Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/768
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Tsakalidis, George | - |
dc.contributor.author | Vergidis, Kostas | - |
dc.date.accessioned | 2020-10-14T10:43:19Z | - |
dc.date.available | 2020-10-14T10:43:19Z | - |
dc.date.issued | 2019 | - |
dc.identifier | 10.1109/TSMC.2017.2700495 | en_US |
dc.identifier.issn | 2168-2216 | en_US |
dc.identifier.issn | 2168-2232 | en_US |
dc.identifier.uri | https://ieeexplore.ieee.org/document/7936557 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/768 | - |
dc.description.abstract | The advancements in computer systems and networks have created a new environment for criminal acts, widely known as cybercrime. Cybercrime incidents are occurrences of particular criminal offences that pose a serious threat to the global economy, safety, and well-being of society. This paper offers a comprehensive understanding of cybercrime incidents and their corresponding offences combining a series of approaches reported in relevant literature. Initially, this paper reviews and identifies the features of cybercrime incidents, their respective elements and proposes a combinatorial incident description schema. The schema provides the opportunity to systematically combine various elements-or cybercrime characteristics. Additionally, a comprehensive list of cybercrime-related offences is put forward. The offences are ordered in a two-level classification system based on specific criteria to assist in better classification and correlation of their respective incidents. This enables a thorough understanding of the repeating and underlying criminal activities. The proposed system can serve as a common reference overtaking obstacles deriving from misconceptions for cybercrimes with cross-border activities. The proposed schema can be extended with a list of recommended actions, corresponding measures and effective policies that match with the offence type and subsequently with a particular incident. This matching will enable better monitoring, handling and moderate cybercrime incident occurrences. The ultimate objective is to incorporate the schema-based description of cybercrime elements to a complete incident management system with standard operating procedures and protocols. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.source | IEEE Transactions on Systems, Man, and Cybernetics: Systems | en_US |
dc.subject | FRASCATI::Engineering and technology::Other engineering and technologies | en_US |
dc.subject | FRASCATI::Engineering and technology::Electrical engineering, Electronic engineering, Information engineering | en_US |
dc.subject.other | Cybernetics | en_US |
dc.subject.other | Pattern Classification | en_US |
dc.subject.other | System Analysis and Design | en_US |
dc.title | A Systematic Approach Toward Description and Classification of Cybercrime Incidents | en_US |
dc.type | Article | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.volume | 49 | en_US |
local.identifier.issue | 4 | en_US |
local.identifier.firstpage | 710 | en_US |
local.identifier.lastpage | 729 | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
GTsakalidis_A systematic approach.pdf | 1,2 MB | Adobe PDF | Προβολή/Ανοιγμα |
Τα τεκμήρια στο Αποθετήριο προστατεύονται από πνευματικά δικαιώματα, εκτός αν αναφέρεται κάτι διαφορετικό.