메뉴 건너뛰기




Volumn 9781489974396, Issue , 2014, Pages 81-99

A conceptual interdisciplinary plug-and-play cyber security framework

Author keywords

Cyber security; Cyber security framework; Cyber threats; Cybercrime; Interdisciplinary cyber security framework; Malicious cyber activities; National security

Indexed keywords

DEVELOPING COUNTRIES; NATIONAL SECURITY;

EID: 84905834871     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4899-7439-6_6     Document Type: Chapter
Times cited : (36)

References (84)
  • 1
    • 84984313122 scopus 로고
    • Foundation for a general strain theory of crime and delinquency
    • Agnew, R. (1992). Foundation for a general strain theory of crime and delinquency. Criminology, 30 (1), 47-87.
    • (1992) Criminology , vol.30 , Issue.1 , pp. 47-87
    • Agnew, R.1
  • 4
    • 85005305538 scopus 로고
    • The market for "lemons": Quality uncertainty and the market mechanism
    • Akerlof, G. A. (1970). The market for "Lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics, 84 (3), 488-500.
    • (1970) The Quarterly Journal of Economics , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.A.1
  • 7
    • 84925838576 scopus 로고    scopus 로고
    • Why information security is hard - An economic perspective
    • New Orleans, Louisiana, USA, Washington, DC: IEEE
    • Anderson, R. (2001). Why information security is hard - An economic perspective. In Proceedings of the 17th annual computer security applications conference, New Orleans, Louisiana, USA (pp. 358-365). Washington, DC: IEEE.
    • (2001) Proceedings of the 17th Annual Computer Security Applications Conference , pp. 358-365
    • Anderson, R.1
  • 9
    • 80053512050 scopus 로고    scopus 로고
    • Cyber militias and political hackers: Use of irregular forces in cyberwarfare
    • Applegae, S. D. (2011). Cyber militias and political hackers: Use of irregular forces in cyberwarfare. IEEE Security and Privacy, 9 (5), 16-22.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.5 , pp. 16-22
    • Applegae, S.D.1
  • 10
    • 84898662923 scopus 로고    scopus 로고
    • Australian Government, Department of the Prime Minister and Cabinet. Commonwealth of Australia, ACT, Australia
    • Australian Government, Department of the Prime Minister and Cabinet (2013) Strong and secure: a strategy for Australia's national security. Commonwealth of Australia, ACT, Australia.
    • (2013) Strong and Secure: A Strategy for Australia's National Security
  • 11
    • 84902262572 scopus 로고    scopus 로고
    • A study of ten popular Android mobile VoIP applications: Are the communications encrypted?
    • January 6-9, 2014, IEEE Computer Society Press
    • Azfar, A., Choo, K.-K. R., & Liu, L. (2014). A study of ten popular Android mobile VoIP applications: Are the communications encrypted? In: 47th Annual Hawaii international conference on system sciences (HICSS 2014), pp. 4858-4867, January 6-9, 2014, IEEE Computer Society Press.
    • (2014) 47th Annual Hawaii International Conference on System Sciences (HICSS 2014) , pp. 4858-4867
    • Azfar, A.1    Choo, K.-K.R.2    Liu, L.3
  • 12
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • Becker, G. S. (1968). Crime and punishment: An economic approach. Journal of Political Economy, 76 , 169-217.
    • (1968) Journal of Political Economy , vol.76 , pp. 169-217
    • Becker, G.S.1
  • 14
    • 84863759731 scopus 로고    scopus 로고
    • Social networking sites: Their users and social implications-A longitudinal study
    • Brandtzæg, P. B. (2012). Social networking sites: Their users and social implications-A longitudinal study. Journal of Computer-Mediated Communication, 17 (4), 467-488.
    • (2012) Journal of Computer-Mediated Communication , vol.17 , Issue.4 , pp. 467-488
    • Brandtzæg, P.B.1
  • 15
    • 85192416265 scopus 로고    scopus 로고
    • A new global convention on cybercrime
    • Broadhurst, R. (2010). A new global convention on cybercrime. Pakistan Journal of Criminology, 2 (4), 1-10.
    • (2010) Pakistan Journal of Criminology , vol.2 , Issue.4 , pp. 1-10
    • Broadhurst, R.1
  • 16
    • 80955155209 scopus 로고    scopus 로고
    • Cybercrime and on-line safety in cyberspace
    • C. Smith, S. Zhang, & R. Barberet (Eds.). New York, NY: Routledge
    • Broadhurst, R., & Choo, K. K. R. (2011). Cybercrime and on-line safety in cyberspace. In C. Smith, S. Zhang, & R. Barberet (Eds.), Routledge international handbook of criminology (pp. 153-165). New York, NY: Routledge.
    • (2011) Routledge International Handbook of Criminology , pp. 153-165
    • Broadhurst, R.1    Choo, K.K.R.2
  • 18
    • 85050789996 scopus 로고
    • Economic deprivation and neighborhood crime rates, 1960- 1980
    • Bursik, R., Jr., & Grasmick, H. (1993). Economic deprivation and neighborhood crime rates, 1960- 1980. Law and Society Review, 27 (2), 263-283.
    • (1993) Law and Society Review , vol.27 , Issue.2 , pp. 263-283
    • Bursik, R.1    Grasmick, H.2
  • 19
    • 79958694151 scopus 로고    scopus 로고
    • Center for Strategic and International Studies (CSIS). , Washington. DC: CSIS
    • Center for Strategic and International Studies (CSIS). (2011). Cybersecurity two years later . Washington. DC: CSIS.
    • (2011) Cybersecurity Two Years Later
  • 20
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: A typology
    • Choo, K. K. R. (2008). Organised crime groups in cyberspace: A typology. Trends in Organized Crime, 11 (3), 270-295.
    • (2008) Trends in Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.K.R.1
  • 21
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers and Security, 30 (8), 719-731.
    • (2011) Computers and Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.K.R.1
  • 22
  • 23
    • 46449097423 scopus 로고    scopus 로고
    • Criminal exploitation of online systems by organised crime groups
    • Choo, K.-K. R., & Smith, R. G. (2008). Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology, 3 (1), 37-59.
    • (2008) Asian Journal of Criminology , vol.3 , Issue.1 , pp. 37-59
    • Choo, K.-K.R.1    Smith, R.G.2
  • 25
    • 66649125667 scopus 로고    scopus 로고
    • Seven misconceptions of situational crime prevention
    • N. Tilley (Ed.). Cullompton: Willan Publishing
    • Clarke, R. V. (2005). Seven misconceptions of situational crime prevention. In N. Tilley (Ed.), Handbook of crime prevention and community safety (pp. 39-70). Cullompton: Willan Publishing.
    • (2005) Handbook of Crime Prevention and Community Safety , pp. 39-70
    • Clarke, R.V.1
  • 27
    • 0000204509 scopus 로고
    • Social change and crime rate trends: A routine activity approach
    • Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44 (4), 588-608.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 30
    • 0000953669 scopus 로고
    • The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields
    • DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review, 48 (2), 147-160.
    • (1983) American Sociological Review , vol.48 , Issue.2 , pp. 147-160
    • Dimaggio, P.J.1    Powell, W.W.2
  • 32
    • 34249696973 scopus 로고    scopus 로고
    • Thousand Oaks, CA: SAGE Publications
    • Felson, M. (2006). Crime and nature . Thousand Oaks, CA: SAGE Publications.
    • (2006) Crime and Nature
    • Felson, M.1
  • 37
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., & Rao, H. R. (2009a). Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47( 2), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 38
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., & Rao, H. R. (2009b). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18 (2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 39
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirements for a new methodology
    • Hitchings, J. (1995). Deficiencies of the traditional approach to information security and the requirements for a new methodology. Computers and Security, 14 (5), 377-383.
    • (1995) Computers and Security , vol.14 , Issue.5 , pp. 377-383
    • Hitchings, J.1
  • 41
    • 84874510393 scopus 로고    scopus 로고
    • Examining the forces shaping cybercrime markets online
    • Holt, T. J. (2013). Examining the forces shaping cybercrime markets online. Social Science Computer Review, 31 (2), 165-177.
    • (2013) Social Science Computer Review , vol.31 , Issue.2 , pp. 165-177
    • Holt, T.J.1
  • 42
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in Australia
    • Hooper, C., Martini, B., & Choo, K. K. R. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer Law and Security Review, 29 (2), 152-163.
    • (2013) Computer Law and Security Review , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.K.R.3
  • 43
    • 85192407067 scopus 로고    scopus 로고
    • Response speech by Mr. S. Iswaran, Minister in Prime Minister's Office and Second Minister for Home Affairs and Trade & Industry on the second reading of the computer misuse (Amendment) bill
    • 14 January
    • Iswaran, S. (2013). Response speech by Mr. S. Iswaran, Minister in Prime Minister's Office and Second Minister for Home Affairs and Trade & Industry on the second reading of the computer misuse (Amendment) bill. Media Release 14 January.
    • (2013) Media Release
    • Iswaran, S.1
  • 46
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19 (5), 469-479.
    • (1983) Journal of Experimental Social Psychology , vol.19 , Issue.5 , pp. 469-479
    • Maddux, J.E.1    Rogers, R.W.2
  • 48
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: OwnCloud as a case study
    • Martini, B., & Choo, K.-K. R. (2013). Cloud storage forensics: OwnCloud as a case study. Digital Investigation, 10 (4), 287-299. http://dx.doi.org/10.1016/j.diin.2013.08.005 .
    • (2013) Digital Investigation , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 49
    • 0000414040 scopus 로고
    • Social structure and anomie
    • Merton, R. (1938). Social structure and anomie. American Sociological Review, 3 (5), 672-682.
    • (1938) American Sociological Review , vol.3 , Issue.5 , pp. 672-682
    • Merton, R.1
  • 51
    • 84873443277 scopus 로고    scopus 로고
    • Cybercrime victimization: An examination of individual and situational level factors
    • Ngo, F. T., & Paternoste, R. (2011). Cybercrime victimization: An examination of individual and situational level factors. International Journal of Cyber Criminology, 5 (1), 773-793.
    • (2011) International Journal of Cyber Criminology , vol.5 , Issue.1 , pp. 773-793
    • Ngo, F.T.1    Paternoste, R.2
  • 52
    • 84862646119 scopus 로고    scopus 로고
    • Pursuing security in cyberspace: Strategic and organizational challenges
    • Nielsen, S. C. (2012). Pursuing security in cyberspace: Strategic and organizational challenges. Orbis Summer, 2012 , 336-356.
    • (2012) Orbis Summer , vol.2012 , pp. 336-356
    • Nielsen, S.C.1
  • 54
    • 33748777660 scopus 로고    scopus 로고
    • Assessing macro-level predictors and theories of crime: A meta-analysis
    • Pratt, T. C., & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A meta-analysis. Crime and Justice, 32 , 373-450.
    • (2005) Crime and Justice , vol.32 , pp. 373-450
    • Pratt, T.C.1    Cullen, F.T.2
  • 55
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick, D., & Choo K-K, R. (2013a). Digital droplets: Microsoft SkyDrive forensic data remnants. Future Generation Computer Systems, 29 (6), 1378-1394.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 56
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick, D., & Choo K-K, R. (2013b). Dropbox analysis: Data remnants on user machines. Digital Investigation, 10 (1), 3-18.
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 57
  • 64
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34 (4), 495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 66
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1 (3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 68
    • 84890628545 scopus 로고    scopus 로고
    • Symantec. Mountain View, CA: Symantec Corporation
    • Symantec. (2012). Internet security threat report 2011 trends (Vol. 17). Mountain View, CA: Symantec Corporation.
    • (2012) Internet Security Threat Report 2011 Trends , vol.17
  • 71
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: A definition
    • Thomson, K., & von Solms, R. (2005). Information security obedience: A definition. Computers and Security, 24 (1), 69-75.
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 69-75
    • Thomson, K.1    Von Solms, R.2
  • 73
    • 85192406832 scopus 로고    scopus 로고
    • (Presented to Parliament by the Prime Minister by Command of Her Majesty July 2011) UK Intelligence and Security Committee. Retrieved from
    • UK Intelligence and Security Committee. (2011). Annual report 2010-2011 (Presented to Parliament by the Prime Minister by Command of Her Majesty July 2011) . Retrieved from, http://www.official-documents.gov.uk/document/cm81/8114/8114.pdf
    • (2011) Annual Report 2010-2011
  • 75
    • 84881111823 scopus 로고    scopus 로고
    • US Government Accountability Office (US GAO). Washington, DC: US GAO.
    • US Government Accountability Office (US GAO). (2012a). Cybersecurity: Threats impacting the nation . Washington, DC: US GAO.
    • (2012) Cybersecurity: Threats Impacting the Nation
  • 80
    • 84887499198 scopus 로고    scopus 로고
    • US White House. Retrieved from
    • US White House. (2013). Executive order: Improving critical infrastructure cybersecurity . Retrieved from, http://www.whitehouse.gov/the-press-office/2013/02/12/executive-orderimproving- critical-infrastructure-cybersecurity
    • (2013) Executive Order: Improving Critical Infrastructure Cybersecurity
  • 81
    • 0034814690 scopus 로고    scopus 로고
    • Information security - A multidimensional discipline
    • von Solms, B. (2001). Information security - A multidimensional discipline. Computers and Security, 20 (6), 504-508.
    • (2001) Computers and Security , vol.20 , Issue.6 , pp. 504-508
    • Von Solms, B.1
  • 82
    • 9744248960 scopus 로고    scopus 로고
    • Theoretically speaking
    • Weber, R. (2003). Theoretically speaking. MIS Quarterly, 27 (3), iii-xi.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. iii-xi
    • Weber, R.1
  • 83
    • 84906761342 scopus 로고    scopus 로고
    • Theory building in the information systems discipline: Some critical reflections
    • D. N. Hart & S. D. Gregor (Eds.). Canberra, ACT: Australian National University
    • Weber, R. (2012). Theory building in the information systems discipline: Some critical reflections. In D. N. Hart & S. D. Gregor (Eds.), Information systems foundations: Theory building in information systems (pp. 1-20). Canberra, ACT: Australian National University.
    • (2012) Information Systems Foundations: Theory Building in Information Systems , pp. 1-20
    • Weber, R.1
  • 84
    • 84937202364 scopus 로고    scopus 로고
    • Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors
    • In press
    • Williams, M. & Levi, M. (2013). Perceptions of the eCrime controllers: Modelling the influence of cooperation and data source factors. Security Journal . In press, http://dx.doi.org/10.1057/sj.2012.47.
    • (2013) Security Journal.
    • Williams, M.1    Levi, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.