Detecting plagiarism in student Pascal programs
The Computer Journal
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code
Computers and Security
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Transnational Criminal Organizations, Cybercrime and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
COPLINK: managing law enforcement data and knowledge
Communications of the ACM
Mining e-mail content for author identification forensics
ACM SIGMOD Record
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Smokey: automatic recognition of hostile messages
AAAI'97/IAAI'97 Proceedings of the fourteenth national conference on artificial intelligence and ninth conference on Innovative applications of artificial intelligence
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications: An International Journal
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Hi-index | 0.00 |
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in Taiwan and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting eybercrime.