You are on page 1of 8

Krunoslav Antoliš: ICT AND IDENTITY THEFT

Informatol. 46, 2013., 4, 353-360 353

INFO- 2101 UDK: 681.3:340:001


Primljeno/Received: 2013-04-18 Authors Review/Pregledni rad

ICT AND IDENTITY THEFT

ICT I KRAĐA IDENTITETA

Krunoslav Antoliš
Police College, Police Academy, Ministry of the Interior of the Republic of Croatia, Zagreb, Croatia
Policijska akademija, Ministarstvo unutarnjih poslova Republike Hrvatske, Zagreb, Hrvatska

Abstract Sažetak
Modern information and communication tech- Nove informacijsko komunikacijske tehnologije
nology, apart from their numerous advantages, pored niza prednosti donose i nove oblike ugroza
bring with themselves new forms of threats and i prijetnji kojima smo izloženi prilikom njihove
dangers to which any of their users are exposed. uporabe. Jedna od najvećih, koja pored žrtava
One of the most serious is the identity theft uvelike brine informacijske ali i pravne stručnjake
through ICT which is the matter of concern not je krađa identiteta putem ICT. U radu se rašćla-
only for the victims but also for the experts in IT njuje tehnologijski i pravni aspet krađe identiteta.
and legislation. This paper analyses technological U tehnologijskom smislu važno u radu se prepo-
and legal aspect of identity theft. Concerning znaju načini krađe identiteta putem ICT te meto-
technological aspect, the paper recognizes the de i tehnike putem kojih se možemo kao korisnici
manners of identity theft through ICT and the ICT zaštititi. U pravnom pogledu u radu se sag-
methods and techniques which ICT users can ledava mogućnosti zaštite koje nam nudi postoje-
apply as their protection. With regard to legal ći zakonski okvir, a potom se raščlambom svjets-
aspect the paper examines the possibilities for kih iskustava ukazuje na mogućnosti njegova
protection within the existing legal framework unapređenja. Sve radom spomenuto u funkcije
and points out the possibility of its advancement zaštite ICT korisnika, ali i stvaranja preuvijeta za
by analyzing the experience obtained worldwide. kazneni progon kradljivaca identiteta.
All mentioned in the paper is aimed at protecting
of the ICT users and also at creating precondi-
tions for criminal proceedings of identity thieves.

1 Introduction a recent example showing how criminals can


use it to attack people's privacy. Namely, se-
Identity theft is a criminal offence which in vere vulnerability is found in Skype that
recent years has inflicted millions of dollars makes it possible to steal the user's account by
damage to physical and legal persons, while using only the email address associated with it.
dark figures, according to the experts, exceed It is only necessary to register a new Skype
billions of dollars at global level. Numerous account and enter the victim's email address.
examples illustrate that identity thieves recog- Then a third party log in with its new user's
nized ICT as extremely vulnerable technology account requiring password reset providing
exploiting its vulnerability for criminal profi- the victim's account /1/. The client who logs in
teering applying various technical tools with a new account is given the Skype pass-
(hardware/software) for identity theft and word reset token, then he changes the pass-
fraud as well as social engineering methods. In word and gets the access to the victim’s ac-
the world of global communications, Skype is count. The only way to protect from such at-

ISSN 1330-0067 Coden: IORME7


Krunoslav Antoliš: ICT AND IDENTITY THEFT
354 Informatol. 46, 2013., 4, 353-360

tacks is to have a secret email address associat- the botnet which enormously multiplies the
ed with the Skype account. Another example amount and profit of the identity thieves. Nu-
of disturbing privacy on daily basis occurs merous examples worldwide show the
while surfing the Internet. According to the amounts of the damages inflicted but we will
recent research done by development team of mention only some of them: Example 1 3.6
the Ghostery company, some firms use over million of social security numbers were stolen
100 various trackers of the Internet users. 137 from Americans /4/.
of them have been found on the Microsoft and In South Carolina 3.6 million of social security
106 on the Apple web pages. The companies numbers were stolen. Identification numbers
use them to collect information about users on are frequently used in identity theft as it is
the open browser pages or by tracking the assumed that only their users know them.
number of visits to certain pages, etc /2/. Other Also, 387.000 credit/debit card numbers were
examples illustrate vulnerability of Microsoft's stolen from the attacked server. Example 2 47
Hotmail and Outlook accounts which lies in million dollars stolen from 30,000 bank ac-
the authentication procedure of Hotmail and counts /5/. Zeus, a variation of Troyan horse
Outlook email services for Microsoft to vali- malicious software was to blame for recent
date user's login information making it much theft of $47 million from over 30.000 bank ac-
easier for the attackers to steal users' accounts. counts. In the attack was used Zeus Troyan for
User credentials are validated by authentica- mobile platforms ZITMO (aka Zeus in the mo-
tion cookie of the web browser and still remain bile) designed to pass the user's two-level-
successful although the victim logged out be- authentication by sending SMS. After infecting
fore the cookie 'theft'. Entering the stolen cook- the user's computer, in the first attempt to
ies into a person's web browser is not techni- access a bank account, the online banking 'up-
cally demanding, nor is their stealing if the graded' virus infected version for mobile de-
victim's computer is accessible. However, there vices was sent to the victim. The virus enabled
are manners how to steal them without having the access and carrying out money transactions
the access to the computer or its network, the from the victim's bank account.
best known among them is cross site scripting Example 3 The US police discovered massive
(XSS) /3/. Also, one interesting way of identity money theft in credit card fraud /6/. Gang of 18
theft is via memory stick. Identity can be stolen people was charged with stealing $200 million
in this way within maximum of 30 seconds. in credit card fraud as has been found so far.
How? When the memory stick is inserted into They invented more than 7 thousand false
the computer then something that most people identities, opened more than 25 thousand cred-
regard as 'terribly good' thing about Windows it/debit card accounts in Pakistan, Canada,
XP is run, the so-called auto play. While Auto India, the UK and elsewhere. They never
play is running, if the memory stick is infected meant to cover overdraft on bank accounts
by some malicious software, its software code they made and only after a year and half long
spreads on your computer and after that a investigation the police found $70.000 hidden
creator of the malicious software takes control by a thief in his oven. They spent the money
over it. To protect against such type of mal- on buying gold, luxurious cars, electronic
ware attack you should disable the Windows gadgets and on spa treatments.
Auto play option (40% job is done after turning Example 4 658 million $ lost in phishing /7/.
off Auto play option). Also, it is suggested not RSA security group released their survey re-
to insert unsafe memory sticks into computer, sults claiming that the number of computer
namely, format sticks when you find them, of security incidents increased for 10% in the first
course, if you want to use them, but never half of the year 2012 compared with the same
view their contents without previous checking period in the previous year. They referred to
and using protection! It is important to know phishing as the biggest threat due to the at-
that a good money can be made by selling tackers' convincing tactics and users' un-
identity today, from 50 Eurocents to $20 per thoughtfulness. Social networks such as Face
identity, add to this connecting computers to book are most frequently mentioned as the

ISSN 1330-0067 Coden: IORME7


Krunoslav Antoliš: ICT AND IDENTITY THEFT
Informatol. 46, 2013., 4, 353-360 355

starting point of attack due to the amount of 2 Intellectual capital and identity fraud
private information that users' accounts pro-
vide. Example 5 99% attacks is enabled by Intellectual capital theory is a prominent new
non-regular use of patch applications/8/. theory which largely promise improvement in
Microsoft's experts warn that over 99% attacks future business outcomes. The fact is that tan-
are enabled by failures in users' applications. gible assets (land, buildings, equipment and
Users might regularly install patches for their money) of the world leading companies today
operating system yet, they do not regularly have less value than intangible assets which
install the patches for other programs they use. are not mentioned in their business balances
This is the main way in which the attackers /9/.
take control over users' computers or steal the
users' data. Less than 1% of attacks use till then
undiscovered, the so-called 'zero-day' virus.

According to this theory, a company's value is comes the knowledge owned by a company
based on human capital, structural capital and transformed into structural capital /10/. Back in
customer capital. Building value means con- 2004, the US president asked NIAC to find out
verting one form of capital into another. For how the USA could provide safe proper devel-
example, new value is made when human opment of intellectual capital to protect US
ability (human capital) creates new business critical information infrastructure and infra-
processes (structural capital) resulting in im- structural concept /11/. It should be pointed
proved services for consumers, increasing their out that investment in intellectual capital is the
loyalty (consumer capital). One of the main value that pays off many-fold which is the fact
features of intellectual capital is its intangibil- recognized by the UK whose investments in
ity. Intellectual capital is intangible asset. Intellec- intellectual capital sector in the period between
tual capital is also described as 'hidden asset'. 2011-2012, within which 16 projects, were sup-
Therefore it is often hard to identify and estimate its ported by more than 1,600 000 000 kn /12/.
market value. Tacit (hidden) knowledge is the Some of sub-sets of intellectual capital include
most important source of a company's compet- human capital, information capital, brand
itive advantage because it is 'stored' into the awareness and instructional capital. But its
heads of individuals including the following structure, according to most today's theoreti-
features: great value, scarcity and impossibility cians includes the following: human capital,
to imitate. Each company should try to convert structural (or organizational) capital and rela-
this hidden – tacit knowledge into explicit, tional (or consumer) capital /13/. Intellectual
codified, i.e. materialized knowledge that be- capital is the value of a company or organiza-
ISSN 1330-0067 Coden: IORME7
Krunoslav Antoliš: ICT AND IDENTITY THEFT
356 Informatol. 46, 2013., 4, 353-360

tion's employee knowledge, business training efficient fighting against illegal acts such as
and any proprietary information that can pro- identity fraud. It should be pointed out that
vide the company with a competitive ad- the Convention on Cybercrime adopted in
vantage. Intellectual capital is considered an Budapest on November 23, 2001, released in
asset, and in a broader sense can be defined as ''Narodne novine“ – Međunarodni ugovori«
the collection of all informational resources a br. 9/2002, came into force in the Republic of
company has at its disposal that can be used to Croatia on July 1, 2004, while Additional Pro-
drive profits, gain new customers, create new tocol concerning the criminalisation of acts of a
products, or otherwise improve the business. racist and xenophobic nature committed
Intellectual capital itself, according to some au- through computer systems drawn up in Stras-
thors, is a complex economic category representing bourg on January 28, 2003, released in “
all business factors which are not explicit in tradi- Narodne novine“ – Međunarodni ugovori« br.
tional business analysis, yet, they make additional 4/2008, came into force in the Republic of Croa-
value in an organization considerably influencing tia on November 1, 2008 /15/. According to the
long-term profitability and competitiveness of a new Penal Code of the Republic of Croatia
company. Intellectual property is an important which came into force on January 1, 2013, iden-
component of company's intellectual capital, it is tity theft is not explicitly defined as criminal
entirely materialized, codified knowledge: patents, offence. It does not necessarily mean that in
licences, copyrights, franchises, software, and all the Republic of Croatia identity fraud as a
other materialized value of human capital ICT is criminal offence is not given due attention
as a part of intellectual capital the use of which since it is done under the existing legal provi-
increases synergy between employees and sions which in some aspects provide broader
clients of a company. ICT converts intellectual protection or as good as the one included in
capital into a particular competitive advantage the Convention. An example - in accordance
of each company that recognizes its own intel- with legal provision, Article 266, Prov.1 Chap-
lectual capital as a resource /14/. Finally, ter 25 (criminal offences against computer
knowledge and intellectual capital as intangi- systems, programs and data).
ble assets are becoming a basis of competitive In accordance with Penal Code, Article 266.
advantage of an enterprise. Referring to the Unauthorized access:
last two above mentioned components of intel- (1) Whoever, without authorization accesses
lectual capital, i.e. intellectual asset, it is not the computer systems or data of another shall
hard to conclude that they are recognized and be punished by imprisonment not exceeding
highly ranked as the attack targets of identity one year,“ illegal (unauthorized) access to the
theft since the profit is multifold higher com- computer systems, data or programs is pun-
pared with the profit of other targets attacked ished by imprisonment not exceeding one
by the same method. Considering the above year. It is obvious that regardless of motif or
mentioned, the risk analysis should include a goal, unauthorized access is criminalized. With
high probability degree in the identity fraud regard to criminal offence committed inten-
threat and dedicates a particular segment of tionally, only dolus act is needed (intentional
security policy to the methods and techniques unauthorized access). If the criminal offence
of fighting against such forms of threats. referred to in paragraph 2, of the same Article
is perpetrated (qualified form):
3 International and Croatia's legal framework (2) If the criminal offence referred to in para-
graph 1, of the same Article is committed in
Referring to the international legal framework connection with the computer system or elec-
we could say that the Convention on Cyber- tronic data of a governmental body, local or
crime and the Additional Protocol concerning regional self-governmental bodies a public
the criminalisation of acts of a racist and xeno- institution or a company of special public in-
phobic nature committed through computer terest, the perpetrator shall be punished by
systems make a good legal grounds to harmo- imprisonment not exceeding three years.
nise substantive law provisions which enable However, if the damage is caused to property

ISSN 1330-0067 Coden: IORME7


Krunoslav Antoliš: ICT AND IDENTITY THEFT
Informatol. 46, 2013., 4, 353-360 357

while the perpetrator acts, the perpetrator can (1) “Whoever renders unusable or hinders the
be criminalized for concurrence of offences in work or the use of computer systems, electron-
accordance with Article 235 of the Penal Code: ic data or computer programs or communica-
Inflicting damage to another person's property tion , “ criminalization is directed to rendering
Article 235. unusable or inaccessible other person's com-
(1) Whoever damages, deforms, destroys or puter data or programs or computer commu-
renders unusable another person's property nications.
shall be punished by imprisonment not ex- Criminal offence perpetrated:
ceeding two years. Damage to computer data, Article 268.
(2) The punishment referred to in paragraph 1 (1)“ Whoever without authorization damages,
of this Article shall be inflicted on a perpetra- alters, deletes, destroys or in some other way
tor for unauthorized embellishment of walls, renders unusable or inaccessible the electronic
motor vehicles or other public surfaces Lar- data or computer programs,“ includes unau-
ceny, Article 228 of the Penal Code(3) If the thorized damages and perpetration of all other
criminal offence referred to in paragraph 1 or 2 specified criminal offences rendering the elec-
of this Article is committed from base motives tronic data inaccessible (which refers to the
or caused significant damage, a perpetrator Article 4 of the Convention).
shall be punished by imprisonment for six Description of the criminal offence is more
months to five years. extensive than in the Convention:
(1) Whoever takes away the movable property „Unauthorized interception of computer da-
of another with an aim to unlawfully appro- ta,“ Article 269.
priate it shall be punished by imprisonment (1) „Whoever intercepts or records the non-
for six months to five years. public transmission of electronic data to, with-
(2) If the stolen property is of small value and in or from a computer system, not intended for
the perpetrator acts with an aim to appropriate his use, including the electromagnetic trans-
the property of such value, he shall be pun- missions of data in the computer system, or
ished by imprisonment not exceeding one enables an unauthorized person to access these
year. data,“ as apart from interception it extends to
(3) If the perpetrator returns the stolen proper- unlawful computer program manipulation.
ty to the injured party prior to learning that he The purpose of criminalization in the Article
has been discovered, the court may remit the 269 of the Penal Code is protection of non-
punishment. public, private communication as referred to in
For example, in case of the stolen media itself the Article 3 of the Convention. This provision
(hardware), certain devices such as modems or gives broader protection since it includes third
other media where data are stored or in case of party (a person) who gets access to electronic
destroyed or damaged media. Along with the data. A third party is every person who is not
criminal offence from the Article 266, para- authorized to have access to electronic data
graph 1 of Penal Code, the identity theft can be including electromagnetic transmission of data
recognized in another criminal offence such as into the computer system.
unauthorized access to personal data with the To perpetrate the offence it is enough to enable
aim of fabricating a false document or false data access to a third party regardless whether
credit cards or selling false credit cards via the or not the person is really familiar with the
Internet as well as using other person's card data. A person who was authorized to record
personal data to charge the owner's bank ac- electronic data (e.g. security service and oth-
count for buying goods or withdrawing the ers) shall be punished for this criminal offence
money. Concurrence of offences is possible if the record was passed to a third party. The
with another criminal offence as referred to in criminal offence includes all computer data
the Article 266 of the Penal Code. Furthermore, regardless of the way of their transmission
by provision of the Article 267, paragraph 1, of (email, telephone, fax, etc.). There is a possibil-
the Penal Code Computer system interference, ity of a concurrence of offences with criminal
Article 267, of the Penal Code: offences such as disclosure of personal and

ISSN 1330-0067 Coden: IORME7


Krunoslav Antoliš: ICT AND IDENTITY THEFT
358 Informatol. 46, 2013., 4, 353-360

family conditions: “Unauthorized use of per- The purpose of the provision of the Article 272
sonal data,“ Article 146. of the Penal Code:
(2) Whoever, contrary to the provision referred „Misuse of devices,“ Article 272.
to in the Code, passes personal data from the (1) Whoever produces, procures, sells, pos-
Republic of Croatia for the purpose of further sesses or makes available to another person
processing or releasing or making them acces- special devices, computer programs and elec-
sible to a third party in any other way, or by tronic data created or adapted for the perpetra-
undertaking actions as referred to in the Item 1 tion of the criminal offence referred to in the
of this Article, procures unlawful pecuniary Article 266, the Article 267 and the Article 268,
gain for himself or a third party or causes sig- the Article 269, the Article 270 and the Article
nificant damage, 271 of this Code, with an aim to use them for
“Extortion,“ Article 243. perpetrating some of these offences,“ is to pre-
(1) Whoever, with an aim to procure unlawful vent making and spreading a „black market“
pecuniary gain for himself or a third party, by of the devices and means which are suitable
force or by a serious threat induces another for perpetration of criminal offences as re-
person to do or to omit to do something to the ferred to in the Article 266 to the Article 271 of
detriment of his property or the property of the Penal Code. Although the provision refers
another, or by unauthorized technical record- to the Article 6 provision of the Convention it
ing or eavesdropping. provides more extensive protection. Namely, it
„Unauthorized technical recording or eaves- deals with punishment of intentional unau-
dropping,“ Article 143. thorized act:
(1) Whoever, without authorization audio rec- (2) Whoever produces, procures, sells, pos-
ords non-public spoken words of another per- sesses or makes accessible the computer pass-
son or eavesdrops non-public spoken words of words or other data to access the computer
another person not addressed to him.“ system with the aim of perpetrating criminal
“Unauthorized image recording,“ Article 144. offences referred to in the Article 266, the Arti-
(1) Whoever, without authorization, records cle 267, the Article 268, the Article 269, the
the image of another person in his flat or a Article 270, the Article 271 of the Penal Code, “
space specially protected from views or uses The goal of the above mentioned paragraph is
the image or makes it accessible to a third par- also important.
ty violating the privacy etc. In accordance with the provision of the para-
Furthermore, Article 273. of the Penal Code: graph 4 of this Article further procedure with
“Serious criminal offences against computer such devices and procured data is stipulated as
systems, programs and data.“ Article 273 follows:
(1) If the criminal offense referred to from the (4) Special devices, programs referred to in the
Article 267 to the Article 270 of the Penal Code paragraph 1 of this Article shall be forfeited
is committed in connection with the computer and the data referred to in the paragraphs 1
system or electronic data or computer program and 2 of this Article, shall be destroyed.“
of a governmental body, or regional self- In accordance with provision of the paragraph
governmental body, a public institution or a 4 of the Article 270 of the Penal Code which
company of special public interest,“ provides refers to provisions of the Article 7 of the Con-
more extensive protection since the criminal vention:
offences referred to from the Article 267 to the Computer-related forgery, Article 270:
Article 270 if significant damage is caused, but (1) Whoever, without authorization, develops,
also with regard to special importance of data installs, alters, deletes or makes unusable
for the public government, institution or a computer data or programs that are of signifi-
company of special public interest. It should be cance for legal relations
emphasized that in accordance with legal con- in order for them to be used as authentic, or
cept of the Supreme Court Criminal Depart- whoever uses such data or procures them to be
ment of the Republic of Croatia, significant used“', also provides more extensive protec-
damage exceeds the value of 30.000 kn. tion than the Convention, Namely, protection

ISSN 1330-0067 Coden: IORME7


Krunoslav Antoliš: ICT AND IDENTITY THEFT
Informatol. 46, 2013., 4, 353-360 359

is more extensive as the criminal offence as Infringement of other copyright and related
referred to in the Article 273 is defined as per- rights, Article 286.
petration of criminal offence from the para- From the all afore mentioned, it is obvious that
graph 1 of this Article if significant damage is the identity theft in the Republic of Croatia as a
inflicted in connation with electronic data or criminal offence can be successfully fought
programs of governmental bodies, public insti- against within the existing legal framework.
tutions or companies of particular public inter-
est . 4 Conclusion
Article 272 ensures legal penalty in an early
stage, prior to perpetration of another criminal Identity theft in its various forms is currently
offence. In this case as well, and in accordance becoming frequent criminal offence relying
with the provision of the paragraph 4, Article above all on ICT, since ICT, despite its many
272. devices are forfeited and due to the signif- good sides, has brought its users certain weak-
icance of protected values and gravity of of- nesses i.e. vulnerabilities. Risk analysis of the
fence as referred to in the paragraph 5, whoev- ICT-aided systems is a necessary prerequisite
er attempts to perpetrate the criminal offences for building security policy which must recog-
as referred to in the paragraph 1, shall be pun- nize the identity theft and fraud as objective
ished. and highly ranked threats. Intellectual capital
Provisions of the Article 271 of the Penal Code must be particularly recognized as the future
refer to the provision of the Article 8 of the big target of identity theft apart from all so far
Convention which stipulates Computer fraud: known, as it hides great values in itself and I
(1) Whoever, with an aim to procure unlawful would specially point out the intellectual
pecuniary gain for himself or a third party, property being of particular interest to identity
alters, develops, deletes, damages or in some thieves. Current legal framework in the Re-
other way renders unusable or inaccessible the public of Croatia provides a prerequisite for
electronic data or computer programs of an- efficient fight against identity theft, although it
other,“ also ensures more extensive protection is not explicitly recognized as a criminal of-
that the Convention. Namely, in accordance fence which is the case in some EU and the
with the provision of the paragraph 1, whoev- world states. Therefore, further possibilities of
er perpetrates criminal offence of computer national legislation development should be
fraud will be inflicted particular punishment if reconsidered in an attempt to find better solu-
the criminal offence is perpetrated with the tions, especially in the procedural domain that
only aim to inflict damage to another. So, spe- would strengthen the state machinery in
cial punishment is included for intentional fighting against identity theft and fraud.
inflicting the damage to another as the only
aim. Regardless whether or not unlawful pe- Notes
cuniary gain is procured. In this case, in ac-
cordance with provision in the Article 272, /1/ Matija, Mandarić, Kritičan propust u Skypeu
dovodi u pitanje vašu privatnost, (14.11.2012.),
devices are forfeited.
URL: https://sigurnost.carnet.hr/svijet-o-
Regarding offences related to infringements of
sigurnosti/novosti/ranjivost-u-skypeu/.
copyright and related rights, although the (26.04.2013.).
Convention gives options to choose protection /2/ Zoran, Vlah. Facebook prikuplja brojeve telefo-
through civil and legislative institutions, Croa- na, (01.07.2013.),
tia enables criminal-law protection apart from URL:https://security.carnet.hr/svijet-o-
civil and legal protection of copyright and sigurnosti/novosti/tag/privatnos. (16.04.2013.).
related rights in the following cases: /3/ Matija, Mandarić, Ranjivost u Microsoft Hotmail
Chapter 27: Criminal offences against intellec- i Outlook računima, (17.12.2012.),
https://sigurnost.carnet.hr/svijet-o-
tual property, Violation of personal rights of
sigurnosti/novosti/ranjivost-u-microsoft-
an author or a performing artist, Article 284:
hotmail-i-outlook-racunima/. (14.04.2013.).
Unauthorized use of work of authorship or a /4/ Matija, Mandarić, Amerikancima ukradeno 3,6
performance of a performing artist, Article 285: milijuna identifikacijskih brojeva, (29.10.2012.),
ISSN 1330-0067 Coden: IORME7
Krunoslav Antoliš: ICT AND IDENTITY THEFT
360 Informatol. 46, 2013., 4, 353-360

URL:https://sigurnost.carnet.hr/svijet-o- ne.nn.hr/clanci/medunarodni/2002_07_9_119.h
sigurnosti/novosti/ukradeno-3-6-milijuna- tml.(10.04.2013.).
identifikacijskih-brojeva-americkih-gradjana/. /10/ Penal Code, (2011.), URL:http://narodne-
(15.04.2013.). novi-
/5/ Matija, Mandarić, Ukradeno 47 milijuna dolara s ne.nn.hr/clanci/sluzbeni/2011_11_125_2498.ht
30 tisuća bankovnih računa, (06.12.2012.), ml.(10.04.2013.).
https://sigurnost.carnet.hr/svijet-o- /11/ Gary R. Comstock, The Growing Need for
sigurnosti/novosti/ukradeno-47-milijuna-dolara- Secure Enterprise Search, (2011.),
s-30-tisuca-bankovnih-racuna/. (25.04.2013.). URL:http://www.edatafusion.com/whitepaper
/6/ Američka policija otkrila veliku prijevaru . (02.04.2013.).
tešku više od 200 milijuna dolara, (06.02.2013.), /12/ Marko, Kolaković, Teorija intelektualnog kapitala,
URL:http://www.poslovnipuls.com/2013/02/06 (2013.), URL:http://hrcak.srce.hr/file/40500.
/americka-policija-otkrila-veliku-prijevaru- (21.04.2013.).
tesku-vise-od-200-milijuna-dolara/. /13/ Dragomir, Sundač, Švast, Nataša, Intelektualni
(21.04.2013.). capital, temeljni čimbenik učinkovitosti podu-
/7/ Matija, Mandarić, Phishing zaslužan za gubit- zeća, (2009.),
ke od 658 milijuna dolara, (24.08.2012.), URL:http://eobrazovanje.mingorp.hr/UserDocs
URL:https://sigurnost.carnet.hr/svijet-o- Images/Knjizica_intelektualni_kapital.pdf.
sigurnosti/novosti/phishing-zasluzan-za- (02.04.2013.).
gubitke-preko-658-milijona-dolara/. /14/ Europe 2020: UK National Reform Programme
(21.04.2013.). 2013, (April, 2013),
/8/ Matija, Mandarić, 99% napada omogućeno ne URL:http://ec.europa.eu/europe2020/pdf/nd/nr
redovitim zakrpama, (28.06.2012.), p2013_uk_en.pdf. (07.04.2013.).
https://sigurnost.carnet.hr/svijet-o- /15/ George, W. Bush, National Infrastructure
sigurnosti/novosti/99-napada-omoguceno-ne- Advisory Council, (11. 06. 2006.),
redovitim-zakrpama/. (20.04.2013.). URL:http://www.dhs.gov/xlibrary/assets/niac/
/9/ Convention on Cybercrime, (2002.), URL: niac_workforcereport_transltr.pdf.
http://narodne- (05.04.2013.).
novi-

ISSN 1330-0067 Coden: IORME7

You might also like