ABSTRACT
Cyber security should consider criminal justice and social education models to secure the highly distributed elements of the information network, extend the effective administration of justice to cybercrime and embed security awareness and competence in engineering and common computer practice. We examine models of such behavior.
- Hanchard, Doug, FBI Director on cyber threats: We can't do it alone, ZDNet March 5, 2010.Google Scholar
- USDOJ Press Release, December 22, 2009 "Former Inmate Sentenced for Hacking Prison Computer," http://www.cybercrime.gov/janoskoSent.pdf, last visited March 1, 2010Google Scholar
- Armstrong, N, Losavio, M, Keeling, D, 2010, Digital System, Evidence & Forensics Issues In Correctional Environments, Proceedings of the IEEE Workshop on Systematic Approaches to Digital Forensics Engineering, (Berkeley, California, U.S.A., May 20, 2010) Google ScholarDigital Library
- Kane, D. (2008, December 5). Cell phones plague prisons. The News & Observer. Retrieved February 11, 2009 from http://newsobserver.com/news/story/1321262.html (archived)Google Scholar
- Administration of President George W. Bush, The National Strategy to Secure Cyberspace (2003), http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdfGoogle Scholar
- Pumphrey, Carol, Introduction, Transnational Threats: Blending Law Enforcement and Military Strategies, 2000, Pumphrey, Carol, ed. Strategic Studies Institute, United States Army War CollegeGoogle Scholar
- Cohen, Stanley (1985). Visions of Social Control: Crime, Punishment, and Classification. Polity PressGoogle Scholar
- Ouimet, M. (2009). Internet crime and trends. In F. Schmallager & M. Pittaro, (Eds). Crimes of the internet (408--416). Upper Saddle River, New Jersey: Pearson Education IncGoogle Scholar
- Madey, Greg, Freeh, Vincent, Tynan, Renee, The Open Source Software Development Phenomenon: An Analysis Based On Social Network Theory, Eighth Americas Conference on Information Systems (2002)Google Scholar
- Mislove, Alan, Marcon, Massimiliano, Gummadi Krishna, Druschel, Peter, Bhattacharjee, Bobby, "Measurement and analysis of online social networks," Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, California, U.S.A., (2007) Google ScholarDigital Library
- Yar, Majid, "The Novelty of "Cybercrime": an Assessment in Light of Routine Activity Theory," European Journal of Crimnology, Vol. 2, No. 4, 407--427 (2005)Google Scholar
- Murphy, Paul, "Do problems with Wikipedia presage social networking's end?" ZDNet, July 15, 2008. http://blogs.zdnet.com/Murphy/?p=1190, last visited March 14, 2010Google Scholar
- Rich, Eliot, et al, Simulating Insider Cyber-Threat Risks -- Proc. Int'l Conference of Sys Dynamics Society, 2005, http://www.cert.org/insider_threat/docs/insider_threatISDC2005.pdf, last visited March 14, 2010Google Scholar
- Losavio, Michael, Wilson, Deborah, Elmaghraby, Adel, "Chapter XXI: Legal Issues For Research And Practice In Computational Forensics" Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global Publishing, 2010Google Scholar
- Broadband Opportunities Technology Program, NTIA, http://www.ntia.doc.gov/broadbandgrants/, last visited March 13, 2010Google Scholar
- Adapted from Gelmon, S. B, Holland, B. A., Driscoll, A., Spring, A., Kerrigan, S. (2001)" Assessing service-learning and civic engagement: Principles and techniques." Providence, RI: Campus Compact and Portland State's Capstone Student SurveyGoogle Scholar
Index Terms
- Positing social and justice models for cyber security
Recommendations
The Bangladesh Justice Audit
ICEGOV '17: Proceedings of the 10th International Conference on Theory and Practice of Electronic GovernanceThe Bangladesh Constitution guarantees human rights, freedom, equality, justice and rule of law for all citizens. Article 33(1) ensures the rights for each citizen to legal support and article 35(3) affirms that every person accused of a criminal ...
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security
SADFE '09: Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic EngineeringA systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and ...
Law Enforcement's Ability to Deal with Digital Crime and the Implications for Business
Much has been made of the capabilities to commit a crime that has a digital component, whether it is hacking, fraud, embezzlement, identity theft, organized crime, child pornography, or other criminal act. While the capabilities of the perpetrators and ...
Comments