메뉴 건너뛰기




Volumn , Issue , 2008, Pages 189-194

Characterizing malware writers and computer attackers in their own words

Author keywords

Cybercrime; Hackers; Malware; Profiling

Indexed keywords

COMPUTER WORMS; PERSONAL COMPUTING; TOOLS;

EID: 77958467314     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 2
    • 33748435812 scopus 로고    scopus 로고
    • Computer Crime and Security Survey
    • Computer Security Institute and Federal Bureau of Investigation, online
    • Computer Security Institute and Federal Bureau of Investigation. (2006) "Computer Crime and Security Survey", [online], http://www.cybercrime.gov/FBI2006.pdf
    • (2006)
  • 3
    • 34247732721 scopus 로고
    • Grounded Theory Research: Procedures, Canons, and Evaluative Criteria
    • Corbin, J., and Strauss, A. (1990) "Grounded Theory Research: Procedures, Canons, and Evaluative Criteria", Qualitative Sociology Vol. 13, pp. 3-21.
    • (1990) Qualitative Sociology , vol.13 , pp. 3-21
    • Corbin, J.1    Strauss, A.2
  • 4
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy
    • J. Arquilla and D. Ronfeldt, editors, Santa Monica, CA, Rand
    • Denning, D.E. (2001) "Activism, hacktivism, and cyberterrorism: The Internet as a tool for influencing foreign policy." In J. Arquilla and D. Ronfeldt, editors, Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica, CA, Rand, pp. 239-288.
    • (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy , pp. 239-288
    • Denning, D.E.1
  • 5
    • 12844264751 scopus 로고    scopus 로고
    • Cybercrime: Vandalizing the Information Society
    • Addision-Wesley, Boston
    • Furnell, S. (2002) Cybercrime: Vandalizing the Information Society, Addision-Wesley, Boston.
    • (2002)
    • Furnell, S.1
  • 6
    • 11344279136 scopus 로고    scopus 로고
    • Elites, Lamers, Narcs and Whores: Exploring the Computer Underground
    • L. Cherny and E.R. Weise, editors, WA, Seal Press
    • Gilboa, N. (1996) "Elites, Lamers, Narcs and Whores: Exploring the Computer Underground." In L. Cherny and E.R. Weise, editors, Wired women: Gender and new realities in cyberspace Seattle, WA, Seal Press, pp. 98-113.
    • (1996) Wired women: Gender and new realities in cyberspace Seattle , pp. 98-113
    • Gilboa, N.1
  • 7
    • 33745758036 scopus 로고    scopus 로고
    • Virus Writers: The End of the Innocence?
    • online
    • Gordon, S. (2000) "Virus Writers: The End of the Innocence?", [online], http://www.research.ibm.com/antivirus/SciPapers/VB2000SG.pdf
    • (2000)
    • Gordon, S.1
  • 8
    • 33745747048 scopus 로고    scopus 로고
    • Convergence of Virus Writers and Hackers: Fact or Fantasy?
    • Cupertine, CA: Symantec
    • Gordon S, and Qingxiong, M. (2003) Convergence of Virus Writers and Hackers: Fact or Fantasy? Cupertine, CA: Symantec.
    • (2003)
    • Gordon, S.1    Qingxiong, M.2
  • 9
    • 55149118856 scopus 로고    scopus 로고
    • Examining a Transnational Problem: An Analysis of Computer Crime Victimization in Eight Countries From 1999 to 2001
    • 171-198, "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures", Deviant Behavior
    • Holt, T.J. (2003) "Examining a Transnational Problem: An Analysis of Computer Crime Victimization in Eight Countries From 1999 to 2001", International Journal of Comparative and Applied Criminal Justice Vol. 27, No 2, pp. 199-220 (2007) "Subcultural evolution? Examining the influence of on-and off-line experiences on deviant subcultures", Deviant Behavior Vol. 28, No. 2, pp. 171-198.
    • (2003) International Journal of Comparative and Applied Criminal Justice , vol.27 , Issue.2 , pp. 199-220
    • Holt, T.J.1
  • 10
    • 84925797895 scopus 로고    scopus 로고
    • Crime, deviance and the disembodied self: transcending the dangers of corporeality
    • Y. Jewkes, editor, Portland, OR, Willan Publishing
    • Jewkes, Y. and Sharp, K. (2003) "Crime, deviance and the disembodied self: transcending the dangers of corporeality." In Y. Jewkes, editor, Dot.cons: Crime, deviance and identity on the Internet, Portland, OR, Willan Publishing, pp. 1-14.
    • (2003) Dot.cons: Crime, deviance and identity on the Internet , pp. 1-14
    • Jewkes, Y.1    Sharp, K.2
  • 12
    • 84896524020 scopus 로고    scopus 로고
    • The Classification of Computer Viruses
    • online
    • Kapersky, E.V. 2003. The Classification of Computer Viruses. [online], http://www.avp.ch/avpve/classes/classes.stm
    • (2003)
    • Kapersky, E.V.1
  • 14
    • 0003461534 scopus 로고    scopus 로고
    • Interpreting Qualitative Data: Methods for Analyzing Talk, Text, and Interaction
    • 2nd Edition, SAGE Publications, Thousand Oaks
    • Silverman, D. (2001) Interpreting Qualitative Data: Methods for Analyzing Talk, Text, and Interaction, 2nd Edition, SAGE Publications, Thousand Oaks.
    • (2001)
    • Silverman, D.1
  • 15
    • 30644459162 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report
    • Symantec Corporation, online
    • Symantec Corporation. (2003) Symantec Internet Security Threat Report, [online], http://enterprisesecurity.symantec.com/content/knowledgelibrary.cfm?EID=0
    • (2003)
  • 16
    • 0003538357 scopus 로고    scopus 로고
    • Hackers: Crime in the Digital Sublime
    • New York: Routledge
    • Taylor, P.A. (1999) Hackers: Crime in the Digital Sublime. New York: Routledge.
    • (1999)
    • Taylor, P.A.1
  • 17
    • 33846043733 scopus 로고    scopus 로고
    • Digital Crime and Digital Terrorism
    • Prentice Hall, Upper Saddle River
    • Taylor, R.W., Caeti, T.J., Loper, D.K., Fritsch, E.J., and Liederbach, J. (2006) Digital Crime and Digital Terrorism, Prentice Hall, Upper Saddle River.
    • (2006)
    • Taylor, R.W.1    Caeti, T.J.2    Loper, D.K.3    Fritsch, E.J.4    Liederbach, J.5
  • 18
    • 0345257994 scopus 로고    scopus 로고
    • Hacker Culture
    • University of Minnesota Press, Minneapolis
    • Thomas, D. (2002) Hacker Culture, University of Minnesota Press, Minneapolis.
    • (2002)
    • Thomas, D.1
  • 19
    • 70350423437 scopus 로고    scopus 로고
    • The underground economy: Priceless
    • Thomas, R. and Martin, J. (2006) "The underground economy: Priceless",; login: The Usenix Magazine Vol. 31, No. 6, pp.7-17.
    • (2006) Login: The Usenix Magazine , vol.31 , Issue.6 , pp. 7-17
    • Thomas, R.1    Martin, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.