Criminals and Criminal Organizations: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
! style="background-color: #efefef;" class="unsortable" | Full Text   
! style="background-color: #efefef;" class="unsortable" | Full Text   
|-
|-
| Anderson, Ross J. || || 2008 || [[Security Engineering]] || Book || Low:Technology; Low:Cryptography || N/A
|Anderson, Ross J.||||2008||[[Security Engineering]]||Book||Low:Technology; Low:Cryptography||N/A
|-
|-
| Department of Commerce || || 2010 || [[Defense Industrial Base Assessment]] || Online Government Paper || None || [http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf'']
|Department of Commerce||||2010||[[Defense Industrial Base Assessment]]||Online Government Paper||None ||[http://www.bis.doc.gov/defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_electronics_report.pdf ''Pdf'']
|-
|-
| Epstein, Richard A. || Brown, Thomas P. || 2008 || [[Cybersecurity in the Payment Card Industry]] || Law Review Article || Low:Law; Low:Economics ||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|Epstein, Richard A.||Brown, Thomas P.||2008||[[Cybersecurity in the Payment Card Industry]]||Law Review Article||Low:Law; Low:Economics||[http://lawreview.uchicago.edu/issues/archive/v75/75_1/EpsteinArticle.pdf ''Pdf'']
|-
|-
| Franklin, Jason, et. al || || 2007 || [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]] || Conference Paper || Low:Statistics; Low:Economics || [http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf  ''Alt Pdf'']
|Franklin, Jason, et. al||||2007||[[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]||Conference Paper||Low:Statistics; Low:Economics||[http://sparrow.ece.cmu.edu/group/pub/franklin_paxson_perrig_savage_miscreants.pdf ''Pdf''] [http://www.cs.cmu.edu/~jfrankli/acmccs07/ccs07_franklin_eCrime.pdf  ''Alt Pdf'']
|-
|-
| McAfee, Inc. || || 2010 || [[McAfee Threats Report]] || Industry Report || None || [http://www.mcafee.com/us/local_content/reports/2010q1_threats_report.pdf  ''Pdf'']
|McAfee, Inc.||||2010||[[McAfee Threats Report]]||Industry Report||None||[http://www.mcafee.com/us/local_content/reports/2010q1_threats_report.pdf  ''Pdf'']
|-
|-
| Moore, Tyler || Clayton, Richard || 2007 || [[Examining the Impact of Website Take-down on Phishing]] || Conference Paper || Low:Technology || [http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|Moore, Tyler||Clayton, Richard||2007||[[Examining the Impact of Website Take-down on Phishing]]||Conference Paper||Low:Technology||[http://www.ecrimeresearch.org/2007/proceedings/p1_moore.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime07.pdf  ''Alt Pdf'']
|-
|-
| Moore, Tyler || Clayton, Richard || 2008 || [[The Consequence of Non-Cooperation in the Fight Against Phishing]] || Conference Paper || Low:Technology; Low:Economics || [http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf  ''Alt Pdf'']
|Moore, Tyler||Clayton, Richard||2008||[[The Consequence of Non-Cooperation in the Fight Against Phishing]]||Conference Paper||Low:Technology; Low:Economics||[http://people.seas.harvard.edu/~tmoore/ecrime08.pdf ''Pdf''] [http://www.cl.cam.ac.uk/~rnc1/ecrime08pre.pdf  ''Alt Pdf'']
|-
|-
| Moore, Tyler || Clayton, Richard || 2009 || [[The Impact of Incentives on Notice and Take-down]] || Book Chapter || Moderate:Technology; Low:Law || [http://weis2008.econinfosec.org/papers/MooreImpact.pdf  ''Pdf'']
|Moore, Tyler||Clayton, Richard||2009||[[The Impact of Incentives on Notice and Take-down]]||Book Chapter||Moderate:Technology; Low:Law||[http://weis2008.econinfosec.org/papers/MooreImpact.pdf  ''Pdf'']
|-
|-
| Moore, Tyler, et. al || || 2009 || [[The Economics of Online Crime]] || Journal Article || Low:Technology || [http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
|Moore, Tyler, et. al||||2009||[[The Economics of Online Crime]]||Journal Article||Low:Technology||[http://people.seas.harvard.edu/~tmoore/jep09.pdf  ''Pdf'']
|-
|-
| Thomas, Rob || Martin, Jerry || 2006 || [[The Underground Economy]] || Journal Article || Low:Technology || [http://www.usenix.org/publications/login/2006-12/openpdfs/cymru.pdf ''Pdf'']
|Thomas, Rob||Martin, Jerry||2006||[[The Underground Economy]]||Journal Article||Low:Technology||[http://www.usenix.org/publications/login/2006-12/openpdfs/cymru.pdf ''Pdf'']
|}
|}



Revision as of 14:56, 10 August 2010

TOC-> Threats and Actors-> Actors and Incentives->Criminals and Criminal Organizations

Author 1 Author 2 Year Title Source Expertise Full Text
Anderson, Ross J. 2008 Security Engineering Book Low:Technology; Low:Cryptography N/A
Department of Commerce 2010 Defense Industrial Base Assessment Online Government Paper None Pdf
Epstein, Richard A. Brown, Thomas P. 2008 Cybersecurity in the Payment Card Industry Law Review Article Low:Law; Low:Economics Pdf
Franklin, Jason, et. al 2007 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants Conference Paper Low:Statistics; Low:Economics Pdf Alt Pdf
McAfee, Inc. 2010 McAfee Threats Report Industry Report None Pdf
Moore, Tyler Clayton, Richard 2007 Examining the Impact of Website Take-down on Phishing Conference Paper Low:Technology Pdf Alt Pdf
Moore, Tyler Clayton, Richard 2008 The Consequence of Non-Cooperation in the Fight Against Phishing Conference Paper Low:Technology; Low:Economics Pdf Alt Pdf
Moore, Tyler Clayton, Richard 2009 The Impact of Incentives on Notice and Take-down Book Chapter Moderate:Technology; Low:Law Pdf
Moore, Tyler, et. al 2009 The Economics of Online Crime Journal Article Low:Technology Pdf
Thomas, Rob Martin, Jerry 2006 The Underground Economy Journal Article Low:Technology Pdf
  • Subcategories: None

Jump to Table of Contents