skip to main content
10.1145/1852666.1852755acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
poster

Positing social and justice models for cyber security

Published:21 April 2010Publication History

ABSTRACT

Cyber security should consider criminal justice and social education models to secure the highly distributed elements of the information network, extend the effective administration of justice to cybercrime and embed security awareness and competence in engineering and common computer practice. We examine models of such behavior.

References

  1. Hanchard, Doug, FBI Director on cyber threats: We can't do it alone, ZDNet March 5, 2010.Google ScholarGoogle Scholar
  2. USDOJ Press Release, December 22, 2009 "Former Inmate Sentenced for Hacking Prison Computer," http://www.cybercrime.gov/janoskoSent.pdf, last visited March 1, 2010Google ScholarGoogle Scholar
  3. Armstrong, N, Losavio, M, Keeling, D, 2010, Digital System, Evidence & Forensics Issues In Correctional Environments, Proceedings of the IEEE Workshop on Systematic Approaches to Digital Forensics Engineering, (Berkeley, California, U.S.A., May 20, 2010) Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Kane, D. (2008, December 5). Cell phones plague prisons. The News & Observer. Retrieved February 11, 2009 from http://newsobserver.com/news/story/1321262.html (archived)Google ScholarGoogle Scholar
  5. Administration of President George W. Bush, The National Strategy to Secure Cyberspace (2003), http://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdfGoogle ScholarGoogle Scholar
  6. Pumphrey, Carol, Introduction, Transnational Threats: Blending Law Enforcement and Military Strategies, 2000, Pumphrey, Carol, ed. Strategic Studies Institute, United States Army War CollegeGoogle ScholarGoogle Scholar
  7. Cohen, Stanley (1985). Visions of Social Control: Crime, Punishment, and Classification. Polity PressGoogle ScholarGoogle Scholar
  8. Ouimet, M. (2009). Internet crime and trends. In F. Schmallager & M. Pittaro, (Eds). Crimes of the internet (408--416). Upper Saddle River, New Jersey: Pearson Education IncGoogle ScholarGoogle Scholar
  9. Madey, Greg, Freeh, Vincent, Tynan, Renee, The Open Source Software Development Phenomenon: An Analysis Based On Social Network Theory, Eighth Americas Conference on Information Systems (2002)Google ScholarGoogle Scholar
  10. Mislove, Alan, Marcon, Massimiliano, Gummadi Krishna, Druschel, Peter, Bhattacharjee, Bobby, "Measurement and analysis of online social networks," Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, California, U.S.A., (2007) Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yar, Majid, "The Novelty of "Cybercrime": an Assessment in Light of Routine Activity Theory," European Journal of Crimnology, Vol. 2, No. 4, 407--427 (2005)Google ScholarGoogle Scholar
  12. Murphy, Paul, "Do problems with Wikipedia presage social networking's end?" ZDNet, July 15, 2008. http://blogs.zdnet.com/Murphy/?p=1190, last visited March 14, 2010Google ScholarGoogle Scholar
  13. Rich, Eliot, et al, Simulating Insider Cyber-Threat Risks -- Proc. Int'l Conference of Sys Dynamics Society, 2005, http://www.cert.org/insider_threat/docs/insider_threatISDC2005.pdf, last visited March 14, 2010Google ScholarGoogle Scholar
  14. Losavio, Michael, Wilson, Deborah, Elmaghraby, Adel, "Chapter XXI: Legal Issues For Research And Practice In Computational Forensics" Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, edited by Chang-Tsun Li, IGI Global Publishing, 2010Google ScholarGoogle Scholar
  15. Broadband Opportunities Technology Program, NTIA, http://www.ntia.doc.gov/broadbandgrants/, last visited March 13, 2010Google ScholarGoogle Scholar
  16. Adapted from Gelmon, S. B, Holland, B. A., Driscoll, A., Spring, A., Kerrigan, S. (2001)" Assessing service-learning and civic engagement: Principles and techniques." Providence, RI: Campus Compact and Portland State's Capstone Student SurveyGoogle ScholarGoogle Scholar

Index Terms

  1. Positing social and justice models for cyber security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
          April 2010
          257 pages
          ISBN:9781450300179
          DOI:10.1145/1852666

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • poster
        • Article Metrics

          • Downloads (Last 12 months)3
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader