387
Views
4
CrossRef citations to date
0
Altmetric
Articles

Co-production of cybersecurity: a case of reported data system break-ins

&
Pages 78-94 | Received 16 Jan 2018, Accepted 03 Aug 2018, Published online: 27 Sep 2018

References

  • Bell, D. (1973). The coming of post-industrial society. New York, NY: Basic Books.
  • Brenner, S. W., & Clarke, L. L. (2005). Distributed security: Preventing cybercrime. 23 Journal Marshall Journal Computer & Info, L. 659–710.
  • Bronk, H., Thorbruegge, M., & Hakkaja, M. (2006). A step- by-step approach how to set up a CSIRT. Including Examples and a Checklist in Form of a Project Plan. Retrieved 24 April 2017 from http://www.enisa.europa.eu/activities/cert/support/guide/files/csirt-setting-up-guide/at_download/fullReport
  • Castells, M. (2001). The internet galaxy: Reflections on the internet, business, and society. Oxford: Oxford University Press.
  • Castells, M. (2010). The rise of network society. Second edition with a new preface. The information age. economy, society, and culture (Vol. 1). Malden, MA: Wiley-Blackwell.
  • CETS No.: 189. Additional Protocol to the Convention on Cybercrime, Concerning the Criminalisation of Acts of a Racist and Xenophobic Nature Committed through Computer Systems.
  • CETS No.:185. Convention on Cybercrime.
  • Chang, L. Y. C., & Poon, R. (2016). Internet vigilantism: Attitudes and experiences of university students toward cyber crowdsourcing in Hong Kong. International Journal of Offender Therapy and Comparative Criminology. doi:10.1177/0306624X16639037
  • Chang, L. Y. C., Zhong, L. Y., & Grabosky, P. N. (2016). Citizen co-production of cyber security: Self-help vigilantes and cybercrime. Regulation & Governance. doi:10.1111/rego.12125
  • Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). SP 800-61. computer security incident handling guide, recommendations of the national institute of standards and technology, 800-61 revision 2. Retrieved April 24, 2017, from http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
  • Clarke, R. V. (1997). Situational crime prevention. Successful case studies. (R. V. Clarke, ed). New York, NY: Harrow & Heston.
  • Crawford, A. (1998). Crime prevention and community safety. In Hughes, G., McLaughlin, E. & Muncie, J. (eds.), Politics, policies and practices. Longman criminology series. New York, NY: Longman.
  • Drucker, P. F. (1993). Post-capitalist society. New York, NY: Harper Collins.
  • Dupont, B. (2004). Security in the age of networks. Policing and Society, 14(1), 76–91.
  • Edwards, A. M., & Hughes, G. (2002). Introduction: The community governance of crime control. In G. Hughes & A. M. Edwards (Eds.), Crime control and community: The new politics of public safety (pp. 1–19). Cullompton: Willan.
  • ENISA (2010). Good practice guide for incident management. Retrieved April 24, 2017, from https://www.enisa.europa.eu/activities/cert/support/incident-management/files/good-practice-guide-for-incident-management/at_download/fullReport
  • Garland, D. (2001). The culture of control. Crime and social order in contemporary society. (Repr. 2006.). Oxford: Oxford University Press.
  • Himanen, P. (2001). Hakkerietiikka ja informaatioajan henki. [The Hacker Ethic - and the Spirit of the Information Age.]. Helsinki: WSOY.
  • Howard, J. D. (1997). An analysis of security incidents on the internet. Pittsburgh, KS: Garnegie Mellon University.
  • Huey, L., Nahn, J., & Broll, R. (2012). ‘Uppity Civilians’ and ‘Cyber-Vigilantes’: The role of general public in policing cyber-crime’. Criminology and Criminal Justice. doi:10.1177/1748895812448086
  • Johnston, L., & Shearing, C. (2003). Governing Security. Explorations in policing and justice. London: Routledge.
  • JOIN/2013/01 final. (2013). Joint communication to the European parliament, the council, the European Economic and Social Committee and the Committee of the Regions. Cybersecurity strategy of the European Union: An open, safe and secure cyberspace. Brussels, 7(2).
  • Kshetri, N. (2010). The global cybercrime industry. economical, institutional and strategic perspectives. Heidelberg: Springer.
  • Leppänen, A., Kiravuo, T., & Kajantie, S. (2016). Policing the cyber-physical space. The Police Journal, 89(4), 290–310.
  • Levi, M., & Williams, L. M. (2013). Multi-agency partnerships in cybercrime reduction. Mapping the UK information network cooperation space. Information Management and Computer Security, 21(5), 420–443.
  • Madnick, S., Li, X., & Choucri, N. (2009). Experiences and challenges with using CERT data to analyze international cyber security. Working Paper Series ESD-WP-2009. Massachusetts Institute of Technology, Engineering Systems Division, Cambridge.
  • Maimon, D., Wilson, T., Wuling, R., & Berenblum, T. (2015). On the relevance of spatial and temporal dimensions in assessing computer susceptibility to system trespassing incidents. Brit Journal Criminol, 55, 615–634.
  • Mandell, M. (2008). New ways of working. civic engagement through networks. In K. Yang & E. Bergrud (Eds.), Civic engagement in a network society, research on international civic engagement (pp. 65–84). Charlotte, NC: Information Age Publishing.
  • Merriam Webster Online Dictionary (2015). http://www.merriam-webster.com/dictionary/netizen
  • Milson, A. J., & Chu, B.-W. (2002). Character education for cyberspace: Developing good netizens. The Social Studies, Special Section: Developing a Comprehensive Approach to Character Education in the Social Studies, 93(3), 117–119.
  • Nahn, J. (2010). Policing cyberspace. A structural and cultural analysis. El Paso, TX: LFB Scholarly Publishing.
  • Nahn, J., & Huey, L. (2008). Policing through nodes, clusters and bandwidth. In S. Leman-Langlois (Ed.), Technocrime: Technology, crime and social control (pp. 66–87). Portland: Willan.
  • OECD (2012). Cybersecurity policy making at turning point. Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy. Retrieved June 19, 2017, from https://ccdcoe.org/sites/default/files/documents/OECD-121116-CybersecurityPolicyMaking.pdf
  • OJ L 194, 19.7.2016, p. 1–30 2016/1148/EU. Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union.
  • Rowe, B., Wood, D., Reeves, D., & Braun, F. (2011). The role of internet service providers in cyber security. Institute of Homeland Security Solutions, June 2011. Retrieved April 24, 2017, from http://sites.duke.edu/ihss/files/2011/12/ISP-Provided_Security-Research-Brief_Rowe.pdf
  • Toffler, A. (1980). The third wave. London: William Collins.
  • van Eeten, M., Bauer, J. M., Asghari, H., & Tabatabaie, S. (2010). The role of internet service providers in botnet mitigation: An empirical based on spam data. STI Working Paper No. 2010/5. OECD.
  • von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102.
  • Wall, D. (1998). Catching Cybercriminals: Policing the Internet. International Review of Law Computers & Technology, 12(2), 201–218.
  • Wall, D. S. (2007). Policing cybercrimes: Situating the public police in the networks of security within cyberspace (Revised Feb. 2011). Police Practice & Research: An International Journal, 8, 183–205.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.