메뉴 건너뛰기




Volumn 12, Issue 2, 2004, Pages 154-166

Cyberterrorism, computer crime, and reality

Author keywords

Computer crime; Data security; Information systems; Terrorism

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; INFORMATION MANAGEMENT; INTERNET; MATHEMATICAL MODELS; SECURITY SYSTEMS; SOCIETIES AND INSTITUTIONS;

EID: 3943076566     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220410530799     Document Type: Article
Times cited : (36)

References (34)
  • 2
    • 0347892655 scopus 로고    scopus 로고
    • Hack attack: Cyberthieves siphon millions from US Firms
    • Anthes, G.H. (1996), "Hack attack: cyberthieves siphon millions from US Firms", Computerworld, Vol. 30 No. 16, p. 81.
    • (1996) Computerworld , vol.30 , Issue.16 , pp. 81
    • Anthes, G.H.1
  • 3
    • 0001156375 scopus 로고
    • Managing computer crime: A research outlook
    • Backhouse, J. and Dhillon, G. (1995), "Managing computer crime: a research outlook", Computers & Security, Vol. 14 No. 7, pp. 645-51.
    • (1995) Computers and Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 4
    • 3943078360 scopus 로고    scopus 로고
    • Time for a new security model
    • Bort, J. (2002), "Time for a new security model", Network World, Vol. 19 No. 30, pp. s6-s8.
    • (2002) Network World , vol.19 , Issue.30
    • Bort, J.1
  • 5
    • 0038081630 scopus 로고    scopus 로고
    • CSIS on alert for cyber saboteurs: Spy agency monitors threat to computer networks
    • 9 January
    • Bronskill, J. (2001), "CSIS on alert for cyber saboteurs: spy agency monitors threat to computer networks", Ottawa Citizen, 9 January, p. A3.
    • (2001) Ottawa Citizen
    • Bronskill, J.1
  • 6
    • 3943053355 scopus 로고    scopus 로고
    • Statement of Dorothy E. Denning
    • Denning, D.E. (2000), Statement of Dorothy E. Denning, available at: www.house.gov/hasc/testimony/106thcongress/00-05-23denning.htm
    • (2000)
    • Denning, D.E.1
  • 7
    • 1842851683 scopus 로고    scopus 로고
    • Thwarting cyberterrorism
    • Desmond, P. (2002), "Thwarting cyberterrorism", Network World, Vol. 19 No. 7, pp. 72-4.
    • (2002) Network World , vol.19 , Issue.7 , pp. 72-74
    • Desmond, P.1
  • 8
    • 0037401061 scopus 로고    scopus 로고
    • Semiotic emergent framework to address the reality of cyberterrorism
    • Desouza, K.C. and Hensgen, T. (2003), "Semiotic emergent framework to address the reality of cyberterrorism", Technological Forecasting and Social Change., Vol. 70 No. 4, pp. 385-96.
    • (2003) Technological Forecasting and Social Change , vol.70 , Issue.4 , pp. 385-396
    • Desouza, K.C.1    Hensgen, T.2
  • 9
    • 0038172257 scopus 로고    scopus 로고
    • Cyberterrorism: Are we under siege?
    • Embar-Seddon, A. (2002), "Cyberterrorism: are we under siege?", American Behavioral Scientist, Vol. 45 No. 6, pp. 1033-44.
    • (2002) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1033-1044
    • Embar-Seddon, A.1
  • 10
    • 1642564389 scopus 로고    scopus 로고
    • Human behavior as a factor in the control of information systems misuse and computer crime
    • DSI, Atlanta, GA
    • Foltz, C., Cronan, P.T. and Jones, T. (2002), "Human behavior as a factor in the control of information systems misuse and computer crime", Proceedings of the Decision Sciences Institute, DSI, Atlanta, GA, pp. 1246-51.
    • (2002) Proceedings of the Decision Sciences Institute , pp. 1246-1251
    • Foltz, C.1    Cronan, P.T.2    Jones, T.3
  • 11
    • 3943054719 scopus 로고    scopus 로고
    • Politicians speak out on cyberterrorism
    • Gengler, B. (1999), "Politicians speak out on cyberterrorism", Network Security, Vol. 1999 No. 10, p. 6.
    • (1999) Network Security , vol.1999 , Issue.10 , pp. 6
    • Gengler, B.1
  • 12
    • 0036429285 scopus 로고    scopus 로고
    • Cyberterrorism?
    • Gordon, S. and Ford, R. (2002), "Cyberterrorism?", Computers & Security, Vol. 21 No. 7, pp. 636-47.
    • (2002) Computers and Security , vol.21 , Issue.7 , pp. 636-647
    • Gordon, S.1    Ford, R.2
  • 13
    • 0012133705 scopus 로고    scopus 로고
    • Sound security policies combat cyberterrorism
    • Hulme, G.V. (2002), "Sound security policies combat cyberterrorism", Information Week, No. 905, p. 22.
    • (2002) Information Week , Issue.905 , pp. 22
    • Hulme, G.V.1
  • 14
    • 3943096420 scopus 로고
    • Some minimum requirements for legal sanctioning systems with special emphasis on detection
    • National Swedish Council for Crime Prevention, Stockholm
    • Klette, H. (1975), "Some minimum requirements for legal sanctioning systems with special emphasis on detection", Proceedings of General Deterrence: A Conference on Current Research and Standpoints, National Swedish Council for Crime Prevention, Stockholm, pp. 12-59.
    • (1975) Proceedings of General Deterrence: A Conference on Current Research and Standpoints , pp. 12-59
    • Klette, H.1
  • 16
    • 3943059962 scopus 로고
    • Computer fraud - Points of high exposure you should focus on when controlling and reviewing for fraud
    • Kuong, J.F. (1992), "Computer fraud - points of high exposure you should focus on when controlling and reviewing for fraud", Computer Security, Auditing, and Controls, Vol. 19 No. 1, pp. 1-8.
    • (1992) Computer Security, Auditing, and Controls , vol.19 , Issue.1 , pp. 1-8
    • Kuong, J.F.1
  • 17
    • 3943056788 scopus 로고
    • Who's spying now?
    • Lang, C. (1995), "Who's spying now?", Netguide, Vol. 2 No. 7, pp. 44-50.
    • (1995) Netguide , vol.2 , Issue.7 , pp. 44-50
    • Lang, C.1
  • 19
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J. and Lee, Y. (2002), "A holistic model of computer abuse within organizations", Information Management & Computer Security, Vol. 10 No. 2, pp. 57-63.
    • (2002) Information Management and Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 21
    • 0037744199 scopus 로고    scopus 로고
    • Cyber-enemy: America's newest threat is lurking behind computer screens
    • McFeatters, A. (2001), "Cyber-enemy: America's newest threat is lurking behind computer screens", Pitsburgh Post-Gazette, p. E3.
    • (2001) Pitsburgh Post-Gazette
    • McFeatters, A.1
  • 22
    • 3943060104 scopus 로고    scopus 로고
    • Cyberterrorism: Ready to explode
    • April
    • Montgomery, G. (2003), "Cyberterrorism: ready to explode", Australian Personal Computer, Vol. 292, April, pp. 26-9.
    • (2003) Australian Personal Computer , vol.292 , pp. 26-29
    • Montgomery, G.1
  • 24
    • 67650600746 scopus 로고
    • National Research Council Computers at National Academy Press, Washington, DC
    • National Research Council (1991), Computers at Risk: Safe Computing in the Information Age, National Academy Press, Washington, DC.
    • (1991) Risk: Safe Computing in the Information Age
  • 27
    • 0036508551 scopus 로고    scopus 로고
    • 2002 CSI/FBI computer crime and security survey
    • Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues and Trends, Vol. 8 No. 1.
    • (2002) Computer Security Issues and Trends , vol.8 , Issue.1
    • Power, R.1
  • 28
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, W.F. and Fream, A.M. (1997), "A social learning theory analysis of computer crime among college students", The Journal of Research in Crime and Delinquency, Vol. 34 No. 4, pp. 495-518.
    • (1997) The Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 29
    • 0037497016 scopus 로고    scopus 로고
    • Terror in cyberspace
    • Stanton, J.J. (2002), "Terror in cyberspace", American Behavioral Scientist, Vol. 45 No. 6, pp. 1017-32.
    • (2002) American Behavioral Scientist , vol.45 , Issue.6 , pp. 1017-1032
    • Stanton, J.J.1
  • 31
    • 85139144524 scopus 로고
    • Controlling computer abuse: An empirical study of effective security countermeasures
    • DeGross, L.L. and Kriebel, C.H. (Eds), Pittsburgh, PA, ACM, Baltimore, MD
    • Straub, D.W. (1987), "Controlling computer abuse: an empirical study of effective security countermeasures", in DeGross, L.L. and Kriebel, C.H. (Eds), Proceedings of the International Conference on Information Systems, Pittsburgh, PA, ACM, Baltimore, MD, pp. 277-89.
    • (1987) Proceedings of the International Conference on Information Systems , pp. 277-289
    • Straub, D.W.1
  • 33
    • 3943071545 scopus 로고    scopus 로고
    • US vulnerable to cyberterrorism
    • Wehde, E. (1998), "US vulnerable to cyberterrorism", Computer Fraud & Security, Vol. 1998 No. 1, pp. 6-7.
    • (1998) Computer Fraud and Security , vol.1998 , Issue.1 , pp. 6-7
    • Wehde, E.1
  • 34
    • 0037686230 scopus 로고    scopus 로고
    • Heavyweights rally against net hackers
    • 29 January
    • Yasin, R. (1999), "Heavyweights rally against Net hackers", InternetWeek, Vol. 750, 29 January, p. 7.
    • (1999) InternetWeek , vol.750 , pp. 7
    • Yasin, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.