WEKO3
アイテム
Cybercrime as Complex Systems
https://chuo-u.repo.nii.ac.jp/records/17850
https://chuo-u.repo.nii.ac.jp/records/178507efea61d-95b4-4d17-bc94-103c23f46568
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 紀要論文 / Departmental Bulletin Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2023-02-15 | |||||
タイトル | ||||||
タイトル | Cybercrime as Complex Systems | |||||
言語 | en | |||||
言語 | ||||||
言語 | eng | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Cybercrime | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Self-organization | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Complex system | |||||
キーワード | ||||||
言語 | en | |||||
主題Scheme | Other | |||||
主題 | Creativity | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | departmental bulletin paper | |||||
著者 |
SHIKATA, Ko
× SHIKATA, Ko |
|||||
著者別名 | ||||||
識別子Scheme | WEKO | |||||
識別子 | 49807 | |||||
姓名 | 四方, 光 | |||||
姓名 | シカタ, コウ | |||||
言語 | ja-Kana | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | A prominent feature of cyberspace and cybercrime is rapidly changing due to the creativity of platformers, crackers, and security vendors. The origins of the creativity are individuality and value in the human mind as a self-organizing system. When an existence becomes a self-organizing system, its nature changes dramatically. A self-organizing system comes to have some control on itself and an essential individuality, while it is partly influenced by the laws of nature, because each element of the system is a natural thing. A self-organizing system has both universality and individuality. This is the reason why researchers need both quantitative and qualitative researches in order to understand self-organizing systems, such as cyberspace and cybercrime.The most important thing to detect and prevent cybercrime is to grasp the rapidly changing of cybercrimes as fast as possible. That is to find symptoms or attempts of cybercriminals before their truly criminal acts, to observe newly-released malware, or to discover the infrastructures for cybercrime such as darkweb, botnets or dark crypto-currency. In order to achieve this, it is necessary to have some sort of surveillant system and information gathering system on cybercrime in cooperation with law enforcement, security industry and Internet users. | |||||
書誌情報 |
比較法雑誌 巻 56, 号 2, p. 111-126, 発行日 2022-09-30 |
|||||
出版者 | ||||||
出版者 | 日本比較法研究所 | |||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0010-4116 | |||||
権利 | ||||||
権利情報 | この資料の著作権は、資料の著作者または学校法人中央大学に帰属します。著作権法が定める私的利用・引用を超える使用を希望される場合には、掲載誌発行部局へお問い合わせください。 | |||||
フォーマット | ||||||
内容記述タイプ | Other | |||||
内容記述 | application/pdf | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |