목차
Ⅰ. What is Cybercrime? ................................................................................................................................... 3
1. Definitions ................................................................................................................................................... 3
2. Categories .................................................................................................................................................. 4
Ⅱ. Statistics in countries .................................................................................................................................. 3
1. Australia ..................................................................................................................................................... 3
2. UK ............................................................................................................................................................. 4
3. Uganda ....................................................................................................................................................... 4
4. Korea ......................................................................................................................................................... 5
5. Worldwide (Internet Crime Compliance Center) ............................................................................................... 5
Ⅲ. Impact Researches ..................................................................................................................................... 6
1. Korea ......................................................................................................................................................... 6
2. Foreign(or worldwide) .................................................................................................................................. 6
Ⅳ. Trends and Patterns .................................................................................................................................. 8
Ⅴ. 참고문헌....................................................................................................................................................11
'논문(Paper) > 사이버범죄연구' 카테고리의 다른 글
[KUCIS 프로젝트] A Forensic Analysis of the Windows Registry (0) | 2010.11.22 |
---|---|
Complex-coordinated Cyber Terror Scenario (0) | 2010.11.22 |
Digital Evidence (0) | 2010.11.22 |
디지털 포렌식 관점에서 본 증거개시제도 (0) | 2010.11.22 |
디지털 증거 분석을 위한 Digital Forensics (0) | 2010.11.22 |