2012 European Intelligence and Security Informatics Conference 2012
DOI: 10.1109/eisic.2012.40
|View full text |Cite
|
Sign up to set email alerts
|

Exploring a Warrior Paradigm to Design Out Cybercrime

Abstract: Cybercrime increases with the advent of new onlineInternet services (e.g., entertainment, commerce, payment, pubic administration, social networking services). Not only do cybercriminals target governmental or public institutions, they increasingly victimize individuals and smaller organizations. At the same time, we observe that individuals and organizations steadily join forces and take a more proactive and collaborative role in war against cybercrime. In the current work we investigate examples of rising se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Information systems that process, e.g., collect, enhance, store, and share, privacy sensitive information (like names, email and postal addresses, dates of birth, geo-locations, bank account numbers, photos and political/personal opinions) are fairly vulnerable to information leakage and thus to privacy breaches [2]. This information leakage stems from, for example, cyber attacks, compromised systems, or (un)intentional disclosure of privacysensitive information through fusing the information with the information of other sources.…”
Section: Introductionmentioning
confidence: 99%
“…Information systems that process, e.g., collect, enhance, store, and share, privacy sensitive information (like names, email and postal addresses, dates of birth, geo-locations, bank account numbers, photos and political/personal opinions) are fairly vulnerable to information leakage and thus to privacy breaches [2]. This information leakage stems from, for example, cyber attacks, compromised systems, or (un)intentional disclosure of privacysensitive information through fusing the information with the information of other sources.…”
Section: Introductionmentioning
confidence: 99%
“…Information systems (ISs) that process, e.g. collect, enhance, store and share, privacy-sensitive information (like names, email and postal addresses, dates of birth, geo-locations, bank account numbers, photos and political/personal opinions) are fairly vulnerable to information leakage and thus to privacy breaches (Bargh et al , 2012). Information leakage stems from, for example, cyber attacks, compromised systems or (un)intentional disclosure through fusing the information with other information.…”
Section: Introductionmentioning
confidence: 99%