메뉴 건너뛰기




Volumn 6, Issue 2, 1998, Pages 157-162

Trends in Computer Crime

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84992992155     PISSN: 13590790     EISSN: 17587239     Source Type: Journal    
DOI: 10.1108/eb025876     Document Type: Review
Times cited : (4)

References (42)
  • 1
    • 33748330773 scopus 로고    scopus 로고
    • The Aeneid
    • Book II, Jackson Knight, W. F. (trans Penguin Books
    • Virgil, ‘The Aeneid’, Book II, Jackson Knight, W. F. (trans. 1996), Penguin Books, pp. 51–56.
    • (1996) , pp. 51-56
    • Virgil1
  • 2
    • 84992978071 scopus 로고
    • Subversion of a “Secure” Operating System
    • Mem. Rpt. 2821, June
    • Stryker, D.J. (1974) ‘Subversion of a “Secure” Operating System’, NRL Mem. Rpt. 2821, June.
    • (1974) NRL
    • Stryker, D.J.1
  • 3
    • 84992984965 scopus 로고
    • Computer Capers
    • Sidgwick & Jackson
    • Whiteside, T. (1979) ‘Computer Capers’, Sidgwick & Jackson, pp. 116–121.
    • (1979) , pp. 116-121
    • Whiteside, T.1
  • 4
    • 84976720856 scopus 로고
    • The “Worm” Programs — Early Experience with a Distributed Computation
    • Shoch, J. F. and Hupp, J. A. (1982) ‘The “Worm” Programs — Early Experience with a Distributed Computation’, Commun. ACM, Vol. 25, No. 3, pp. 172–180.
    • (1982) Commun. ACM , vol.25 , Issue.3 , pp. 172-180
    • Shoch, J.F.1    Hupp, J.A.2
  • 5
    • 0023294949 scopus 로고
    • Computer Viruses: Theory and Experiments
    • Cohen, F. (1987) ‘Computer Viruses: Theory and Experiments’, Computers & Security, Vol. 6, No. 1, pp. 22—35.
    • (1987) Computers & Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 6
    • 84909368303 scopus 로고
    • Beating the System: Hackers, Phreakers and Electronic Spies
    • Bloomsbury, Ch. IV
    • Bowcott, O. and Hamilton, S. (1992) ‘Beating the System: Hackers, Phreakers and Electronic Spies’, Bloomsbury, Ch. IV.
    • (1992)
    • Bowcott, O.1    Hamilton, S.2
  • 7
    • 84886355703 scopus 로고
    • Scotland Yard
    • Michael Joseph
    • Fleming, R. (1994) ‘Scotland Yard’, Michael Joseph, pp. 78–83.
    • (1994) , pp. 78-83
    • Fleming, R.1
  • 8
    • 84993087916 scopus 로고
    • Texas, CILR 8262
    • State v Burleson, Texas, CILR 8262, 1988.
    • (1988) State v Burleson
  • 9
    • 0003995482 scopus 로고
    • Spectacular Computer Crimes
    • Dow Jones-Irwin, Ch. 7
    • BloomBecker, B. (1990) ‘Spectacular Computer Crimes’, Dow Jones-Irwin, Ch. 7.
    • (1990)
    • BloomBecker, B.1
  • 10
    • 84993098507 scopus 로고
    • 27th November
    • Computing, 27th November, 1992.
    • (1992) Computing
  • 11
    • 84993098507 scopus 로고
    • 11th December
    • Computing, 11th December, 1992.
    • (1992) Computing
  • 12
    • 84921176017 scopus 로고
    • Data Theft
    • Mandarin
    • Cornwall, H. (1990) ‘Data Theft’, Mandarin, pp. 218–220.
    • (1990) , pp. 218-220
    • Cornwall, H.1
  • 13
    • 50749133764 scopus 로고
    • Investigating Computer Crime in the UK
    • Fisch Nigri, D. (1992) ‘Investigating Computer Crime in the UK’, Computer Law & Security Report, Vol. 8, No. 3, pp. 132–135.
    • (1992) Computer Law & Security Report , vol.8 , Issue.3 , pp. 132-135
    • Fisch, N.D.1
  • 15
    • 0041065277 scopus 로고
    • The Internet Worm: An Analysis
    • Spafford, E. H. (1989) ‘The Internet Worm: An Analysis’, Computer Commun. Review, Vol. 19, No. 1, pp. 17–57.
    • (1989) Computer Commun. Review , vol.19 , Issue.1 , pp. 17-57
    • Spafford, E.H.1
  • 16
    • 0242444735 scopus 로고
    • The Worm Story
    • Spafford, E. H. et al. (1989) ‘The Worm Story’, Commun. ACM, Vol. 32, No. 6, pp. 677–710.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 677-710
    • Spafford, E.H.1
  • 17
    • 84992947539 scopus 로고    scopus 로고
    • The Secret War
    • 20th June
    • Warren, P. (1996) ‘The Secret War’, Computing, 20th June.
    • (1996) Computing
    • Warren, P.1
  • 18
    • 0542386000 scopus 로고
    • A Pathology of Computer Viruses
    • Springer-Verlag
    • Ferbrache, D. (1991) ‘A Pathology of Computer Viruses’, Springer-Verlag.
    • (1991)
    • Ferbrache, D.1
  • 19
    • 84992947524 scopus 로고    scopus 로고
    • computer virus prevalence survey
    • NCSA 1997 computer virus prevalence survey.
    • (1997)
  • 20
    • 84992990445 scopus 로고
    • CVW — Computer Virus as a Weapon
    • Evancoe, P. and Bentley, M. (1994) ‘CVW — Computer Virus as a Weapon’, Military Technology, Vol. 5, No. 9, pp. 38–40.
    • (1994) Military Technology , vol.5 , Issue.9 , pp. 38-40
    • Evancoe, P.1    Bentley, M.2
  • 22
    • 84992979291 scopus 로고    scopus 로고
    • Superhighway Robbery
    • rev. edn Channel 4 TV, 20th October
    • ‘Superhighway Robbery’ (rev. edn), Equinox, Channel 4 TV, 20th October, 1997.
    • (1997) Equinox
  • 23
    • 84992979296 scopus 로고    scopus 로고
    • Issues and Trends
    • Computer Security Institute, March
    • ‘Issues and Trends’, 1998 CSI/FBI computer crime and security survey, Computer Security Institute, March.
    • (1998) CSI/FBI computer crime and security survey
  • 24
    • 84992977952 scopus 로고
    • NCC survey of IT security failures or breaches 1991, National Computing Centre, 1992.
    • (1992) National Computing Centre
  • 25
    • 84992979269 scopus 로고
    • November
    • IT security breaches survey 1994, NCC/DTI/ICL, November 1994.
    • (1994) NCC/DTI/ICL
  • 26
    • 84992947517 scopus 로고    scopus 로고
    • November
    • The information security breaches survey 1996, NCC/DTI/ICL/ITSEC, November 1996.
    • (1996) NCC/DTI/ICL/ITSEC
  • 27
    • 84993033282 scopus 로고    scopus 로고
    • March
    • The business information security survey 1998, NCC/DTI/AT&T/SSL/ITSEC, March 1998.
    • (1998) NCC/DTI/AT&T/SSL/ITSEC
  • 28
    • 84993033283 scopus 로고    scopus 로고
    • Ghost in the Machine: An Analysis of IT Fraud and Abuse
    • February
    • ‘Ghost in the Machine: An Analysis of IT Fraud and Abuse’, Audit Commission Update Report (February 1998).
    • (1998) Audit Commission Update Report
  • 29
    • 84992977916 scopus 로고    scopus 로고
    • The Role of Information Technology in Combating Fraud
    • PA Consulting Group, February
    • Jenner, P. (1996) ‘The Role of Information Technology in Combating Fraud’, PA Consulting Group, February.
    • (1996)
    • Jenner, P.1
  • 30
    • 0004745221 scopus 로고    scopus 로고
    • Computer Crime: An Emerging Challenge for Law Enforcement
    • February
    • Carter, D. L. and Katz, A.J. (1997) ‘Computer Crime: An Emerging Challenge for Law Enforcement’, February.
    • (1997)
    • Carter, D.L.1    Katz, A.J.2
  • 31
    • 0003615456 scopus 로고    scopus 로고
    • Ghost in the Machine
    • ref. 21
    • ‘Ghost in the Machine’, ref. 21.
  • 32
    • 84992934425 scopus 로고
    • Opportunity Makes a Thief: An Analysis of Computer Abuse
    • ‘Opportunity Makes a Thief: An Analysis of Computer Abuse’ (1994) Audit Commission National Report.
    • (1994) Audit Commission National Report
  • 33
    • 84993033277 scopus 로고    scopus 로고
    • Practical Intrusion Detection Introduction
    • April
    • Sparks, S. and Pethia, R. (1997) ‘Practical Intrusion Detection Introduction’, FedCIRC, CSTC 97-063, April, p. 32.
    • (1997) FedCIRC, CSTC 97-063 , pp. 32
    • Sparks, S.1    Pethia, R.2
  • 34
    • 84993103125 scopus 로고    scopus 로고
    • Criminal Intelligence
    • 14th March
    • Warren, P. (1996) ‘Criminal Intelligence’, Computing, 14th March.
    • (1996) Computing
    • Warren, P.1
  • 36
    • 0009998852 scopus 로고    scopus 로고
    • Digital Crime: Policing the Cybernation
    • Kogan Page
    • Barrett, N. (1997) ‘Digital Crime: Policing the Cybernation’, Kogan Page, p. 40.
    • (1997) , pp. 40
    • Barrett, N.1
  • 40
    • 84992990438 scopus 로고    scopus 로고
    • Superhighway Robbery
    • ref. 18
    • ‘Superhighway Robbery’, ref. 18.
  • 41
    • 84992990431 scopus 로고    scopus 로고
    • ref. 14
    • Warren, ref. 14.
    • Warren1
  • 42
    • 84993032975 scopus 로고    scopus 로고
    • 7th May
    • Computing, 7th May, 1998.
    • (1998) Computing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.