Abstract
Cybercrime is one of the most difficult challenges facing law enforcement agencies. The police need to learn vast skills and accumulate much knowledge to fight against cybercrime. Because law enforcement agencies possess knowledge to fight against cybercrime in various forms and formats, knowledge management (KM) is needed. In this paper, the author applies KM into cybercrime investigation to manage cybercrime knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Birk, D., Gajek, S., Grobert, F., Sadeghi, A.: Phishing Phishers - Observing and Tracing Organized Cybercrime. In: Second International Conference on Internet Monitoring and Protection, pp. 3–8 (2007)
Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK- Managing Law Enforcement Data And Knowledge. Communication of the ACM 46(1), 28–34 (2003)
Donalds, C., Osei-Bryson, K.: Criminal Investigation Knowledge System: CRIKS. In: Proceedings of the 39th Hawaii International Conference on System Sciences, pp. 155–164 (2006)
Nordin, M., Pauleen, D., Gorman, G.: Investigating KM antecedents: KM in the criminal justice system. Journal of Knowledge Management 13(2), 4–20 (2009)
Park, H., Cho, S., Kwon, H.: Cyber Forensics Ontology for Cyber Criminal Investigation. LNICST, vol. 8, pp. 160–165 (2009)
Polanyi, M.: Personal Knowledge: Towards a Post-Critical Philosophy. University of Chicago Press, Chicago (1958)
Ratcliffe, J.H.: Crime mapping and the training needs of law enforcement. European Journal on Criminal Policy and Research 10(1), 65–83 (2004)
Stephens, P., Induruwa, A.: Cybercrime Investigation Training and Specialist Education for the European Union. In: Digital Forensics and Incident Analysis, WDFIA 2007, pp. 28–37 (2007)
Swanson, C.R., Chamelin, N.C., Territo, L.: Criminal Investigation, 8th edn. McGraw-Hill, Boston (2003)
Yang, A., Liu, A.: The Importance of Knowledge Identification in Developing Organizational Core Competences. In: Proceedings of the 13th Asia Pacific Management Conference, Melbourne, Australia, pp. 1005–1014 (2007)
Yeager, R.: Criminal Computer Forensics Management. In: InfoSecCD Conference’06, Kennesaw, GA, USA, pp. 168–174 (2006)
Zack, M.: Developing a Knowledge Strategy. In: Choo, C., Bontis, N. (eds.) The Strategic Management of Intellectual Capital and Organizational Knowledge. Oxford University Press, New York (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang, W. (2010). Fighting Cybercrime: A KM Perspective. In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-13601-6_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13600-9
Online ISBN: 978-3-642-13601-6
eBook Packages: Computer ScienceComputer Science (R0)