-
1
-
-
84937052355
-
-
(March 12). Retrieved August 25
-
AFP. (2010, March 12). Cybercrime surge pushes 2009 losses to 559 million dollars. Retrieved August 25, 2011, from http://www.france24.com/en/20100312-cybercrime-surge-pushes-2009-losses-559-million-dollars.
-
(2010)
Cybercrime surge pushes 2009 losses to 559 million dollars
-
-
-
3
-
-
84883162381
-
Hacking for fun and profit in China's underworld
-
(February 1) Retrieved
-
Barboza, D. (2010, February 1). Hacking for fun and profit in China's underworld. The New York Times. Retrieved 2011, from http://www.nytimes.com/2010/02/02/business/global/02hacker.html?pagewanted=all.
-
(2010)
The New York Times
-
-
Barboza, D.1
-
5
-
-
85028284861
-
Content cybercrimes: Criminality and censorship in Asia
-
Broadhurst, R. (2006a). Content cybercrimes: Criminality and censorship in Asia. Indian Journal of Criminology, 34(1&2), 11-30.
-
(2006)
Indian Journal of Criminology
, vol.34
, Issue.1-2
, pp. 11-30
-
-
Broadhurst, R.1
-
7
-
-
80955155209
-
Cybercrime and on-line safety in cyberspace
-
C. Smith, S. Zhang, & R. Barbaret (Eds.), New York: Routledge
-
Broadhurst, R., & Kim-Kwang Raymond Choo. (2011). Cybercrime and on-line safety in cyberspace. In C. Smith, S. Zhang, & R. Barbaret (Eds.), International handbook of criminology (pp. 153-165). New York: Routledge.
-
(2011)
International handbook of criminology
, pp. 153-165
-
-
Broadhurst, R.1
Raymond Choo, K.-K.2
-
9
-
-
84881704058
-
Cyber conflict between Taiwan and China
-
Chang, Y. C. (2011). Cyber conflict between Taiwan and China. Strategic Insights, 10(1), 26-35.
-
(2011)
Strategic Insights
, vol.10
, Issue.1
, pp. 26-35
-
-
Chang, Y.C.1
-
11
-
-
84859365388
-
-
Washington, DC: National Institute of Justice, US Department of Justice
-
Chu, B., Holt, T. J., & Ahn, G. J. (2010). Examining the creation, distribution, and function of malware online. Washington, DC: National Institute of Justice, US Department of Justice.
-
(2010)
Examining the creation, distribution, and function of malware online
-
-
Chu, B.1
Holt, T.J.2
Ahn, G.J.3
-
12
-
-
85028285901
-
-
Retrieved November 17
-
Council of Europe. (2001a). Convention on cybercrime. Retrieved November 17, 2009, from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
-
(2001)
Convention on cybercrime
-
-
-
13
-
-
85028287829
-
-
Retrieved November 10
-
Council of Europe. (2001b). Convention on cybercrime: Explanatory report. Retrieved November 10, 2009, from http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.
-
(2001)
Convention on cybercrime: Explanatory report
-
-
-
14
-
-
79953904666
-
-
Strasbourg: Council of Europe
-
Council of Europe. (2009). Project on cyebercrime-final report. Strasbourg: Council of Europe.
-
(2009)
Project on cyebercrime-final report
-
-
-
15
-
-
84979834047
-
The draft Council of Europe Convention on Cybercrime: A response to the challenge of crime in the age of the Internet
-
Csonka, P. (2000). The draft Council of Europe Convention on Cybercrime: A response to the challenge of crime in the age of the Internet? Computer Law & Security Report, 16, 329-330.
-
(2000)
Computer Law & Security Report
, vol.16
, pp. 329-330
-
-
Csonka, P.1
-
16
-
-
84900201379
-
Regionalism and Cross-Border Cooperation against crime and terrorism in the Asia- Paci fi c
-
Gordon, S. (2009). Regionalism and Cross-Border Cooperation against crime and terrorism in the Asia- Paci fi c. Security Challenges, 5(4), 75-102.
-
(2009)
Security Challenges
, vol.5
, Issue.4
, pp. 75-102
-
-
Gordon, S.1
-
18
-
-
84896199653
-
A global convention on cybercrime
-
(March 23) Retrieved July 20, 2010
-
Harley, B. (2010, March 23). A global convention on cybercrime? Columbia Science and Technology Law Review, XI. Retrieved July 20, 2010, from http://www.stlr.org/2010/03/a-global-convention-on-cybercrime/.
-
(2010)
Columbia Science and Technology Law Review, XI
-
-
Harley, B.1
-
19
-
-
84886444854
-
Chinese Net-army again stormed the Ministry of National Defence
-
(May 15) Retrieved January 10
-
Huang, J. P. (2006, May 15). Chinese Net-army again stormed the Ministry of National Defence. AppleDaily. Retrieved January 10, 2011, from http://tw.nextmedia.com/applenews/article/art_id/2609544/IssueID/20060515.
-
(2006)
AppleDaily
-
-
Huang, J.P.1
-
21
-
-
85028287742
-
Russia opts for university anti- cybercrime convention
-
(July20) Retrieved September 7, 2011
-
Isakova, Y. (2011, July20). Russia opts for university anti- cybercrime convention. Voice of Russia. Retrieved September 7, 2011, from http://english.ruvr.ru/2011/07/20/53481702.html.
-
(2011)
Voice of Russia
-
-
Isakova, Y.1
-
22
-
-
84881745559
-
-
Geneva: International Telecommunication Union
-
ITU. (2009). ITU toolkit for cybercrime legislation. Geneva: International Telecommunication Union.
-
(2009)
ITU toolkit for cybercrime legislation
-
-
-
23
-
-
0742311431
-
Digital architecture as crime control
-
Katyal, N. K. (2003). Digital architecture as crime control. Yale Law Journal, 112(8), 2261-2289.
-
(2003)
Yale Law Journal
, vol.112
, Issue.8
, pp. 2261-2289
-
-
Katyal, N.K.1
-
24
-
-
78649551918
-
The Council of Europe Convention on Cybercrime
-
Keyser, M. (2003). The Council of Europe Convention on Cybercrime. Journal of Transnational Law and Policy, 12(2), 287-326.
-
(2003)
Journal of Transnational Law and Policy
, vol.12
, Issue.2
, pp. 287-326
-
-
Keyser, M.1
-
26
-
-
85028290534
-
Domestic cybercrime bill passed
-
(June 17) Retrieved September 6, 2011
-
Kyodo. (2011, June 17). Domestic cybercrime bill passed. Japan Times. Retrieved September 6, 2011, from http://search.japantimes.co.jp/cgi-bin/nn20110617x3.html.
-
(2011)
Japan Times
-
-
-
27
-
-
84986185135
-
Cybercrime Bill passes Senate, set to become law
-
Retrieved September 17, 2012
-
Lee, M. (2012). Cybercrime Bill passes Senate, set to become law. ZDNet. Retrieved September 17, 2012, from http://www.zdnet.com/au/cybercrime-bill-pass-es-senate-set-to-become-law-7000002971/.
-
(2012)
ZDNet
-
-
Lee, M.1
-
29
-
-
84881756528
-
Global cybercrime treaty rejected
-
(April 23) Retrieved September 21, 2010
-
Masters, G. (2010, April 23). Global cybercrime treaty rejected. SC Magazine. Retrieved September 21, 2010, from http://www.scmagazineus.com/global-cyber-crime-treaty-rejected-at-un/article/16863/.
-
(2010)
SC Magazine
-
-
Masters, G.1
-
31
-
-
77951148450
-
-
Retrieved August 25, 2011
-
Miniwatts Marketing Group. (2011). Internet World Stats. Retrieved August 25, 2011, from http://www.internet-worldstats.com/stats.htm.
-
(2011)
Internet World Stats
-
-
-
33
-
-
85028284989
-
-
Paper presented at the Octopus Interface Conference- Cooperation against Cybercrime. Retrieved July 11
-
Noor, M. (2010). Cyber legislation of Indonesia. Paper presented at the Octopus Interface Conference- Cooperation against Cybercrime. Retrieved July 11, 2011, from http://unpan1.un.org/intradoc/groups/pub-lic/documents/UNGC/UNPAN040467.pdf.
-
(2010)
Cyber legislation of Indonesia
-
-
Noor, M.1
-
34
-
-
79961056882
-
-
Retrieved July 25
-
Norton. (2010). Norton cybercrime report: The human impact. Retrieved July 25, 2011, from http://us.norton.com/theme.jsp?themeid=cybercrime_report.
-
(2010)
Norton cybercrime report: The human impact
-
-
-
35
-
-
52149092178
-
The evolution of commercial malware development kits and colour-by-numbers custom malware
-
Ollman, G. (2008). The evolution of commercial malware development kits and colour-by-numbers custom malware. Computer Fraud & Security, 9, 4-7.
-
(2008)
Computer Fraud & Security
, vol.9
, pp. 4-7
-
-
Ollman, G.1
-
36
-
-
85028284132
-
-
Accessed July 5, 2010
-
OpenNet. (2010). OpenNet Institute 2009 survey. Accessed July 5, 2010, from http://opennet.net/research/regions/asia.
-
(2010)
OpenNet Institute 2009 survey
-
-
-
37
-
-
84887236819
-
North Korea launches massive cyber attack on Seoul
-
Retrieved July 26
-
Parry, R. L. (2009). North Korea launches massive cyber attack on Seoul. The Times. Retrieved July 26, 2011, from http://www.timesonline.co.uk/tol/news/world/asia/article6667440.ece.
-
(2009)
The Times
-
-
Parry, R.L.1
-
38
-
-
85028288827
-
PlayStation network hack: Who did it
-
(April 27) Accessed September 28, 2011
-
Poulsen, K. (2011, April 27). PlayStation network hack: Who did it? Wired New. Accessed September 28, 2011, fromhttp://www. wired.com/threatlevel/2011/04/playstation_hack/.
-
(2011)
Wired New
-
-
Poulsen, K.1
-
42
-
-
85028288427
-
-
(April 2011) Cupertino, CA: Symantec Corporation
-
Symantec. (2011, April 2011). Symantec internet security threat report (Vol. 16). Cupertino, CA: Symantec Corporation.
-
(2011)
Symantec internet security threat report
, vol.16
-
-
-
48
-
-
85028291904
-
Sony says 25 m more users hit in second cyber attack
-
Retrieved July 25, 2011
-
Telegraph. (2011). Sony says 25 m more users hit in second cyber attack. The Telegraph. Retrieved July 25, 2011, from http://www.telegraph.co.uk/technology/ sony/8489147/Sony-says-25m-more-users-hit-in- second-cyber-attack.html.
-
(2011)
The Telegraph
-
-
-
50
-
-
85055398644
-
Cyber security in East Asia: Governing anarchy
-
Thomas, N. (2009). Cyber security in East Asia: Governing anarchy. Asian Security, 5, 1-23.
-
(2009)
Asian Security
, vol.5
, pp. 1-23
-
-
Thomas, N.1
-
53
-
-
85028287156
-
-
Working paper A/CONF.213/9, UN 12th Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, 12-19 April 2010 22 January 2010. Accessed July 6, 2010
-
United Nations. (2010). Recent developments in the use of science and technology by offenders and by competent authorities in fighting crime, including the case of cybercrime'. Working paper A/CONF.213/9, UN 12th Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, 12-19 April 2010 22 January 2010. Accessed July 6, 2010, from http:// www.unodc.org/documents/crime-congress/12th-Crime-Congress/Documents/A_CONF.213_9/ V1050382e.pdf.
-
(2010)
Recent developments in the use of science and technology by offenders and by competent authorities in fighting crime, including the case of cybercrime'
-
-
-
56
-
-
84859144706
-
Bill on 'right to privacy' in mon- soon session: Moily
-
Retrieved July 11, 2011
-
Venkatesan, J. (2011). Bill on 'right to privacy' in mon- soon session: Moily. The Hindu. Retrieved July 11, 2011, from http://www.thehindu.com/news/national/ article2082643.ece.
-
(2011)
The Hindu
-
-
Venkatesan, J.1
-
57
-
-
77951201601
-
Policing cybercrimes: Situating the public police in networks of security within cyberspace'
-
Wall, D. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace'. Police Practice and Research: An International Journal, 8(2), 183-205.
-
(2007)
Police Practice and Research: An International Journal
, vol.8
, Issue.2
, pp. 183-205
-
-
Wall, D.1
-
58
-
-
77951166479
-
The Council of Europe's convention on cybercrime
-
Weber, A. M. (2003). The Council of Europe's convention on cybercrime. Berkeley Technology Law Journal, 18, 425-446.
-
(2003)
Berkeley Technology Law Journal
, vol.18
, pp. 425-446
-
-
Weber, A.M.1
-
59
-
-
39049104666
-
Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts
-
White, M., & Fisher, C. (2008). Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts. Criminal Justice Policy Review, 19(1), 3-24.
-
(2008)
Criminal Justice Policy Review
, vol.19
, Issue.1
, pp. 3-24
-
-
White, M.1
Fisher, C.2
-
60
-
-
84886446431
-
Over 3, 100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army
-
Retrieved September 21
-
Xu, S. C. (2009). Over 3, 100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army. Liberty Times. Retrieved September 21, 2010, from http://www.libertytimes. com.tw/2009/new/mar/24/today-fo2.htm.
-
(2009)
Liberty Times
-
-
Xu, S.C.1
|