Centro de Documentação da PJ
Monografia

CD276
CEVIDALLI, Anna
Leveraging the multi-disciplinary approach to countering organised crime [Documento electrónico] : an evaluation for information security and business professionals / Anna Cevidalli.- Surrey : [s.n.], 2010.- 1 CD-ROM ; 12 cm
Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London; supervisor John Austen. Ficheiro de 1,62 MB em formato PDF (197 p.).


CRIME ORGANIZADO, SEGURANÇA DE INFORMAÇÕES, TECNOLOGIA, INTERNET, ANÁLISE CRIMINAL, TESE, REINO UNIDO

1. Introduction. 1.1 Overall purpose. 1.2 Specific objectives. 1.3 Scope. 1.4 Methodology. 2. Executive summary. 3. Overview of organised crime. 3.1 Different perceptions about organised crime. 3.1.1 The international perspective. 3.1.2 The public/ media perspectives. 3.1.3 The government/ law enforcement perspectives. 3.1.4 The academic perspective. 3.1.5 The victim’s perspective. 3.1.6 The economic perspective. 3.1.7 The corporate perspective. 3.1.8 The information security perspective. 3.1.9 The challenge of synthesising divergent views. 3.1.10 The multi-disciplinary perspective. 3.2 Dispelling the myths. 3.2.1 The limitations of public pronouncements and statistics. 3.3 Defining the realities. 3.3.1 Organised crime groups. 3.3.2 Technology-oriented and online organised crime groups. 4. Technology and organised crime. 4.1 Online organised crime groups and information technology. 4.1.1 Specific threats posed by online organised crime groups. 4.1.2 Key attributes of information and technology exploited by OOCGs. 4.2 The problem of crimeware. 4.3 The internet and the web as attack vectors. 5. The business of organised crime. 5.1 The importance of online organised crime business models. 5.2 Strategic analysis and online organised crime groups. 5.2.1 Employing morphological analysis within a multi-disciplinary context. 6. Conclusion. 7. References. 8. Key terms. 8.1 Definitions of key terms as used within this paper and its appendices. 9. Glossaries. 9.1 Glossary of acronyms. 9.2 Glossary of information security and technical terms used within this paper and the appendices. Appendices. Appendix A. Tables of organised crime characteristics (1 – 6). Appendix B. Real-life online organised crime case studies. Appendix C. Morphological Analysis (MA) methodology and matrices. Appendix D. Information and IT attributes exploited by offenders.