메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
Back Sin-chul (Florida International University Miami United States) LaPrade Jennifer (University of Texas at Dallas Dallas United States) Sadhika Soor (Florida International University Miami United States)
저널정보
J-INSTITUTE Protection Convergence Protection Convergence Vol.3 No.1
발행연도
2018.6
수록면
7 - 13 (7page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
The issue of cyberattacks has become very pervasive and increasingly dangerous in the digital age. Many industrialized nations are highly dependent upon computer systems and other technologically supported infrastructures. An attack on such infrastructures may very likely compromise a nation’s security and economic vitality. However, to date there has not been a multinational cooperation system as an effective cyberattack prevention strategy. While the policing of high crime areas, known as hotspots, has garnered much attention among scholars and law enforcement officials, the spatial identification of hotspots in cybercrime has been limited. Routine activity theory has often been applied to explain crimes in the physical space, and consistent with this framework, a new theory has been put forth to explain crimes in cyberspace: cyber-routine activities theory. This theory contends that an unguarded virtual network must be present in addition to a potential offender and potential target in order for a cybercrime to occur. Further, unlike the spatial and temporal convergence of the physical world, the virtual world is not bound by the same spatial and temporal orderings. Due to the dynamic nature of cyberspace, a cyberattack may be committed against a target in different real-world time zones, while also allowing the attacker to escape. The current study seeks to address gaps in the literature concerning spatial and temporal patterns of cyberattack origins and victimizations. The purpose of this study is to identify spatial and temporal patterns of cyberattack hotspots, which can help law enforcement establish an effective cybercrime prevention strategy for international communities. In terms of methodology, Geospatial Information System(GIS) technique is employed to investigate the patterns of cyberattacks and victimizations. Data was derived from the Norse website from February 15-16, 2017, which feeds a livestream of cyberattacks worldwide. The data includes cyberattack origins, types, targets, times, IP addresses, locations, and ports. This study focuses on answering the following four research questions: Which nations are the top seven countries by count: cyberattack origins? Which nations are the top seven countries by count: cyberattack victimizations? Do the spatial hotspots for cyberattack origins differ from the spatial hotspots for cyberattack victimizations? Does a temporal pattern of cyberattacks in the daytime differ from a temporal pattern of cyberattacks in the nighttime? Thus, the findings of the current study indicate (1)the spatial hotspots of the cyber attackers and victims, and (2)the difference between temporal patterns of cyberattacks in the daytime and nighttime. Finally, policy implications and limitations of the current study are discussed.

목차

등록된 정보가 없습니다.

참고문헌 (18)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0