2010
DOI: 10.1007/978-3-642-11522-6
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: WMXDesign GmbH, HeidelbergPrinted on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) PrefaceThe Internet's rapid diffusion and digitization of economic activities have led to the emergence of a n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 74 publications
(12 citation statements)
references
References 0 publications
0
12
0
Order By: Relevance
“…For instance, they argued that trying to implement information security measures without first classifying the assets could result in unnecessary investment in the protection of assets that are not critical to the company's process or business continuity and in a lack of protection to those important assets. In turn, an incident that affects an unprotected critical asset could represent high costs [5], [65], [66] and a company that has invested considerably in protecting other assets could lead to the assumption that "spending" in cyber resilience is not effective.…”
Section: Implementation Order Definitionmentioning
confidence: 99%
“…For instance, they argued that trying to implement information security measures without first classifying the assets could result in unnecessary investment in the protection of assets that are not critical to the company's process or business continuity and in a lack of protection to those important assets. In turn, an incident that affects an unprotected critical asset could represent high costs [5], [65], [66] and a company that has invested considerably in protecting other assets could lead to the assumption that "spending" in cyber resilience is not effective.…”
Section: Implementation Order Definitionmentioning
confidence: 99%
“…This can be seen from the increasing number or victims and losses caused by cybercrime. In principle, [10] argues that cybercrime is a criminal activity where a computer or computer network is used as the primary means to violate prevailing law, rules, or regulations. Data and survey from PwC and RSA cited by Prayudi [7] show that cybercrime is a serious threat to individuals, institutions or countries and the amount of losses globally could be compared to the national income of a country.…”
Section: Digital Forensics Challengesmentioning
confidence: 99%
“…This is in line with a report from [2] who revealed that cybercrime is the industry that grows from year to year with the high rate of return but with little risk. Meanwhile, according to [3], although there is no official definition of cybercrime, for the sake of practicality, cybercrime can be defined as "a criminal activity in which computers or computer networks are the principal means of committing an offense or violating laws, rules, or regulations". Meanwhile, [4] argues that cybercrime is not a new crime, but rather classic crimes exploiting the computing power and accessibility to information.…”
Section: Introductionmentioning
confidence: 99%