Academia.eduAcademia.edu

Outline

Insight to Cybercrime

2012, 법학논총

Abstract
sparkles

AI

This paper explores the evolution, impact, and characteristics of cybercrime, highlighting its definition and categorization, as well as its implications for society. It discusses the vulnerabilities of the Internet that have contributed to the rise of cybercriminal activities, backed by statistics and examples of various types of cybercrime, such as hacking, malware, and phishing. The findings emphasize the need for enhanced understanding and legislation to address the challenges posed by cybercrime.

References (20)

  1. KR Choo, Trends and issues in crime and criminal justice: Zombies and Botnets, AIC, Canberra, 2007, p.4.
  2. OECD, Malicious Software (Malware): A Security Threat to the Internet Economy, OECD, June 2008, p.16.
  3. spoofing, http://www.techterms.com/definition/spoofing accessed on 20 January, 2012
  4. John Baiden, Cybercrimes, Electronic copy available at: http://ssrn.com/abstract=1873271
  5. Dorothy Denning, "Activism, Hactivism, and Cyberterrorism: The Internet as a tool for Influencing Foreign Policy," in John Arquilla and David Ronfeldt, ed., Networks and Netwars, (Rand, 2001), p. 241.
  6. Source Verizon Business, 2009 Data Breach Investigations Report, Verizon Business, 2009, p.2; Australian Communication and Media Authority, Submission 56, pp.4,7; Symantec Corporation, Symantec Global Internet Security Threat Report: Trends for 2008, Symantec Corporation, April 2009, pp.10,16,90 ; McAfee Inc, McAfee Threats Report Third Quarter 2009, McAfee Inc, 2009, p.3; Internet Society of Australia, Submission 45, pp.3-4; Telstra, Submission 43.1, p.2; Anti-Phishing Working Group, Phishing Activity Trends Report: 1st Half 2009, APWG, 2009, p.3; BBC News, Google searches web's darkside, online news article, 11 may 2007, viewed 19 January 2009, <http://news.bbc.co.uk/2/hi/technology/6645895.stm>. Global statistics. <BIBLIOGRAPHY>
  7. Baiden, J. Cybercrimes. Electronic copy available at: http://ssrn.com/abstract=1873271
  8. Brenner, S. W. Cybercrime: criminal threats from cyber space. USA: Praeger, DOI: www.abc-clio.com, 2010.
  9. Brown, I., Edwards, L. and Marsden, C., Information Security and Cybercrime, Law and the Internet, 3rd Ed., Oxford: Hart, 2009.
  10. Chowbe, Vijaykumar Shrikrushna, The Concept of Cyber-Crime: Nature & Scope, Available at SSRN: http://ssrn.com/abstract=1766238 or http://dx.doi.org/10.2139/ssrn.1766238, February 21, 2011. Goodman and Brenner, "Emerging Consensus on Criminal Conduct on Cyberspace", International Journal of Law and information technology, Vol 10 No 2, Oxford University press 2002.
  11. Indira Carr, Computer crime, UK: University of Surrey. Ashgate(July 1, 2009).
  12. Kerr, S. Orin, "Digital evidence and New Criminal Procedure", Columbia Law Review, 2005, Available at http://ssrn.com/abstract=594101
  13. Levy Steven, Hackers: Heroes of the Computer Revolution, New York, 1984.
  14. Hafner, K. Cyberpunk outlaws and hackers on the computer frontier, New York: Simon & Schuster, 1995.
  15. Hollinger, R. C., Crime, deviance and the computer, England, USA: Dartmouth, 1997.
  16. Campbell-Kelly, Martin and Garcia-Swartz, Daniel, D., The History of the Internet: The Missing Narratives, Available at SSRN: http://ssrn.com/abstract=867087, December 2, 2005.
  17. McFayden, E., Global Implications of White Collar Crime, Kentucky State University, 2010.
  18. Wall, D., Cyber criime, India: Replika Press Pvt Ltd. 2001.
  19. Watson. P., Transcript of Evidence. Microsoft Pty Ltd. 2009.
  20. Yar Majid. Cyber crime and society. New Delhi, London: Sage Publications, 2006.