 10, 2005, from http://www.isaca.org/ template.cfm?section=Overview_and_History
    • (2005) Overview and History
  • 35
    • 33947174540 scopus 로고    scopus 로고
    • Oct. 31. Retrieved Aug. 10, 2005
    • International Information Systems Security Certification Consortium [ISC]2®. (2005). Press Releases, Oct. 31. Retrieved Aug. 10, 2005, from https://www.isc2.org/cgi/content.cgi?page=13
    • (2005) Press Releases
  • 36
    • 0012213034 scopus 로고    scopus 로고
    • (No. ISO/IEC 17799:2000(E)): The International Standards Organization/The International Electrotechnical Commission
    • ISO/IEC. (2000). Information Technology - Code of Practice for Information Security Management (No. ISO/IEC 17799:2000(E)): The International Standards Organization/The International Electrotechnical Commission.
    • (2000) Information Technology - Code of Practice for Information Security Management
  • 39
    • 33645167181 scopus 로고    scopus 로고
    • Hacker insurance market boosted by cyberattacks
    • January 27
    • Keating, G. (2003). Hacker Insurance Market Boosted by Cyberattacks. Reuters, January 27.
    • (2003) Reuters
    • Keating, G.1
  • 41
    • 84876604296 scopus 로고    scopus 로고
    • SANS. Retrieved Aug. 10, 2005
    • Key, V. (2004). What Is Solar Sunrise? SANS. Retrieved Aug. 10, 2005, from http://www.sans.org/resources/idfaq/solar_sunrise.php
    • (2004) What Is Solar Sunrise?
    • Key, V.1
  • 43
    • 79953274479 scopus 로고    scopus 로고
    • Cyber-insurance issues: Managing risk by tying network security to business goals
    • Kolodzinski, O. (2002). Cyber-Insurance Issues: Managing Risk by Tying Network Security to Business Goals. CPA Journal., 72(11), 10-11.
    • (2002) CPA Journal , vol.72 , Issue.11 , pp. 10-11
    • Kolodzinski, O.1
  • 44
    • 84876644736 scopus 로고    scopus 로고
    • May 14. Retrieved Aug. 10, 2005
    • Legard, D. (2003). Fake Bank Web Site Scam Reaches U.S., May 14. Retrieved Aug. 10, 2005, from http://www.itworld.com/Tech/2987/030514fakebank.
    • (2003) Fake Bank Web Site Scam Reaches U.S.
    • Legard, D.1
  • 45
    • 0004053345 scopus 로고
    • Washington, DC: National Defense University, Institute for National Strategic Studies
    • Libicki, M. C. (1995). What Is Information Warfare? Washington, DC: National Defense University, Institute for National Strategic Studies.
    • (1995) What Is Information Warfare?
    • Libicki, M.C.1
  • 46
    • 20444432182 scopus 로고    scopus 로고
    • Key issues for IT executives
    • Luftman, J., and McLean, E. R. (2004). Key Issues for IT Executives. MIS Quarterly Executive, 3(2), 89-104.
    • (2004) MIS Quarterly Executive , vol.3 , Issue.2 , pp. 89-104
    • Luftman, J.1    McLean, E.R.2
  • 47
    • 33645133741 scopus 로고
    • Survival of the fittest
    • Meall, L. (1989). Survival of the Fittest.Accountancy (UK), 103(1147), 140-141.
    • (1989) Accountancy (UK) , vol.103 , Issue.1147 , pp. 140-141
    • Meall, L.1
  • 48
    • 1642410284 scopus 로고    scopus 로고
    • Are you the weak link?
    • Mitnick, K. (2003). Are You the Weak Link? Harvard Business Review, 81(4), 18-20.
    • (2003) Harvard Business Review , vol.81 , Issue.4 , pp. 18-20
    • Mitnick, K.1
  • 49
    • 0004184890 scopus 로고
    • Washington D.C.: National Academy Press
    • National Research Council. (1991). Computers at Risk. Washington D.C.: National Academy Press.
    • (1991) Computers at Risk
  • 50
    • 33645158247 scopus 로고    scopus 로고
    • Identity-related misuse
    • D. E. Denning and P. J. Denning (Eds.), Reading, Massachusetts: ACM Press
    • Neumann, P. G. (1998). Identity-Related Misuse. In D. E. Denning and P. J. Denning (Eds.), Internet Besieged. Reading, Massachusetts: ACM Press.
    • (1998) Internet Besieged
    • Neumann, P.G.1
  • 51
    • 84886767428 scopus 로고    scopus 로고
    • Cyber-extortion evolves
    • O'Rourke, M. (2004). Cyber-Extortion Evolves. Risk Management, 51(4), 10-12.
    • (2004) Risk Management , vol.51 , Issue.4 , pp. 10-12
    • O'Rourke, M.1
  • 54
    • 84858559472 scopus 로고    scopus 로고
    • IDG News Service, November 19. Retrieved Aug. 10, 2005
    • PCWorld. (2001). Timeline: A 40-Year History of Hacking. IDG News Service, November 19. Retrieved Aug. 10, 2005, from http://www.cnn.com/2001/ TECH/internet/11/19/hack.history.idg/
    • (2001) Timeline: A 40-Year History of Hacking
  • 55
    • 0030400684 scopus 로고    scopus 로고
    • Information warfare - Your company needs you!
    • Porter, T. (1996). Information Warfare - Your Company Needs You! Computers & Security, 15, 561-566.
    • (1996) Computers & Security , vol.15 , pp. 561-566
    • Porter, T.1
  • 56
    • 84876632042 scopus 로고    scopus 로고
    • SecurityFocus, Sept. 27. Retrieved Aug. 10, 2005
    • Poulsen, K. (2004). U.N. Warns of Nuclear Cyber-Attack Risk. SecurityFocus, Sept. 27. Retrieved Aug. 10, 2005, from http://www.securityfocus. com/news/9592
    • (2004) U.N. Warns of Nuclear Cyber-Attack Risk
    • Poulsen, K.1
  • 59
    • 84876602586 scopus 로고    scopus 로고
    • American Forces Press Service, July 20. Retrieved Aug. 10, 2005
    • Rhem, K.T. (2005). China Investing in Information Warfare Technology, Doctrine. American Forces Press Service, July 20. Retrieved Aug. 10, 2005, from http://www.pentagon.gov/news/jul2005/20050720_2171.html
    • (2005) China Investing in Information Warfare Technology, Doctrine
    • Rhem, K.T.1
  • 61
    • 15744383822 scopus 로고    scopus 로고
    • Netware associates to attack spyware with new products
    • 22 Jan.
    • Richmond, R. (2004, 22 Jan). Netware Associates to Attack Spyware with New Products. Wall Street Journal, p. B5.
    • (2004) Wall Street Journal
    • Richmond, R.1
  • 62
    • 27644542479 scopus 로고    scopus 로고
    • Safeguarding your critical business information
    • Rosenoer, J. (2002). Safeguarding Your Critical Business Information. Harvard Business Review, 80(2), 20-21.
    • (2002) Harvard Business Review , vol.80 , Issue.2 , pp. 20-21
    • Rosenoer, J.1
  • 63
    • 0007735836 scopus 로고    scopus 로고
    • Something other than war
    • A. D. Campen and D. H. Dearth (Eds.), Fairfax, VA: AFCEA International Press
    • Schwartau, W. (1998). Something Other Than War. In A. D. Campen and D. H. Dearth (Eds.), Cyberwar 2.0: Myths, Mysteries, and Reality. Fairfax, VA: AFCEA International Press.
    • (1998) Cyberwar 2.0: Myths, Mysteries, and Reality
    • Schwartau, W.1
  • 64
    • 33645141316 scopus 로고    scopus 로고
    • Intrusion protection systems: Security's silver bullet?
    • Sequeira, D. (2003). Intrusion Protection Systems: Security's Silver Bullet? Business Communication Review, March, 36-41.
    • (2003) Business Communication Review, March , pp. 36-41
    • Sequeira, D.1
  • 65
    • 33645164781 scopus 로고    scopus 로고
    • Security infrastructure: Basics of intrusion detection systems
    • H. F. Tipton and M. Krause (Eds.), New York: Auerbach Publications
    • Shaurette, K. (2003). Security Infrastructure: Basics of Intrusion Detection Systems. In H. F. Tipton and M. Krause (Eds.), Information Security Management Handbook (4th ed., Vol. 4, pp. 683-698). New York: Auerbach Publications.
    • (2003) Information Security Management Handbook (4th Ed.) , vol.4 , pp. 683-698
    • Shaurette, K.1
  • 67
    • 33645154270 scopus 로고    scopus 로고
    • Web amplifies message of primitive executions
    • June 30
    • Smith, L. (2004, June 30). Web Amplifies Message of Primitive Executions. Los Angles Times.
    • (2004) Los Angles Times
    • Smith, L.1
  • 69
    • 84876608507 scopus 로고    scopus 로고
    • The other war on terror
    • August. Retrieved Aug 10, 2005
    • Sterling, B. (2004). The Other War on Terror. Wired, 12(8), August. Retrieved Aug 10, 2005, from http://www.wired.com/wired/archive/12.08/view.html? pg=4
    • (2004) Wired , vol.12 , Issue.8
    • Sterling, B.1
  • 72
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. (1990). Effective IS Security:An Empirical Study. Information Systems Research, 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 73
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., and Welke, R. J. (1998). Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, 22(4), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 74
    • 33645147472 scopus 로고    scopus 로고
    • Secret DTI inquiry into cyber-terror
    • June 9
    • Sunday Times. (1996). Secret DTI Inquiry into Cyber-Terror The (London) Sunday Times, June 9, pp. 1-8.
    • (1996) The (London) Sunday Times , pp. 1-8
  • 75
    • 33645142575 scopus 로고    scopus 로고
    • Al-Jazeera site experiences hack attack
    • March 25
    • Svensson, P. (2003).Al-Jazeera Site Experiences Hack Attack. The Associated Press, March 25.
    • (2003) The Associated Press
    • Svensson, P.1
  • 76
    • 3142674062 scopus 로고    scopus 로고
    • Firms' hacking-related insurance costs soar
    • Feb. 9. Retrieved Aug. 29, 2005
    • Swartz, J. (2003). Firms' hacking-related insurance costs soar. USA Today, Feb. 9. Retrieved Aug. 29, 2005, from http://www.usatoday.com/money/ industries/technology/2003-02-09-hacker_x.htm
    • (2003) USA Today
    • Swartz, J.1
  • 78
    • 33645133005 scopus 로고    scopus 로고
    • Leveraging protection mechanisms to provide defense in depth
    • M. E. Whitman and H. J. Mattord (Eds.), Boston: Course Technology
    • Tucker, T. E. (2004). Leveraging Protection Mechanisms to Provide Defense in Depth. In M. E. Whitman and H. J. Mattord (Eds.), Management of Information Security. Boston: Course Technology, p. 408.
    • (2004) Management of Information Security , pp. 408
    • Tucker, T.E.1
  • 79
    • 84882567623 scopus 로고    scopus 로고
    • Organized crime invades cyberspace
    • August 30. Retrieved Aug. 10, 2005
    • Verton, D. (2004). Organized Crime Invades Cyberspace. ComputerWorld, August 30. Retrieved Aug. 10, 2005, from http://www.computerworld.com/ securitytopics/security/story/0,10801,95501,00.html
    • (2004) ComputerWorld
    • Verton, D.1
  • 80
    • 84886762890 scopus 로고    scopus 로고
    • E-Bomb
    • Wilson, J. (2001). E-Bomb. Popular Mechanics, 178(9), 50-54.
    • (2001) Popular Mechanics , vol.178 , Issue.9 , pp. 50-54
    • Wilson, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.