Skip to main content

An International Perspective on Fighting Cybercrime

  • Conference paper
  • First Online:
Intelligence and Security Informatics (ISI 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2665))

Included in the following conference series:

Abstract

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of cybercrime and present an international perspective on fighting cybercrime. We review current status of fighting cybercrime in different countries, which rely on legal, organizational, and technological approaches, and recommend four directions for governments, lawmakers, intelligence and law enforcement agencies, and researchers to combat cybercrime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W. and Schroeder, J. COPLINK: Managing Law Enforcement Data and Knowledge. Communications of the ACM 46, 1 (2003), 28–34.

    Article  Google Scholar 

  2. Freeh, L.J. Statement for the Record of Louis J. Freeh, Director, Federal Bureau of Investigation on Cybercrime Before the Senate Committee on Judiciary Subcommittee for the Technology, Terrorism, and Government Information, U.S. Department of Justice, http://www.usdoj.gov/criminal/cybercrime/freeh328.htm, 2000.

  3. Garrison, L. and Grand, M. Network Defense: The Legal Aspects of Retaliation National Infrastructure Protection Center Highlights (Issue 7–01), 2001, 2.

    Google Scholar 

  4. Parker, D.B. Fighting Computer Crime: A New Framework for Protecting Information. Wiley Computer Publishing, 1998.

    Google Scholar 

  5. Philippsohn, S. Trends in cybercrime — an overview of current financial crimes on the Internet. Computers & Security 20, 1 (2001), 53–69.

    Article  Google Scholar 

  6. POST Regulating Internet Content. Parliamentary Office of Science and Technology 159 (2001), 1–4.

    Google Scholar 

  7. Power, R. 2002 CSI/FBI Computer Crime and Security Survey. Computer Security Issues & Trends 8, 1 (2002), 1–22.

    Google Scholar 

  8. Power, R. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Que Corporation, 2000.

    Google Scholar 

  9. Richards, J.R. Transnational criminal organizations, cybercrime, and money laundering: a handbook for law enforcement officers, auditors, and financial investigators. CRC Press, 1999.

    Google Scholar 

  10. Smith, S.P., Perrit, H., Krent, H. and Mencik, S. Independent Technical Review of the Carnivore System, http://www.usdoj.gov/jmd/publications/carniv_final.pdf, 2000.

  11. Thomas, D. and Loader, B.D. Introduction — cybercrime: law enforcement, security and surveillance in the information age. in Cybercrime: Law enforcement, security and surveillance in the information age, Taylor & Francis Group, New York, NY, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chang, W., Chung, W., Chen, H., Chou, S. (2003). An International Perspective on Fighting Cybercrime. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds) Intelligence and Security Informatics. ISI 2003. Lecture Notes in Computer Science, vol 2665. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44853-5_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-44853-5_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40189-6

  • Online ISBN: 978-3-540-44853-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics