Advertisement

An International Perspective on Fighting Cybercrime

  • Weiping Chang
  • Wingyan Chung
  • Hsinchun Chen
  • Shihchieh Chou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2665)

Abstract

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of cybercrime and present an international perspective on fighting cybercrime. We review current status of fighting cybercrime in different countries, which rely on legal, organizational, and technological approaches, and recommend four directions for governments, lawmakers, intelligence and law enforcement agencies, and researchers to combat cybercrime.

Keywords

Internet Service Provider White Collar Crime Computer Crime Security Survey Internet Fraud 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W. and Schroeder, J. COPLINK: Managing Law Enforcement Data and Knowledge. Communications of the ACM 46, 1 (2003), 28–34.CrossRefGoogle Scholar
  2. 2.
    Freeh, L.J. Statement for the Record of Louis J. Freeh, Director, Federal Bureau of Investigation on Cybercrime Before the Senate Committee on Judiciary Subcommittee for the Technology, Terrorism, and Government Information, U.S. Department of Justice, http://www.usdoj.gov/criminal/cybercrime/freeh328.htm, 2000.
  3. 3.
    Garrison, L. and Grand, M. Network Defense: The Legal Aspects of Retaliation National Infrastructure Protection Center Highlights (Issue 7–01), 2001, 2.Google Scholar
  4. 4.
    Parker, D.B. Fighting Computer Crime: A New Framework for Protecting Information. Wiley Computer Publishing, 1998.Google Scholar
  5. 5.
    Philippsohn, S. Trends in cybercrime — an overview of current financial crimes on the Internet. Computers & Security 20, 1 (2001), 53–69.CrossRefGoogle Scholar
  6. 6.
    POST Regulating Internet Content. Parliamentary Office of Science and Technology 159 (2001), 1–4.Google Scholar
  7. 7.
    Power, R. 2002 CSI/FBI Computer Crime and Security Survey. Computer Security Issues & Trends 8, 1 (2002), 1–22.Google Scholar
  8. 8.
    Power, R. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Que Corporation, 2000.Google Scholar
  9. 9.
    Richards, J.R. Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers, auditors, and financial investigators. CRC Press, 1999.Google Scholar
  10. 10.
    Smith, S.P., Perrit, H., Krent, H. and Mencik, S. Independent Technical Review of the Carnivore System, http://www.usdoj.gov/jmd/publications/carniv_final.pdf, 2000.
  11. 11.
    Thomas, D. and Loader, B.D. Introduction — cybercrime: law enforcement, security and surveillance in the information age. in Cybercrime: Law enforcement, security and surveillance in the information age, Taylor & Francis Group, New York, NY, 2000.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Weiping Chang
    • 1
  • Wingyan Chung
    • 2
  • Hsinchun Chen
    • 2
  • Shihchieh Chou
    • 1
  1. 1.Department of Information ManagementNational Central UniversityChung-LiTaiwan
  2. 2.Artificial Intelligence Lab, Department of Management Information SystemsUniversity of ArizonaTucsonUSA

Personalised recommendations