As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Close coordination among law enforcement agencies, researchers, and intelligence agencies is required to solve the problem of computer crime. There are several barriers to this cooperation including asymmetric laws, national interests, and poor communication mechanisms. Computers have not only led to new types of crimes, but have provided additional avenues for existing crimes. Laws for traditional crimes have not evolved quickly enough to accommodate technology developments. To foster increased cooperation, it is necessary to have a common vocabulary, which will avoid confusion in interpretation of laws, security policies, data, and research due to differences in language, vocabulary, and semantics. The basic premise of the paper is that security policies are the key instrument of security that will help in tacking international cybercrime and a shared vision of security would be achieved through common security policies. This paper presents recommendations and results from the creation of an initial security glossary compiled from public sources on the Internet as a part of research in developing metrics for information security policies. The large variation in terminology and definitions underscores the necessity of standardization of nomenclature in security.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.