Bibliography on Cyber Threats

Database

BIBLIOGRAPHY ON CYBER THREATS

Author   Title   Year  

96 documents found [Prev]

2012

Command Five Pty Ltd (2012), Command and Control in the Fifth Domain, Alice Springs, Command Five Pty Ltd. [WWW]

European Network and Information Security Agency (ENISA) (2012), Economics of Security: Facing the Challenges: A Multidisciplinary Assessment, Heraklion, European Network and Information Security Agency (ENISA). [WWW]

Glenny, Misha, Organized Crime in a Network Society. Journal of International Affairs - Vol. 66, n°1, 2012, 145-149.

Goncharov, Max (2012), Russian Underground 101: Research Paper, Cupertino, Trend Micro Inc.. [WWW]

Holmes, David (2012), The DDoS Threat Spectrum: White Paper, Seattle, F5 Networks. [WWW]

International Telecommunication Union (ITU) (2012), Understanding Cybercrime: Phenomena, Challenges and Legal Response, Geneva, International Telecommunication Union (ITU). [WWW]

Marinos, Louis; Sfakianakis, Andreas (2012), ENISA Threat Landscape: Responding to the Evolving Threat Environment, Heraklion, European Network and Information Security Agency (ENISA). [WWW]

Mik, Eliza, Mistaken Identity, Identity Theft and Problems of Remote Authentication in E-commerce. Computer Law and Security Review, Vol. 28, n° 4, 2012: 369-402.

Monroy-Hernández, Andrés; Kiciman, Emre; Boyd, Danah; Counts, Scott (2012), Narcotweets: Social Media in Wartime. Proceedings of: Sixth International AAAI Conference on Weblogs and Social Media (Dublin, 4-7 July 2012), California, Association for the Advancement of Artificial Intelligence (AAAI). [WWW]

Organisation for Economic Cooperation and Development (OECD) (2012), Cybersecurity Policy Making at a Turning Point: Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy, Paris, Organisation for Economic Cooperation and Development (OECD). [WWW]

Porcedda, Maria Grazia. European University Institute (EUI) (2012), Data Protection and the Prevention of Cybercrime: The EU as an Area of Security?: EUI Working Papers, Fiesole, European University Institute. [WWW]

Schmitt, Michael N., International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed. Harvard International Law Journal - Vol. 54 (feature article).

Schreier, Fred (2012), On Cyberwarfare. DCAF Horizon 2015 Working Paper n° 7, Geneva, Geneva Centre for the Democratic Control of Armed Forces (DCAF). [WWW]

Shackelford, Scott J. (2012), Toward Cyber Peace: Managing Cyber Attacks through Polycentric Governance. American University Law Review - Vol. 62, n°5, 2013: 1273-1364. [WWW]

Sullivan, Kevin (2012), The Internet Health Model for Cybersecurity, New York, EastWest Institute. [WWW]

United Nations Office on Drugs and Crime (UNODC) (2012), The Use of the Internet for Terrorist Purposes, Vienna, United Nations Office on Drugs and Crime (UNODC). [WWW]

United States Department of Energy (DOE); National Institute of Standards and Technology (NIST); North American Electric Reliability Corporation (NERC) (2012), Electricity Subsector Cybersecurity: Risk Management Process, Washington, D.C., United States Department of Energy (DOE). [WWW]

Vaciago, Giuseppe. University of Milan (2012), Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics. Paper presented at: CYBERLAWS 2012: The Third International Conference on Technical and Legal Aspects of the e-Society (Valencia, Spain, 30 January-4 February 2012), International Academy, Research and Industry Association (IARIA). [WWW]

World Economic Forum (2012), Partnering for Cyber Resilience: Risk and Responsibility in a Hyperconnected World: Principles and Guidelines, Geneva, World Economic Forum. [WWW]


2011

Boyd, Danah; Casteel, Heather; Thakor, Mitali; Johnson, Rane (2011), Human Trafficking and Technology: A Framework for Understanding the Role of Technology in the Commercial Sexual Exploitation of Children in the U.S., Redmond, Microsoft Corporation. [WWW]

Castelluccia, Claude; Druschel, Peter; Fischer Hübner, SImone; Gorniak, Slawomir; Ikonomou, Demosthenes; Pasic, Aljosa; Preneel, Bart; Tschofenig, Hannes; Tirtea, Rodica (2011), Privacy, Accountability and Trust: Challenges and Opportunities, Heraklion, European Network and Information Security Agency (ENISA). [WWW]

Geers, Kenneth (2011), Strategic Cyber Security, Talliin, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). [WWW]

Helmbrecht, Udo; Purser, Steve; Ritter Klejnstrup, Maj (2011), Cyber Security: Future Challenges and Opportunities, Heraklion, European Network and Information Security Agency (ENISA).

Kanich, Chris; Weaver, Nicholas; McCoy, Damon; Halvorson, Tristan; Kreibich, Christian; Levchenko, Kirill; Paxon, Vern; Voelker, Geoffrey M.; Savage, Stefan (2011), Show Me the Money: Characterizing Spam-advertised Revenue, Berkeley, USENIX Association. [WWW]

Nicol, David M. (2011), Hacking the Lights Out: Computer Viruses Have Taken Out Hardened Industrial Control Systems. The Electrical Power Grid May be Next, New York, Scientific American.

Rosenzweig, Paul (2011), An Emerging Threats Essay: Cybersecurity and Public Goods: The Public/Private “Partnership”, Stanford, The Board of Trustees of the Leland Stanford Junior University.

Sommer, Peter; Brown, Ian (2011), Reducing Systemic Cybersecurity Risk, Paris, Organisation for Economic Cooperation and Development (OECD). [WWW]


2010

Amit, Iftach Ian (2010), Cyber [Crime-War]: Linking State Governed Cyber Warfare with Online Criminal Groups, Boston, Security and Innovation.

Calderoni, Francesco (2010), The European Legal Framework on Cybercrime: Striving for an Effective Implementation. Crime, Law and Social Change - Vol. 54, n° 5, 2010: 339-357.

Cottim, Armando, Cybercrime, Cyberterrorism and Jurisdiction: An Analysis of Article 22 of the COE Convention on Cybercrime. European Journal of Legal Studies - Vol. 2, n° 3, 2010: 1-23. [WWW]

Harmonization of ICT Policies, Legislation and Regulatory Procedures in the Caribbean (HIPCAR) (2010), Electronic Evidence: Model Policy Guidelines & Legislative Texts, Geneva, International Telecommunication Union (ITU). [WWW]

International Telecommunication Union (ITU) (2010), ITU Toolkit for Cybercrime Legislation, Geneva, International Telecommunication Union (ITU).

Jewkes, Yvonne; Yar, Majid (2010), Handbook of Internet Crime, Cullompton, Willan Publishing.

Kunze, Erin I., Sex Trafficking Via The Internet: How International Agreements Address The Problem And Fail To Go Far Enough. Journal of High Technology Law - Vol. X, n°2, 2010: 241-289. [WWW]

Peláez, Manuel Humberto Santander (2010), Measuring effectiveness in Information Security Controls, Swansea, SANS Institute.

Wichman, Larry (2010), Mass SQL Injection for Malware Distribution, Swansea, SANS Institute.


2009

Yar, Majid (2009), Computer Crime Control as Industry Virtual Insecurity and the Market for Private Policing. In: Technology of InSecurity: Chapter 9, London, Routledge-Cavendish. [WWW]


2008

European Network and Information Security Agency (ENISA) (2008), Web 2.0 Security and Privacy: Position Paper, Heraklion, European Network and Information Security Agency (ENISA). [WWW]

Hoven van Genderen, Rob van den (2008), Cybercrime Investigation and the Protection of Personal Data and Privacy, Strasbourg, Council of Europe. [WWW]


2007

Association of Chief Police Officers’ (ACPO) (2007), Good Practice Guide for Computer-Based Electronic Evidence: Official Relesed Version, London, 7Safe Information Scurity. [WWW]

Miller, Charlie (2007), The Legitimate Vulnerability Market: Inside the Secretive World of 0-day Exploit Sales: Draft, Baltimore, Independent Security Evaluators. [WWW]

Sykiotou, Athanassia P. (2007), Trafficking in Human Beings: Internet Recruitment, Brussels, Council of Europe. [WWW]

Wall, David S., Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace. Police Practice and Research - Vol. 8, n° 2, May 2007: 183-205.


2006

Brenner, Susan W., Cybercrime Jurisdiction. Crime, Law and Social Change - Vol.46, n° 4-5, 2006: 189-206. [WWW]

Yar, Majid (2006), Teenage Kicks or Virtual Villainy? Internet Piracy, Moral Entrepreneurship, and the Social Construction of a Crime Problem. In: Crime Online: Chapter 7, Portland, International Specialized Books Service (ISBS). [WWW]


2005

Yar, Majid, Computer Hacking: Just Another Case of Juvenile Delinquency?. The Howard Journal of Criminal Justice - Vol. 44, n° 4, September 2005: 387–399.

96 documents found [Prev]

Contact Us Disclaimer | Acknowledgements