메뉴 건너뛰기




Volumn 25, Issue 1, 2007, Pages 78-98

Viruses, worms, and Trojan horses: Serious crimes, nuisance, or both?

Author keywords

Computer crime; Cybercrime; Malware; Trojan horses; Viruses; Worms

Indexed keywords


EID: 33846081431     PISSN: 08944393     EISSN: 15528286     Source Type: Journal    
DOI: 10.1177/0894439306292346     Document Type: Article
Times cited : (23)

References (71)
  • 1
    • 32544449814 scopus 로고    scopus 로고
    • Controlling cyberspace: Applying the Computer Fraud and Abuse Act to the Internet
    • Adams, J. M. (1996). Controlling cyberspace: Applying the Computer Fraud and Abuse Act to the Internet. Computer and High Technology Law Journal, 12, 403-434.
    • (1996) Computer and High Technology Law Journal , vol.12 , pp. 403-434
    • Adams, J.M.1
  • 2
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard: An economic perspective
    • Anderson, R. (2001, December). Why information security is hard: An economic perspective. Paper presented at the 17th Annual Computer Security Applications, New Orleans, LA.
    • 17th Annual Computer Security Applications
    • Anderson, R.1
  • 3
    • 84950069637 scopus 로고
    • Trespassers will be prosecuted: Computer crime in the 1990s
    • Baker, G. D. (1993). Trespassers will be prosecuted: Computer crime in the 1990s. Computer/Law Journal, 12, 61-100.
    • (1993) Computer/Law Journal , vol.12 , pp. 61-100
    • Baker, G.D.1
  • 4
    • 33846035528 scopus 로고    scopus 로고
    • Barrett, N. (2003). Students delete history. Retrieved November 5, 2005, from http://www.vnunet.com/itweek/comment/2086036/students-delete-history
    • (2003) Students Delete History
    • Barrett, N.1
  • 5
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L. A., Loeb, M. P., & Zhou, L. (2003). The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security, 11, 431-448.
    • (2003) Journal of Computer Security , vol.11 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 6
    • 0003845462 scopus 로고    scopus 로고
    • Central Intelligence Agency. (2005). The world factbook. Retrieved July 26, 2005, from http://www.cia.gov/cia/publications/factbook/rankorder/2153rank. html
    • (2005) The World Factbook
    • Intelligence Agency, C.1
  • 7
    • 33846118089 scopus 로고    scopus 로고
    • The legislative response to the evolution of computer viruses
    • Colombell, M. R. (2002). The legislative response to the evolution of computer viruses. Richmond Journal of Law and Technology, 8. Retrieved October 28, 2005, from http://law.richmond.edu/jolt/v8i3/article18.html
    • (2002) Richmond Journal of Law and Technology , vol.8
    • Colombell, M.R.1
  • 8
    • 33846048614 scopus 로고    scopus 로고
    • Computer Crime and Intellectual Property Section. (2005). Computer crime. Retrieved June 28, 2005, from http://www.usdoj.gov/criminal/cybercrime/ compcrime.html
    • (2005) Computer Crime
    • Crime, C.1    Property Section, I.2
  • 9
    • 33846080793 scopus 로고
    • It's virus season again, has your computer been vaccinated? A survey of computer crime legislation as a response to malevolent software
    • Davis, B. S. (1994). It's virus season again, has your computer been vaccinated? A survey of computer crime legislation as a response to malevolent software. Washington University Law Quarterly, 72, 411-440.
    • (1994) Washington University Law Quarterly , vol.72 , pp. 411-440
    • Davis, B.S.1
  • 11
    • 33846077756 scopus 로고    scopus 로고
    • Cyberterrorism: The logic bomb versus the truck bomb
    • Denning, D. E. (2000, Autumn). Cyberterrorism: The logic bomb versus the truck bomb. Global Dialogue, pp. 29-37.
    • (2000) Global Dialogue , pp. 29-37
    • Denning, D.E.1
  • 13
    • 33846088014 scopus 로고    scopus 로고
    • Tales of Trojan horses: Why you should beware of those bearing gifts
    • Dickey, K. (2003). Tales of Trojan horses: Why you should beware of those bearing gifts. Avoid & Defeat Viruses, 9, 12-16. Retrieved October 2, 2005, from http://www.smartcomputing.com/editorial/article.asp?article=articles/ archive/l0902/03l02/03l02.asp
    • (2003) Avoid & Defeat Viruses , vol.9 , pp. 12-16
    • Dickey, K.1
  • 16
    • 33846078948 scopus 로고
    • Viruses and criminal law
    • P. J. Denning (Ed.), New York: Addison-Wesley.
    • Gemignani, M. (1990). Viruses and criminal law. In P. J. Denning (Ed.), Computers under attack: Intruders, worms, and viruses (pp. 489-494). New York: Addison-Wesley.
    • (1990) Computers under Attack: Intruders, Worms, and Viruses , pp. 489-494
    • Gemignani, M.1
  • 19
    • 33846117288 scopus 로고
    • The Computer Virus Eradication Act of 1989: The war against computer crime continues
    • Hansen, R. L. (1990). The Computer Virus Eradication Act of 1989: The war against computer crime continues. Software Law Journal, 3, 717-753.
    • (1990) Software Law Journal , vol.3 , pp. 717-753
    • Hansen, R.L.1
  • 21
    • 0023846187 scopus 로고
    • The process of criminalization: The case of computer crime laws
    • Hollinger, R. C., & Lanza-Kaduce, L. (1988). The process of criminalization: The case of computer crime laws. Criminology, 26, 101-126.
    • (1988) Criminology , vol.26 , pp. 101-126
    • Hollinger, R.C.1    Lanza-Kaduce, L.2
  • 23
    • 33846098932 scopus 로고    scopus 로고
    • Kaspersky Lab. (2005). History of malicious programs. Retrieved November 1, 2005, from http://www.viruslist.com/en/viruses/encyclopedia?chapter=153311030
    • (2005) History of Malicious Programs
    • Lab, K.1
  • 25
    • 7644227432 scopus 로고    scopus 로고
    • Sophistication in distributed denial-of-service attacks on the Internet
    • Kumar, V. A. (2004). Sophistication in distributed denial-of-service attacks on the Internet. Current Science, 87, 885-888.
    • (2004) Current Science , vol.87 , pp. 885-888
    • Kumar, V.A.1
  • 26
    • 33846095176 scopus 로고    scopus 로고
    • CNet%20News.com
    • Lemos, R. (2001). Attack knocks out Microsoft Web sites. CNet%20News.com. Retrieved July 27, 2005, from http://news.com.com/ Attack+knocks+out+Microsoft+Web+sites/2100-1001_3-251573.html
    • (2001) Attack Knocks Out Microsoft Web Sites
    • Lemos, R.1
  • 28
    • 33846068978 scopus 로고
    • Computer viruses and the law
    • Marion, C. C. (1989). Computer viruses and the law. Dikinson Law Review, 93, 625-642.
    • (1989) Dikinson Law Review , vol.93 , pp. 625-642
    • Marion, C.C.1
  • 29
    • 33846047165 scopus 로고    scopus 로고
    • May, M. (2004). Federal computer crime laws. The SANS Institute. Retrieved October 7, 2005, from http://www.sans.org/rr/whitepapers/legal/1446. php
    • (2004) Federal Computer Crime Laws
    • May, M.1
  • 30
    • 33846066957 scopus 로고
    • Computer crime statutes: Are they bridging the gap between law and technology?
    • McCall, C. (1988). Computer crime statutes: Are they bridging the gap between law and technology? Criminal Justice Journal, 11, 203-233.
    • (1988) Criminal Justice Journal , vol.11 , pp. 203-233
    • McCall, C.1
  • 31
    • 33846111077 scopus 로고    scopus 로고
    • Super worms could pose new security threats
    • McCollum, T. (2003). Super worms could pose new security threats. IT Audit, 6. Retrieved November 28, 2005, from http://www.theiia.org/itaudit/index. cfm?fuseaction=forum&fid=5435
    • (2003) IT Audit , vol.6
    • McCollum, T.1
  • 32
    • 77953834371 scopus 로고    scopus 로고
    • Microsoft TechNet. (2004). The antivirus defense-in-depth guide. Retrieved October 2, 2005, from http://www.microsoft.com/technet/security/ topics/serversecurity/avdind_2.mspx
    • (2004) The Antivirus Defense-in-depth Guide
    • Technet, M.1
  • 33
    • 24344470398 scopus 로고    scopus 로고
    • Viruses and the law: Why the law is ineffective
    • Montana, J. C. (2000). Viruses and the law: Why the law is ineffective. Information Management Journal, 34, 57-60.
    • (2000) Information Management Journal , vol.34 , pp. 57-60
    • Montana, J.C.1
  • 34
    • 33846041842 scopus 로고
    • The worm case: From indictment to verdict
    • P. J. Denning (Ed.), New York: Addison-Wesley.
    • Montz, L. B. (1990). The worm case: From indictment to verdict. In P. J. Denning (Ed.), Computers under attack: Intruders, worms, and viruses (pp. 260-263). New York: Addison-Wesley.
    • (1990) Computers under Attack: Intruders, Worms, and Viruses , pp. 260-263
    • Montz, L.B.1
  • 36
  • 38
    • 33751187983 scopus 로고    scopus 로고
    • Testimony before the House Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relation and the Census. Retrieved September 16, 2003, from
    • Pethia, R. D. (2003). Viruses and worms: What can we do about them? Testimony before the House Committee on Government Reform, Subcommittee on Technology, Information Policy, Intergovernmental Relation and the Census. Retrieved September 16, 2003, from http://www.cert.org/congressional_testimony/ Pethia-Testimony-9-10-2003/
    • (2003) Viruses and Worms: What Can We Do about Them?
    • Pethia, R.D.1
  • 42
    • 70449634813 scopus 로고    scopus 로고
    • The zombie hunters: On the trail of cyberextortionist
    • Ratliff, E. (2005, October 10). The zombie hunters: On the trail of cyberextortionist. The New Yorker, pp. 44-49.
    • (2005) The New Yorker , pp. 44-49
    • Ratliff, E.1
  • 44
    • 33846055775 scopus 로고    scopus 로고
    • Countering cyber war
    • Shimeall, T., Williams, P., & Dunlevy, C. (2001-2002). Countering cyber war. NATO Review, 49, 16-18. Retrieved July 16, 2005, from http://www.cert.org/archive/pdf/counter_cyberwar.pdf
    • (2001) NATO Review , vol.49 , pp. 16-18
    • Shimeall, T.1    Williams, P.2    Dunlevy, C.3
  • 45
    • 0032148572 scopus 로고    scopus 로고
    • An electronic Pearl Harbor? Not likely
    • Smith, G. (1998). An electronic Pearl Harbor? Not likely. Issues in Science and Technology, 15, 68-73.
    • (1998) Issues in Science and Technology , vol.15 , pp. 68-73
    • Smith, G.1
  • 47
    • 9744256585 scopus 로고
    • Computer crime - The need for deterrent legislation
    • Sokolik, S. L. (1980). Computer crime - The need for deterrent legislation. Computer/Law Journal, 2, 353-383.
    • (1980) Computer/Law Journal , vol.2 , pp. 353-383
    • Sokolik, S.L.1
  • 49
    • 1242295776 scopus 로고    scopus 로고
    • State and local law enforcement needs to combat electronic crime
    • Washington, DC: U.S. Department of Justice, National Institute of Justice, Office of Justice Programs.
    • Stambaugh, H., Beaupre, D., Icove, D. J., Baker, R., Cassaday, W., & Williams, W. P. (2000). State and local law enforcement needs to combat electronic crime. In Research in brief (pp. 1-6). Washington, DC: U.S. Department of Justice, National Institute of Justice, Office of Justice Programs.
    • (2000) Research in Brief , pp. 1-6
    • Stambaugh, H.1    Beaupre, D.2    Icove, D.J.3    Baker, R.4    Cassaday, W.5    Williams, W.P.6
  • 53
    • 33846073247 scopus 로고    scopus 로고
    • Symantec. (2005a). Security risks. Retrieved October 5, 2005, from http://securityresponse.symantec.com/avcenter/security_risks/
    • (2005) Security Risks
  • 55
    • 33846117745 scopus 로고
    • A survey of computer crime studies
    • Taber, J. K. (1980). A survey of computer crime studies. Computer/Law Journal, 2, 275-327.
    • (1980) Computer/Law Journal , vol.2 , pp. 275-327
    • Taber, J.K.1
  • 57
    • 84882022925 scopus 로고    scopus 로고
    • Timeline. (2005). CBSNews. Retrieved November 28, 2005, from http://www.cbsnews.com/htdocs/cyber_crime/timeline.html
    • (2005) Timeline
  • 61
    • 4344568547 scopus 로고    scopus 로고
    • Washington, DC: U.S. Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, Uniform Crime Reporting Program.
    • U.S. Department of Justice. (2000). National incident-based reporting system volume 1: Data collection guidelines. Washington, DC: U.S. Department of Justice, Federal Bureau of Investigation, Criminal Justice Information Services Division, Uniform Crime Reporting Program.
    • (2000) National Incident-based Reporting System Volume 1: Data Collection Guidelines
    • Department Of Justice, U.S.1
  • 63
    • 33846101809 scopus 로고    scopus 로고
    • Vmyths.com, Rhode Island Soft Systems, Inc. Retrieved November 3, 2005, from
    • Vmyths.com. (2003). Truth about computer hysteria. Rhode Island Soft Systems, Inc. Retrieved November 3, 2005, from http://www.vmyths.com/
    • (2003) Truth about Computer Hysteria
  • 65
    • 85140528371 scopus 로고    scopus 로고
    • Cybercrimes and the Internet
    • D. S. Wall (Ed.), London: Routledge.
    • Wall, D. S. (2001). Cybercrimes and the Internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1-17). London: Routledge.
    • (2001) Crime and the Internet , pp. 1-17
    • Wall, D.S.1
  • 66
    • 27844511478 scopus 로고    scopus 로고
    • Insecurity and the policing of cyberspace
    • A. Crawford (Ed.), Portland, OR: Willan.
    • Wall, D. S. (2002). Insecurity and the policing of cyberspace. In A. Crawford (Ed.), Crime and insecurity: The governance of safety in Europe (pp. 186-209). Portland, OR: Willan.
    • (2002) Crime and Insecurity: The Governance of Safety in Europe , pp. 186-209
    • Wall, D.S.1
  • 67
    • 24144447168 scopus 로고    scopus 로고
    • Aldershot, UK: Dartmouth.
    • Wall, D. S. (2003). Cyberspace crime. Aldershot, UK: Dartmouth.
    • (2003) Cyberspace Crime
    • Wall, D.S.1
  • 71
    • 33846042319 scopus 로고
    • Combating unauthorized Internet access
    • Young, L. F. (1995). Combating unauthorized Internet access. Jurimetrics Journal, 35, 257-261.
    • (1995) Jurimetrics Journal , vol.35 , pp. 257-261
    • Young, L.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.