Skip to main content

Fighting Cybercrime: A KM Perspective

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6122))

Abstract

Cybercrime is one of the most difficult challenges facing law enforcement agencies. The police need to learn vast skills and accumulate much knowledge to fight against cybercrime. Because law enforcement agencies possess knowledge to fight against cybercrime in various forms and formats, knowledge management (KM) is needed. In this paper, the author applies KM into cybercrime investigation to manage cybercrime knowledge.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Birk, D., Gajek, S., Grobert, F., Sadeghi, A.: Phishing Phishers - Observing and Tracing Organized Cybercrime. In: Second International Conference on Internet Monitoring and Protection, pp. 3–8 (2007)

    Google Scholar 

  2. Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK- Managing Law Enforcement Data And Knowledge. Communication of the ACM 46(1), 28–34 (2003)

    Article  Google Scholar 

  3. Donalds, C., Osei-Bryson, K.: Criminal Investigation Knowledge System: CRIKS. In: Proceedings of the 39th Hawaii International Conference on System Sciences, pp. 155–164 (2006)

    Google Scholar 

  4. Nordin, M., Pauleen, D., Gorman, G.: Investigating KM antecedents: KM in the criminal justice system. Journal of Knowledge Management 13(2), 4–20 (2009)

    Article  Google Scholar 

  5. Park, H., Cho, S., Kwon, H.: Cyber Forensics Ontology for Cyber Criminal Investigation. LNICST, vol. 8, pp. 160–165 (2009)

    Google Scholar 

  6. Polanyi, M.: Personal Knowledge: Towards a Post-Critical Philosophy. University of Chicago Press, Chicago (1958)

    Google Scholar 

  7. Ratcliffe, J.H.: Crime mapping and the training needs of law enforcement. European Journal on Criminal Policy and Research 10(1), 65–83 (2004)

    Article  MathSciNet  Google Scholar 

  8. Stephens, P., Induruwa, A.: Cybercrime Investigation Training and Specialist Education for the European Union. In: Digital Forensics and Incident Analysis, WDFIA 2007, pp. 28–37 (2007)

    Google Scholar 

  9. Swanson, C.R., Chamelin, N.C., Territo, L.: Criminal Investigation, 8th edn. McGraw-Hill, Boston (2003)

    Google Scholar 

  10. Yang, A., Liu, A.: The Importance of Knowledge Identification in Developing Organizational Core Competences. In: Proceedings of the 13th Asia Pacific Management Conference, Melbourne, Australia, pp. 1005–1014 (2007)

    Google Scholar 

  11. Yeager, R.: Criminal Computer Forensics Management. In: InfoSecCD Conference’06, Kennesaw, GA, USA, pp. 168–174 (2006)

    Google Scholar 

  12. Zack, M.: Developing a Knowledge Strategy. In: Choo, C., Bontis, N. (eds.) The Strategic Management of Intellectual Capital and Organizational Knowledge. Oxford University Press, New York (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, W. (2010). Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13601-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13600-9

  • Online ISBN: 978-3-642-13601-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics