메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-263

Profiling hackers: The science of criminal profiling as applied to the world of hacking

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85055781849     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420086942     Document Type: Book
Times cited : (23)

References (113)
  • 1
    • 21344433201 scopus 로고    scopus 로고
    • The Changing Defi nition and Image of Hackers in PopularDiscourse
    • Academic, Press
    • Amanda Chandler, The Changing Defi nition and Image of Hackers in Popular Discourse, in International Journal of the Sociology of Law, Academic Press, 1996.
    • (1996) International Journal of the Sociology of Law
    • Chandler, A.1
  • 4
    • 85055778361 scopus 로고    scopus 로고
    • Apogeo, Milano
    • Raoul Chiesa, Vola Condor, Vola, Apogeo, Milano, 1999, http://www.apogeonline.com/libri/88-503-1056-0/ebook/libro.
    • (1999) Vola Condor, Vola
    • Chiesa, R.1
  • 7
    • 85055811041 scopus 로고    scopus 로고
    • Individual Characteristics for the Success in Computer Programming
    • Roy D. Dutta, Individual Characteristics for the Success in Computer Programming, in Journal of Personality and Clinical Studies, 19, 1, 2003.
    • (2003) Journal of Personality and Clinical Studies , vol.19 , Issue.1
    • Dutta, R.D.1
  • 10
    • 0042855099 scopus 로고    scopus 로고
    • The Editorial Board of The Sociological Review
    • Tim Jordan and Paul Taylor, A Sociology of Hackers, The Editorial Board of The Sociological Review, 1998, http://www.dvara.net/HK/1244356.pdf.
    • (1998) A Sociology of Hackers
    • Jordan, T.1    Taylor, P.2
  • 22
    • 35148880929 scopus 로고    scopus 로고
    • Understanding theJustification for Criminal Computer Activity
    • Marc Rogers, Modern-Day Robin Hood or Moral Disengagement. Understanding the Justification for Criminal Computer Activity, 1999, http://www.infowar.com.
    • (1999) Modern-Day Robin Hood Or Moral Disengagement
    • Rogers, M.1
  • 23
    • 85055793680 scopus 로고    scopus 로고
    • Marc Rogers, The Psychology of Hackers: The Need for a New Taxonomy, 1999, http://www.infowar.com.
    • (1999)
    • Rogers, M.1
  • 30
    • 0037967312 scopus 로고    scopus 로고
    • Smyslova, Flow-Based Model of ComputerHackers’ Motivation
    • Alexander E. Voiskounsky, Olga V. Smyslova, Flow-Based Model of Computer Hackers’ Motivation, in Cyber-Psychology & Behavior, 6, 2003.
    • (2003) Cyber-Psychology & Behavior , pp. 6
    • Voiskounsky, A.E.1    Olga, V.2
  • 31
    • 0011893752 scopus 로고    scopus 로고
    • O’Reilly Media, Inc., California, March 1
    • Sam Williams, Free as in Freedom, O’Reilly Media, Inc., California, March 1, 2002.
    • (2002) Free as in Freedom
    • Williams, S.1
  • 33
    • 33847638755 scopus 로고    scopus 로고
    • No Starch Press, California, April
    • Michal Zalewski, Silence on the Wire, No Starch Press, California, April 15, 2005.
    • (2005) Silence on the Wire
    • Zalewski, M.1
  • 35
    • 85055829529 scopus 로고    scopus 로고
    • Così Attaccano gli Ingegneri Sociali
    • Edizioni Tecniche, Nuove, April
    • Raoul Chiesa, “Così Attaccano gli Ingegneri Sociali” in Internet News, Edizioni Tecniche, Nuove, April 2003.
    • Internet News , pp. 2003
    • Chiesa, R.1
  • 37
    • 85055776065 scopus 로고    scopus 로고
    • Le 10 Regole dellHacking”
    • Raoul Chiesa, “Le 10 Regole dell’Hacking” in Internos, 1999.
    • (1999) Internos
    • Chiesa, R.1
  • 38
    • 85055789053 scopus 로고    scopus 로고
    • Who is Who: Hackers, chi sono
    • Raoul Chiesa, “Who is Who: Hackers, chi sono” in Internos, 1999.
    • (1999) Internos
    • Chiesa, R.1
  • 39
    • 85055827688 scopus 로고    scopus 로고
    • “Io ero Nobody e Tutte le Notti me ne Volavo in Francia
    • Raoul Chiesa, “Io ero Nobody e Tutte le Notti me ne Volavo in Francia, via Qatar” in Hacker Culture, 2001, http://www.dvara.net/HK/nobo-dy.asp.
    • (2001) Hacker Culture
    • Chiesa, R.1
  • 40
    • 85055832881 scopus 로고    scopus 로고
    • “Un Esercito di Cyber-Pirati che Infestano la Rete in Cerca di Segreti Industriali
    • Carlotta Managnini, Grande Muraglia Hacker. “Un Esercito di Cyber-Pirati che Infestano la Rete in Cerca di Segreti Industriali. È il Volto Nascosto del Boom Cinese” in L’Espresso, 10 2005.
    • (2005) L’Espresso , vol.10
    • Managnini, C.1    Hacker, G.M.2
  • 44
    • 85055842893 scopus 로고    scopus 로고
    • 2nd Ethical Hackers’ Speech @ SMAU2002, Milano, Blackhats Italia
    • Yvette Agostini, Raoul Chiesa, Storia ed Etica Hacker, 2nd Ethical Hackers’ Speech @ SMAU2002, Milano, 26 ottobre 2002, Blackhats Italia, http://www.clusit.it/smau_milano_2002/itbh_storia_ed_etica_hacker.pdf.
    • (2002) , vol.26
    • Agostini, Y.1    Chiesa, R.2
  • 46
    • 85055773062 scopus 로고    scopus 로고
    • CORECOM (Comitato Regionale per le Comunicazioni), Pirata Sarai Tu! Atti del Convegno. Primo Convegno Nazionale sulla Pirateria, Torino, 31 marzo 2004, http://www.obiettivominori.it/be/public/view/Pirata%20 sari%20tu.pdf.
    • (2004) Pirata Sarai Tu!
  • 47
    • 85055770488 scopus 로고    scopus 로고
    • Gadi Evron, Case-study: A Cyber-terrorism Attack. Analysis and Response
    • Kfir Damari, Ami Chayun, Gadi Evron, Case-study: a Cyber-terrorism Attack. Analysis and Response, beSIRT, 12 2006, http://www.beyondsecurity.com/.
    • (2006) Besirt , pp. 12
    • Damari, K.1    Chayun, A.2
  • 52
    • 85055788435 scopus 로고    scopus 로고
    • Client-Side Exploits: Forensic Analysis of a Compromised Laptop
    • Symantec Client-Side Exploits: Forensic Analysis of a Compromised Laptop, Incident Analysis, 17 2004, http://www.batori.com.br/downloads/040617-Analysis-FinancialInstitutionCompromise.pdf.
    • (2004) Incident Analysis , pp. 17
    • Symantec1
  • 53
    • 85055840985 scopus 로고    scopus 로고
    • Version: 1.00, Web Application Security Consortium
    • Web Application Security Consortium, Threat Classification, Version: 1.00, Web Application Security Consortium, 2004, http://www.we-bappsec.org.
    • (2004)
  • 54
    • 85055838870 scopus 로고    scopus 로고
    • SMAU, Milan, 28 October
    • Stefano Zanero for the Italian Blackhats Association, Ethical Hacking, Unethical Laws, SMAU, Milan, 28 October 2002, http://www.clusit.it/smau_milano_2002/itbh_ethica_hacking_unethical_laws.pdf.
    • (2002)
  • 56
    • 85055780389 scopus 로고    scopus 로고
    • Zone-H
    • Zone-H, 2004 Web Server Intrusion Statistics, Zone-H, 2005, http://www.securitymanagement.com/library/ZoneHorg0705.pdf.
    • (2005) 2004 Web Server Intrusion Statistics
  • 57
    • 85055783447 scopus 로고    scopus 로고
    • Associazione Italiana Blackhats, http://www.blackhats.it.
  • 58
    • 85055771382 scopus 로고    scopus 로고
    • CLUSIB (Club de la Sécurité Informatique Belge—Belgium), https://www.belcliv.be/clusib/.
  • 59
    • 85055859547 scopus 로고    scopus 로고
    • CLUSIF (Club de la Sécurité de l’Information Français—France), https://www.clusif.asso.fr/index.asp.
  • 60
    • 85055798409 scopus 로고    scopus 로고
    • CLUSIS (Association Suisse de la Sécurité des Systèmes d’Information— Switzerland), http://www.clusis.ch.
  • 61
    • 85055789479 scopus 로고    scopus 로고
    • CLUSIT (Associazione Italiana per la Sicurezza Informatica—Italy), http://www.clusit.it./.
  • 62
    • 85055803075 scopus 로고    scopus 로고
    • CLUSSIL (Club de la Sécurité des Systèmes d’Information—Luxemburg), http://www.clussil.lu/tiki-view_articles.php.
  • 63
    • 85055850579 scopus 로고    scopus 로고
    • ISECOM (Institute for Security and Open Methodologies), http://www.isecom.org./.
  • 64
    • 85055828961 scopus 로고    scopus 로고
    • Jargon File, http://www.catb.org/jargon/.
  • 65
    • 85055777561 scopus 로고    scopus 로고
    • Mitre, http://www.mitre.org/.
  • 66
    • 85055786699 scopus 로고    scopus 로고
    • Security Focus, http://www.securityfocus.com/
  • 88
    • 33646362785 scopus 로고    scopus 로고
    • Validities and Abilities in Criminal Profiling: A Critique of the Studies Conducted by Richard Kocsis and His Colleagues
    • Sage Publications, June
    • Craig Bennell, Natalie J. Jones, Paul J. Taylor, Brent Snook, “Validities and Abilities in Criminal Profiling: A Critique of the Studies Conducted by Richard Kocsis and His Colleagues” in International Journal of Offender Therapy and Comparative Criminology, vol. 50, no. 3, Sage Publications, June 2006.
    • (2006) International Journal of Offendertherapy and Comparative Criminology , vol.50 , pp. 3
    • Bennell, C.1    Jones, N.J.2    Taylor, P.J.3    Snook, B.4
  • 89
    • 33745552591 scopus 로고    scopus 로고
    • Validities and Abilities in Criminal Profiling. The Dilemma for David Canters Investigative Psychology”
    • Sage Publications, August
    • Richard N. Kocsis, “Validities and Abilities in Criminal Profiling. The Dilemma for David Canter’s Investigative Psychology” in International Journal of Offender Therapy and Comparative Criminology, vol. 50, no. 4, Sage Publications, August 2006.
    • (2006) Internationaljournal of Offender Therapy and Comparative Criminology , vol.50 , pp. 4
    • Kocsis, R.N.1
  • 92
    • 85055841502 scopus 로고    scopus 로고
    • I “Cybercriminali: Rischi e Limiti dei Profili Criminologici”
    • Mucchi editore, Modena
    • Mara Mignone, “I “Cybercriminali”: Rischi e Limiti dei Profili Criminologici” in Ciberspazio e Diritto, vol. 1, no. 2, Mucchi editore, Modena, 2000, http://www.ciberspazioediritto.org/articoli/mignone.pdf.
    • (2000) Ciberspazio E Diritto , vol.1 , pp. 2
    • Mignone, M.1
  • 93
    • 85055779623 scopus 로고    scopus 로고
    • Banca Osama
    • 2/2006, CESINT
    • Enzo Scannella, “Banca Osama. Le Finanze del Terrore” in Rivista di Intelligence, 2/2006, CESINT, 2006, pp. 62–71.
    • (2006) Le Finanze del Terrore , pp. 62-71
    • Scannella, E.1
  • 94
    • 43049098630 scopus 로고    scopus 로고
    • Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques
    • Brent E. Turvey, “Deductive Criminal Profiling: Comparing Applied Methodologies Between Inductive and Deductive Criminal Profiling Techniques” Knowledge Solutions Library, January 1998.
    • (1998) Knowledge Solutions Library
    • Turvey, B.E.1
  • 95
    • 84898837436 scopus 로고
    • United Nations Manual on the Prevention and Control of Computer-Related Crime
    • United Nations, “United Nations Manual on the Prevention and Control of Computer-Related Crime,” in International Review of Criminal Policy, no. 43–44, 1990, http://www.uncjin.org/Documents/EighthCongress. html.
    • (1990) International Review of Criminal Policy , pp. 43-44
  • 97
    • 85055793189 scopus 로고    scopus 로고
    • 31 March
    • Scott Charney, Combating Cybercrime: A Public-Private Strategy in the Digital Environment, 31 March 2005, http://www.nwacc.org/programs/conf05/UNCrimeCongressPaper.doc.
    • (2005)
    • Charney, S.1
  • 98
    • 85055819259 scopus 로고    scopus 로고
    • CLUSIF, An Overview of Cybercrime, 2004, 2005, http://www.clusif.asso.fr/.
    • (2004)
  • 100
    • 85055812513 scopus 로고    scopus 로고
    • GuyDe Vel, International cooperation to Prevent and Combat Cybercrime, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,” Bangkok, 18–25 April 2005, http://www.kicjp.re.kr/.
    • (2005)
    • Vel, G.1
  • 102
    • 85055815527 scopus 로고    scopus 로고
    • EURIM-IPPR, Partnership Policing for the Information Society—Fifth Discussion Paper: The Reporting of Cybercrime, 2004, http://www.eurim.org.uk/activities/ecrime/reporting.doc.
    • (2004)
  • 103
    • 85055808693 scopus 로고    scopus 로고
    • EURIM-IPPR, Partnership Policing for the Information Society—Fourth discus-sion paper: Reducing Opportunities for E-crime, 2004, http://www.eurim.org.uk/activities/ecrime/reducingops.doc.
    • (2004)
  • 104
    • 85055815024 scopus 로고    scopus 로고
    • Peter Grabosky, Recent Trends in Cybercrime, in Proceedings 11th UN Congress on Crime Prevention and Criminal Justice, Workshop 6: “Measures to Combat Computer Related Crime,” Bangkok, 18–25 April, 2005, http://www.kicjp.re.kr/.
    • (2005) , pp. 18-25
    • Grabosky, P.1
  • 106
    • 85055844083 scopus 로고    scopus 로고
    • International Conference on Crime and Technology: New Frontiers for Legislation, Law Enforcement and Research, Courmayeur Monte Bianco, Italy, November
    • Ernesto U. Savona, Mara Mignone, The Impact of Technology on Crime, International Conference on Crime and Technology: New Frontiers for Legislation, Law Enforcement and Research, Courmayeur Monte Bianco, Italy, 28–30 November 2003.
    • (2003) The Impact of Technology on Crime , pp. 28-30
    • Savona, E.U.1    Mignone, M.2
  • 107
    • 85055821874 scopus 로고    scopus 로고
    • A/CONF.203/14, United
    • United Nations, Workshop 6: Measures to Combat Computer Related Crime. Background Paper, in 11th United Nations Congress on Crime Prevention and Criminal Justice, Bangkok, 18–25 April 2005, A/CONF.203/14, United Nations, New York, 14 March 2005, http://www.unodc.org/unodc/en/commissions/crime-congresses-11-documents.html.
    • (2005) 11Th United Nations Congress on Crime Prevention and Criminal Justice , pp. 18-25
  • 108
    • 85055816264 scopus 로고    scopus 로고
    • February
    • United States—White House, The National Strategy to Secure Cyberspace, February 2003, http://www.whitehouse.gov/pcipb/.
    • (2003)
  • 109
    • 85055774336 scopus 로고    scopus 로고
    • Academy of Behavioral Profiling, http://www.profiling.org/.
  • 110
    • 85055818222 scopus 로고    scopus 로고
    • Centre for Investigative Psychology, http://www.i-psy.com/.
  • 111
    • 85055787092 scopus 로고    scopus 로고
    • Criminal Profiling, http://www.criminalprofiling.com/.
  • 112
    • 85055784630 scopus 로고    scopus 로고
    • Criminal Profiling Research Site (CH), http://www.criminalprofiling.ch./.
  • 113


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.