메뉴 건너뛰기




Volumn 23, Issue 4, 2013, Pages 409-412

Policing cybercrime: networked and social media technologies and the challenges for policing

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84886405555     PISSN: 10439463     EISSN: 14772728     Source Type: Journal    
DOI: 10.1080/10439463.2013.780222     Document Type: Editorial
Times cited : (43)

References (8)
  • 1
    • 84886397742 scopus 로고    scopus 로고
    • Measuring the cost of cybercrime, paper to the 11th Annual Workshop on the Economics of Information Security, June, Available from: [Accessed 1 February 2013]
    • Anderson, R., et al., 2012. Measuring the cost of cybercrime, paper to the 11th Annual Workshop on the Economics of Information Security, Berlin, 25-26 June. Available from: http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf [Accessed 1 February 2013].
    • (2012)
    • Anderson, R.1
  • 2
    • 84886422991 scopus 로고    scopus 로고
    • The National Crime Agency
    • APCC, June, Available from: [Accessed 4 February 2013]
    • APCC, 2012. The National Crime Agency. APCC briefing, 29 June. Available from: http://www.apccs.police.uk/fileUploads/Briefing_day_29th_June/NCA.pdf [Accessed 4 February 2013].
    • (2012) APCC briefing
  • 3
    • 84886394225 scopus 로고    scopus 로고
    • EU cybercrime centre launched by Commissioner Malmström
    • BBC, January, Available from: [Accessed 4 February 2013]
    • BBC, 2013. EU cybercrime centre launched by Commissioner Malmström. BBC Democracy Live, 9 January. Available from: http://news.bbc.co.uk/democracylive/hi/europe/newsid_9782000/9782597.stm [Accessed 4 February 2013].
    • (2013) BBC Democracy Live
  • 4
    • 84865549319 scopus 로고    scopus 로고
    • Cabinet Office, Cabinet Office. Available from: [Accessed 4 February 2013]
    • Cabinet Office, 2011. The UK cyber security strategy: protecting and promoting the UK in a digital world. Cabinet Office. Available from: http://www.cabinetoffice.gov.uk/resource-library/cyber-security-strategy [Accessed 4 February 2013].
    • (2011) The UK cyber security strategy: Protecting and promoting the UK in a digital world
  • 5
    • 84886390596 scopus 로고    scopus 로고
    • Interpol, Interpol. Available from: [Accessed 4 February 2013]
    • Interpol, 2012. Fighting 21st century crime. Interpol. Available from: http://www.interpol.int/content/download/15707/110080/version/4/file/IGC_brochure.PDF [Accessed 4 February 2013].
    • (2012) Fighting 21st century crime
  • 6
    • 84886379654 scopus 로고    scopus 로고
    • National Statistics, National Statistics/Scottish Government, Available from: [Accessed 1 February 2013]
    • National Statistics, 2012. 2010/11 Scottish crime and justice survey: main Findings. National Statistics/Scottish Government. Available from: http://www.scotland.gov.uk/Resource/Doc/361684/0122316.pdf [Accessed 1 February 2013].
    • (2012) 2010/11 Scottish crime and justice survey: Main Findings
  • 7
    • 84867315484 scopus 로고    scopus 로고
    • Obama order sped up wave of cyberattacks against Iran
    • June, Available from: [Accessed 4 February 2013]
    • Sanger, D., 2012. Obama order sped up wave of cyberattacks against Iran. The New York Times, 1 June. Available from: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=3&pagewanted=2&seid=auto&smid=tw-nytimespolitics&pagewanted=all& [Accessed 4 February 2013].
    • (2012) The New York Times
    • Sanger, D.1
  • 8
    • 84937202364 scopus 로고    scopus 로고
    • Perceptions of the eCrime controllers: modelling the influence of cooperation and data source factors
    • advance online publication, 17 December 2012, Available from:. [Accessed 12 January 2013]
    • Williams, M.L. and Levi, M., 2012. Perceptions of the eCrime controllers: modelling the influence of cooperation and data source factors. The Security Journal. advance online publication 17 December 2012;10.1057/sj.2012.47. Available from: http://www.palgrave-journals.com/sj/journal/vaop/ncurrent/abs/sj201247a.html. [Accessed 12 January 2013].
    • (2012) The Security Journal
    • Williams, M.L.1    Levi, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.