메뉴 건너뛰기




Volumn , Issue , 2013, Pages 49-63

Cybercrime in Asia: Trends and challenges

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84930815688     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-5218-8_4     Document Type: Chapter
Times cited : (45)

References (60)
  • 1
    • 84937052355 scopus 로고    scopus 로고
    • (March 12). Retrieved August 25
    • AFP. (2010, March 12). Cybercrime surge pushes 2009 losses to 559 million dollars. Retrieved August 25, 2011, from http://www.france24.com/en/20100312-cybercrime-surge-pushes-2009-losses-559-million-dollars.
    • (2010) Cybercrime surge pushes 2009 losses to 559 million dollars
  • 3
    • 84883162381 scopus 로고    scopus 로고
    • Hacking for fun and profit in China's underworld
    • (February 1) Retrieved
    • Barboza, D. (2010, February 1). Hacking for fun and profit in China's underworld. The New York Times. Retrieved 2011, from http://www.nytimes.com/2010/02/02/business/global/02hacker.html?pagewanted=all.
    • (2010) The New York Times
    • Barboza, D.1
  • 5
    • 85028284861 scopus 로고    scopus 로고
    • Content cybercrimes: Criminality and censorship in Asia
    • Broadhurst, R. (2006a). Content cybercrimes: Criminality and censorship in Asia. Indian Journal of Criminology, 34(1&2), 11-30.
    • (2006) Indian Journal of Criminology , vol.34 , Issue.1-2 , pp. 11-30
    • Broadhurst, R.1
  • 7
    • 80955155209 scopus 로고    scopus 로고
    • Cybercrime and on-line safety in cyberspace
    • C. Smith, S. Zhang, & R. Barbaret (Eds.), New York: Routledge
    • Broadhurst, R., & Kim-Kwang Raymond Choo. (2011). Cybercrime and on-line safety in cyberspace. In C. Smith, S. Zhang, & R. Barbaret (Eds.), International handbook of criminology (pp. 153-165). New York: Routledge.
    • (2011) International handbook of criminology , pp. 153-165
    • Broadhurst, R.1    Raymond Choo, K.-K.2
  • 9
    • 84881704058 scopus 로고    scopus 로고
    • Cyber conflict between Taiwan and China
    • Chang, Y. C. (2011). Cyber conflict between Taiwan and China. Strategic Insights, 10(1), 26-35.
    • (2011) Strategic Insights , vol.10 , Issue.1 , pp. 26-35
    • Chang, Y.C.1
  • 12
    • 85028285901 scopus 로고    scopus 로고
    • Retrieved November 17
    • Council of Europe. (2001a). Convention on cybercrime. Retrieved November 17, 2009, from http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
    • (2001) Convention on cybercrime
  • 13
    • 85028287829 scopus 로고    scopus 로고
    • Retrieved November 10
    • Council of Europe. (2001b). Convention on cybercrime: Explanatory report. Retrieved November 10, 2009, from http://conventions.coe.int/Treaty/en/Reports/Html/185.htm.
    • (2001) Convention on cybercrime: Explanatory report
  • 14
    • 79953904666 scopus 로고    scopus 로고
    • Strasbourg: Council of Europe
    • Council of Europe. (2009). Project on cyebercrime-final report. Strasbourg: Council of Europe.
    • (2009) Project on cyebercrime-final report
  • 15
    • 84979834047 scopus 로고    scopus 로고
    • The draft Council of Europe Convention on Cybercrime: A response to the challenge of crime in the age of the Internet
    • Csonka, P. (2000). The draft Council of Europe Convention on Cybercrime: A response to the challenge of crime in the age of the Internet? Computer Law & Security Report, 16, 329-330.
    • (2000) Computer Law & Security Report , vol.16 , pp. 329-330
    • Csonka, P.1
  • 16
    • 84900201379 scopus 로고    scopus 로고
    • Regionalism and Cross-Border Cooperation against crime and terrorism in the Asia- Paci fi c
    • Gordon, S. (2009). Regionalism and Cross-Border Cooperation against crime and terrorism in the Asia- Paci fi c. Security Challenges, 5(4), 75-102.
    • (2009) Security Challenges , vol.5 , Issue.4 , pp. 75-102
    • Gordon, S.1
  • 18
    • 84896199653 scopus 로고    scopus 로고
    • A global convention on cybercrime
    • (March 23) Retrieved July 20, 2010
    • Harley, B. (2010, March 23). A global convention on cybercrime? Columbia Science and Technology Law Review, XI. Retrieved July 20, 2010, from http://www.stlr.org/2010/03/a-global-convention-on-cybercrime/.
    • (2010) Columbia Science and Technology Law Review, XI
    • Harley, B.1
  • 19
    • 84886444854 scopus 로고    scopus 로고
    • Chinese Net-army again stormed the Ministry of National Defence
    • (May 15) Retrieved January 10
    • Huang, J. P. (2006, May 15). Chinese Net-army again stormed the Ministry of National Defence. AppleDaily. Retrieved January 10, 2011, from http://tw.nextmedia.com/applenews/article/art_id/2609544/IssueID/20060515.
    • (2006) AppleDaily
    • Huang, J.P.1
  • 21
    • 85028287742 scopus 로고    scopus 로고
    • Russia opts for university anti- cybercrime convention
    • (July20) Retrieved September 7, 2011
    • Isakova, Y. (2011, July20). Russia opts for university anti- cybercrime convention. Voice of Russia. Retrieved September 7, 2011, from http://english.ruvr.ru/2011/07/20/53481702.html.
    • (2011) Voice of Russia
    • Isakova, Y.1
  • 22
    • 84881745559 scopus 로고    scopus 로고
    • Geneva: International Telecommunication Union
    • ITU. (2009). ITU toolkit for cybercrime legislation. Geneva: International Telecommunication Union.
    • (2009) ITU toolkit for cybercrime legislation
  • 23
    • 0742311431 scopus 로고    scopus 로고
    • Digital architecture as crime control
    • Katyal, N. K. (2003). Digital architecture as crime control. Yale Law Journal, 112(8), 2261-2289.
    • (2003) Yale Law Journal , vol.112 , Issue.8 , pp. 2261-2289
    • Katyal, N.K.1
  • 24
    • 78649551918 scopus 로고    scopus 로고
    • The Council of Europe Convention on Cybercrime
    • Keyser, M. (2003). The Council of Europe Convention on Cybercrime. Journal of Transnational Law and Policy, 12(2), 287-326.
    • (2003) Journal of Transnational Law and Policy , vol.12 , Issue.2 , pp. 287-326
    • Keyser, M.1
  • 26
    • 85028290534 scopus 로고    scopus 로고
    • Domestic cybercrime bill passed
    • (June 17) Retrieved September 6, 2011
    • Kyodo. (2011, June 17). Domestic cybercrime bill passed. Japan Times. Retrieved September 6, 2011, from http://search.japantimes.co.jp/cgi-bin/nn20110617x3.html.
    • (2011) Japan Times
  • 27
    • 84986185135 scopus 로고    scopus 로고
    • Cybercrime Bill passes Senate, set to become law
    • Retrieved September 17, 2012
    • Lee, M. (2012). Cybercrime Bill passes Senate, set to become law. ZDNet. Retrieved September 17, 2012, from http://www.zdnet.com/au/cybercrime-bill-pass-es-senate-set-to-become-law-7000002971/.
    • (2012) ZDNet
    • Lee, M.1
  • 29
    • 84881756528 scopus 로고    scopus 로고
    • Global cybercrime treaty rejected
    • (April 23) Retrieved September 21, 2010
    • Masters, G. (2010, April 23). Global cybercrime treaty rejected. SC Magazine. Retrieved September 21, 2010, from http://www.scmagazineus.com/global-cyber-crime-treaty-rejected-at-un/article/16863/.
    • (2010) SC Magazine
    • Masters, G.1
  • 31
    • 77951148450 scopus 로고    scopus 로고
    • Retrieved August 25, 2011
    • Miniwatts Marketing Group. (2011). Internet World Stats. Retrieved August 25, 2011, from http://www.internet-worldstats.com/stats.htm.
    • (2011) Internet World Stats
  • 33
    • 85028284989 scopus 로고    scopus 로고
    • Paper presented at the Octopus Interface Conference- Cooperation against Cybercrime. Retrieved July 11
    • Noor, M. (2010). Cyber legislation of Indonesia. Paper presented at the Octopus Interface Conference- Cooperation against Cybercrime. Retrieved July 11, 2011, from http://unpan1.un.org/intradoc/groups/pub-lic/documents/UNGC/UNPAN040467.pdf.
    • (2010) Cyber legislation of Indonesia
    • Noor, M.1
  • 34
    • 79961056882 scopus 로고    scopus 로고
    • Retrieved July 25
    • Norton. (2010). Norton cybercrime report: The human impact. Retrieved July 25, 2011, from http://us.norton.com/theme.jsp?themeid=cybercrime_report.
    • (2010) Norton cybercrime report: The human impact
  • 35
    • 52149092178 scopus 로고    scopus 로고
    • The evolution of commercial malware development kits and colour-by-numbers custom malware
    • Ollman, G. (2008). The evolution of commercial malware development kits and colour-by-numbers custom malware. Computer Fraud & Security, 9, 4-7.
    • (2008) Computer Fraud & Security , vol.9 , pp. 4-7
    • Ollman, G.1
  • 36
    • 85028284132 scopus 로고    scopus 로고
    • Accessed July 5, 2010
    • OpenNet. (2010). OpenNet Institute 2009 survey. Accessed July 5, 2010, from http://opennet.net/research/regions/asia.
    • (2010) OpenNet Institute 2009 survey
  • 37
    • 84887236819 scopus 로고    scopus 로고
    • North Korea launches massive cyber attack on Seoul
    • Retrieved July 26
    • Parry, R. L. (2009). North Korea launches massive cyber attack on Seoul. The Times. Retrieved July 26, 2011, from http://www.timesonline.co.uk/tol/news/world/asia/article6667440.ece.
    • (2009) The Times
    • Parry, R.L.1
  • 38
    • 85028288827 scopus 로고    scopus 로고
    • PlayStation network hack: Who did it
    • (April 27) Accessed September 28, 2011
    • Poulsen, K. (2011, April 27). PlayStation network hack: Who did it? Wired New. Accessed September 28, 2011, fromhttp://www. wired.com/threatlevel/2011/04/playstation_hack/.
    • (2011) Wired New
    • Poulsen, K.1
  • 42
    • 85028288427 scopus 로고    scopus 로고
    • (April 2011) Cupertino, CA: Symantec Corporation
    • Symantec. (2011, April 2011). Symantec internet security threat report (Vol. 16). Cupertino, CA: Symantec Corporation.
    • (2011) Symantec internet security threat report , vol.16
  • 48
    • 85028291904 scopus 로고    scopus 로고
    • Sony says 25 m more users hit in second cyber attack
    • Retrieved July 25, 2011
    • Telegraph. (2011). Sony says 25 m more users hit in second cyber attack. The Telegraph. Retrieved July 25, 2011, from http://www.telegraph.co.uk/technology/ sony/8489147/Sony-says-25m-more-users-hit-in- second-cyber-attack.html.
    • (2011) The Telegraph
  • 50
    • 85055398644 scopus 로고    scopus 로고
    • Cyber security in East Asia: Governing anarchy
    • Thomas, N. (2009). Cyber security in East Asia: Governing anarchy. Asian Security, 5, 1-23.
    • (2009) Asian Security , vol.5 , pp. 1-23
    • Thomas, N.1
  • 53
    • 85028287156 scopus 로고    scopus 로고
    • Working paper A/CONF.213/9, UN 12th Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, 12-19 April 2010 22 January 2010. Accessed July 6, 2010
    • United Nations. (2010). Recent developments in the use of science and technology by offenders and by competent authorities in fighting crime, including the case of cybercrime'. Working paper A/CONF.213/9, UN 12th Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, 12-19 April 2010 22 January 2010. Accessed July 6, 2010, from http:// www.unodc.org/documents/crime-congress/12th-Crime-Congress/Documents/A_CONF.213_9/ V1050382e.pdf.
    • (2010) Recent developments in the use of science and technology by offenders and by competent authorities in fighting crime, including the case of cybercrime'
  • 56
    • 84859144706 scopus 로고    scopus 로고
    • Bill on 'right to privacy' in mon- soon session: Moily
    • Retrieved July 11, 2011
    • Venkatesan, J. (2011). Bill on 'right to privacy' in mon- soon session: Moily. The Hindu. Retrieved July 11, 2011, from http://www.thehindu.com/news/national/ article2082643.ece.
    • (2011) The Hindu
    • Venkatesan, J.1
  • 57
    • 77951201601 scopus 로고    scopus 로고
    • Policing cybercrimes: Situating the public police in networks of security within cyberspace'
    • Wall, D. (2007). Policing cybercrimes: Situating the public police in networks of security within cyberspace'. Police Practice and Research: An International Journal, 8(2), 183-205.
    • (2007) Police Practice and Research: An International Journal , vol.8 , Issue.2 , pp. 183-205
    • Wall, D.1
  • 58
    • 77951166479 scopus 로고    scopus 로고
    • The Council of Europe's convention on cybercrime
    • Weber, A. M. (2003). The Council of Europe's convention on cybercrime. Berkeley Technology Law Journal, 18, 425-446.
    • (2003) Berkeley Technology Law Journal , vol.18 , pp. 425-446
    • Weber, A.M.1
  • 59
    • 39049104666 scopus 로고    scopus 로고
    • Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts
    • White, M., & Fisher, C. (2008). Assessing our knowledge of identity theft: The challenges to effective prevention and control efforts. Criminal Justice Policy Review, 19(1), 3-24.
    • (2008) Criminal Justice Policy Review , vol.19 , Issue.1 , pp. 3-24
    • White, M.1    Fisher, C.2
  • 60
    • 84886446431 scopus 로고    scopus 로고
    • Over 3, 100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army
    • Retrieved September 21
    • Xu, S. C. (2009). Over 3, 100 cyber attacks towards Taiwanese Government System were originated by Chinese cyber army. Liberty Times. Retrieved September 21, 2010, from http://www.libertytimes. com.tw/2009/new/mar/24/today-fo2.htm.
    • (2009) Liberty Times
    • Xu, S.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.