메뉴 건너뛰기




Volumn 30, Issue 8, 2011, Pages 719-731

The cyber threat landscape: Challenges and future research directions

Author keywords

Culture of security; Cyber crime; Cyber exploitation; Policing and preventative strategy; Public private partnership; Routine Activity Theory

Indexed keywords

CYBER EXPLOITATION; CYBER-CRIMES; POLICING AND PREVENTATIVE STRATEGY; PUBLIC PRIVATE PARTNERSHIPS; ROUTINE ACTIVITY THEORY;

EID: 80955142795     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.08.004     Document Type: Article
Times cited : (351)

References (57)
  • 2
    • 80955159170 scopus 로고    scopus 로고
    • Australian Associated Press (AAP) News.com.au 9 October [Date last accessed: 06.07.11.]
    • Australian Associated Press (AAP) Military faces huge cyber espionage threat News.com.au 9 October 2010 http://www.news.com.au/technology/military- faces-huge-cyber-espionage-threat/story-e6frfrnr-1225936268254 [Date last accessed: 06.07.11.]
    • (2010) Military Faces Huge Cyber Espionage Threat
  • 4
    • 78751478754 scopus 로고    scopus 로고
    • Australian Government House of Representatives Standing Committee on Communications Commonwealth of Australia Canberra
    • Australian Government House of Representatives Standing Committee on Communications Hackers, fraudsters and botnets: tackling the problem of cyber crime 2010 Commonwealth of Australia Canberra
    • (2010) Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
  • 5
    • 80955132868 scopus 로고    scopus 로고
    • Australian Institute of Criminology (AIC). Date accessed 01.08.2011.
    • Australian Institute of Criminology (AIC). Money mules, High Tech Crime Brief No 16, 2008. Available on: http://www.aic.gov.au/publications/ current%20series/htcb/1-20/htcb016.aspx [Date accessed 01.08.2011.].
    • (2008) Money Mules, High Tech Crime Brief No 16, 2008
  • 6
    • 80955155727 scopus 로고    scopus 로고
    • AVG [Date last accessed: 06.07.11.]
    • AVG AVG Community powered threat report: Q2, 2011 2011 http://www.avg.com.au/files/media/avg-threat-report-2011-q2.pdf [Date last accessed: 06.07.11.]
    • (2011) AVG Community Powered Threat Report: Q2, 2011
  • 8
    • 80955132864 scopus 로고    scopus 로고
    • News.com.au 29 March [Date last accessed: 06.07.11.]
    • S. Benson China spies suspected of hacking Julia Gillard's emails News.com.au 29 March 2011 http://www.news.com.au/technology/federal-ministers- emails-suspected-of-being-hacked/story-e6frfrnr-1226029713668 [Date last accessed: 06.07.11.]
    • (2011) China Spies Suspected of Hacking Julia Gillard's Emails
    • Benson, S.1
  • 10
    • 80955155209 scopus 로고    scopus 로고
    • Cybercrime and on-line safety in cyberspace
    • C. Smith, S. Zhang, R. Barberet, Routledge NY
    • R. Broadhurst, and K.-K.R. Choo Cybercrime and on-line safety in cyberspace C. Smith, S. Zhang, R. Barberet, Routledge International Handbook of Criminology 2011 Routledge NY 153 165
    • (2011) Routledge International Handbook of Criminology , pp. 153-165
    • Broadhurst, R.1    Choo, K.-K.R.2
  • 11
    • 70449670320 scopus 로고    scopus 로고
    • Center for Strategic and International Studies (CSIS) Center for Strategic and International Studies Washington, DC
    • Center for Strategic and International Studies (CSIS) Securing cyberspace for the 44th presidency 2008 Center for Strategic and International Studies Washington, DC
    • (2008) Securing Cyberspace for the 44th Presidency
  • 13
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: A typology
    • K.K.R. Choo Organised crime groups in cyberspace: a typology Trends in Organized Crime 11 3 2008 270 295
    • (2008) Trends in Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.K.R.1
  • 16
    • 80955135932 scopus 로고    scopus 로고
    • Cyber crime
    • Letizia Paoli, editor New York: Oxford University Press
    • Choo KKR & Grabosky P forthcoming. Cyber crime. In Letizia Paoli, editor, Oxford Handbook of Organized Crime, New York: Oxford University Press.
    • Oxford Handbook of Organized Crime
    • Kkr, C.1    Grabosky, P.2
  • 18
    • 0000204509 scopus 로고
    • Social change and crime rate trends: A routine activity approach
    • L.E. Cohen, and M. Felson Social change and crime rate trends: a routine activity approach American Sociological Review 44 4 1979 588 608
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 19
    • 80955155213 scopus 로고    scopus 로고
    • Recruiting, development, and retention of cyber warriors despite an inhospitable culture
    • [Date last accessed: 06.07.11.]
    • G. Conti, and J. Easterly Recruiting, development, and retention of cyber warriors despite an inhospitable culture Small Wars Journal 2010 http://smallwarsjournal.com/blog/journal/docs-temp/482-conti-easterly.pdf [Date last accessed: 06.07.11.]
    • (2010) Small Wars Journal
    • Conti, G.1    Easterly, J.2
  • 20
    • 36749100989 scopus 로고    scopus 로고
    • Measures and mechanisms to strengthen international cooperation among prosecution services
    • Y. Dandurand, G. Colombo, and N. Passas Measures and mechanisms to strengthen international cooperation among prosecution services Crime, Law and Social Change 47 4-5 2007 261 289
    • (2007) Crime, Law and Social Change , vol.47 , Issue.45 , pp. 261-289
    • Dandurand, Y.1    Colombo, G.2    Passas, N.3
  • 27
    • 84896464484 scopus 로고    scopus 로고
    • [Date last accessed: 06.07.11.]
    • T. Gjelten Volunteer cyber army emerges In Estonia 2011 http://www.npr.org/2011/01/04/132634099/in-estonia-volunteer-cyber-army-defends- nation [Date last accessed: 06.07.11.]
    • (2011) Volunteer Cyber Army Emerges in Estonia
    • Gjelten, T.1
  • 29
    • 36849069363 scopus 로고    scopus 로고
    • The internet, technology, and organized crime
    • P. Grabosky The internet, technology, and organized crime Asian Journal of Criminology 2 2 2007 145 161
    • (2007) Asian Journal of Criminology , vol.2 , Issue.2 , pp. 145-161
    • Grabosky, P.1
  • 33
    • 81455154221 scopus 로고    scopus 로고
    • IBM X-Force® IBM Corporation Somers, NY [Date last accessed: 06.07.11.]
    • IBM X-Force® IBM X-Force® 2010 trend and risk report 2011 IBM Corporation Somers, NY http://public.dhe.ibm.com/common/ssi/ecm/en/wgl03007usen/ WGL03007USEN.PDF [Date last accessed: 06.07.11.]
    • (2011) IBM X-Force® 2010 Trend and Risk Report
  • 35
    • 80054028550 scopus 로고    scopus 로고
    • CIO.com 6 June [Date last accessed: 06.07.11.]
    • J. Kirk ATM malware spreading around the world CIO.com 6 June 2009 http://www.cio.com/article/494341/ATM-Malware-Spreading-Around-the-World [Date last accessed: 06.07.11.]
    • (2009) ATM Malware Spreading Around the World
    • Kirk, J.1
  • 37
    • 84907814397 scopus 로고    scopus 로고
    • Lookout [Date last accessed: 05.08.11.]
    • Lookout Lookout mobile threat report: August 2011 2011 https://www.mylookout.com/-downloads/lookout-mobile-threat-report-2011.pdf [Date last accessed: 05.08.11.]
    • (2011) Lookout Mobile Threat Report: August 2011
  • 38
    • 80955159158 scopus 로고    scopus 로고
    • NYTimes 19 November [Date last accessed: 06.07.11.]
    • J. Markoff Worm can deal double blow to nuclear program NYTimes 19 November 2010 http://www.nytimes.com/2010/11/20/world/middleeast/20stuxnet.html? ref=technology [Date last accessed: 06.07.11.]
    • (2010) Worm Can Deal Double Blow to Nuclear Program
    • Markoff, J.1
  • 40
    • 80955135400 scopus 로고    scopus 로고
    • Govinfosecurity 15 March [Date last accessed: 06.07.11.]
    • L. McGlasson Agencies issue ACH, wire fraud advisory Govinfosecurity 15 March 2010 http://www.govinfosecurity.com/articles.php?art-id=2298 [Date last accessed: 06.07.11.]
    • (2010) Agencies Issue ACH, Wire Fraud Advisory
    • McGlasson, L.1
  • 41
    • 80955159155 scopus 로고    scopus 로고
    • CSO 10 January [Date last accessed:.06.07.11.]
    • R. McMillan NSA helped Microsoft make vista secure CSO 10 January 2007 http://www.csoonline.com.au/index.php?id=2112787630&eid=-302 [Date last accessed:.06.07.11.]
    • (2007) NSA Helped Microsoft Make Vista Secure
    • McMillan, R.1
  • 42
    • 80955155202 scopus 로고    scopus 로고
    • Computerworld 15 June [Date last accessed: 06.07.11.]
    • R. McMillan Comerica bank ordered to pay after customer hacked Computerworld 15 June 2011 http://www.computerworld.com/s/article/9217662/ Comerica-Bank-ordered-to-pay-after-customer-hacked?taxonomyName= Security&taxonomyId=17 [Date last accessed: 06.07.11.]
    • (2011) Comerica Bank Ordered to Pay after Customer Hacked
    • McMillan, R.1
  • 43
    • 80955135393 scopus 로고    scopus 로고
    • PC World 29 July [Date last accessed: 03.08.11.]
    • R. McMillan US Phisher Who Hit 38,500 Gets Long Prison Sentence PC World 29 July 2011 http://www.pcworld.com/businesscenter/article/236877/us-phisher- who-hit-38500-gets-long-prison-sentence.html [Date last accessed: 03.08.11.]
    • (2011) US Phisher Who Hit 38,500 Gets Long Prison Sentence
    • McMillan, R.1
  • 48
    • 80955159151 scopus 로고    scopus 로고
    • RSA [Date last accessed: 06.07.11.]
    • RSA RSA online fraud report: September, 2010 2010 http://www.rsa.com/ solutions/consumer-authentication/intelreport/11094-Online-Fraud-report-0910. pdf [Date last accessed: 06.07.11.]
    • (2010) RSA Online Fraud Report: September, 2010
  • 52
    • 80955159154 scopus 로고    scopus 로고
    • Symantec [Date last accessed:.06.07.11.]
    • Symantec Symantec global internet security threat report: trends for 2009 Vol. XV 2010 http://eval.symantec.com/mktginfo/enterprise/white-papers/b- whitepaper-internet-security-threat-report-xv-04-2010.en-us.pdf [Date last accessed:.06.07.11.]
    • (2010) Symantec Global Internet Security Threat Report: Trends for 2009 , vol.15
  • 53
    • 84870046687 scopus 로고    scopus 로고
    • Symantec [Date last accessed: 06.07.11.]
    • Symantec Symantec internet security threat report: trends for 2010 2011 https://www4.symantec.com/mktginfo/downloads/21182883-GA-REPORT-ISTR-Main- Report-04-11-HI-RES.pdf [Date last accessed: 06.07.11.]
    • (2011) Symantec Internet Security Threat Report: Trends for 2010
  • 54
    • 80955132843 scopus 로고    scopus 로고
    • Sydney Morning Herald (SMH) SMH.com.au 31 December[Date last accessed: 06.07.11.]
    • Sydney Morning Herald (SMH) Most sophisticated mobile virus starts spreading on Android smartphones 2010 http://www.smh.com.au/digital-life/ mobiles/most-sophisticated-mobile-virus-starts-spreading-on-android-smartphones- 20101231-19bne.html SMH.com.au 31 December[Date last accessed: 06.07.11.]
    • (2010) Most Sophisticated Mobile Virus Starts Spreading on Android Smartphones
  • 57
    • 34247657469 scopus 로고    scopus 로고
    • The novelty of 'cybercrime': An assessment in light of routine activity theory
    • M. Yar The novelty of 'cybercrime': an assessment in light of routine activity theory European Journal of Criminology 2 4 2005 407 427
    • (2005) European Journal of Criminology , vol.2 , Issue.4 , pp. 407-427
    • Yar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.