|
Showing 1 - 11 of
11 matches in All Departments
This book offers a comprehensive and integrative introduction to
cybercrime. It provides an authoritative synthesis of the disparate
literature on the various types of cybercrime, the global
investigation and detection of cybercrime and the role of digital
information, and the wider role of technology as a facilitator for
social relationships between deviants and criminals. It includes
coverage of: * key theoretical and methodological perspectives; *
computer hacking and malicious software; * digital piracy and
intellectual theft; * economic crime and online fraud; *
pornography and online sex crime; * cyber-bullying and
cyber-stalking; * cyber-terrorism and extremism; * the rise of the
Dark Web; * digital forensic investigation and its legal context
around the world; * the law enforcement response to cybercrime
transnationally; * cybercrime policy and legislation across the
globe. The new edition has been revised and updated, featuring two
new chapters; the first offering an expanded discussion of
cyberwarfare and information operations online, and the second
discussing illicit market operations for all sorts of products on
both the Open and Dark Web. This book includes lively and engaging
features, such as discussion questions, boxed examples of unique
events and key figures in offending, quotes from interviews with
active offenders, and a full glossary of terms. It is supplemented
by a companion website that includes further exercises for students
and instructor resources. This text is essential reading for
courses on cybercrime, cyber-deviancy, digital forensics,
cybercrime investigation, and the sociology of technology.
This book offers a comprehensive and integrative introduction to
cybercrime. It provides an authoritative synthesis of the disparate
literature on the various types of cybercrime, the global
investigation and detection of cybercrime and the role of digital
information, and the wider role of technology as a facilitator for
social relationships between deviants and criminals. It includes
coverage of: * key theoretical and methodological perspectives; *
computer hacking and malicious software; * digital piracy and
intellectual theft; * economic crime and online fraud; *
pornography and online sex crime; * cyber-bullying and
cyber-stalking; * cyber-terrorism and extremism; * the rise of the
Dark Web; * digital forensic investigation and its legal context
around the world; * the law enforcement response to cybercrime
transnationally; * cybercrime policy and legislation across the
globe. The new edition has been revised and updated, featuring two
new chapters; the first offering an expanded discussion of
cyberwarfare and information operations online, and the second
discussing illicit market operations for all sorts of products on
both the Open and Dark Web. This book includes lively and engaging
features, such as discussion questions, boxed examples of unique
events and key figures in offending, quotes from interviews with
active offenders, and a full glossary of terms. It is supplemented
by a companion website that includes further exercises for students
and instructor resources. This text is essential reading for
courses on cybercrime, cyber-deviancy, digital forensics,
cybercrime investigation, and the sociology of technology.
Cybercrimes are often viewed as technical offenses that require
technical solutions, such as antivirus programs or automated
intrusion detection tools. However, these crimes are committed by
individuals or networks of people which prey upon human victims and
are detected and prosecuted by criminal justice personnel. As a
result, human decision-making plays a substantial role in the
course of an offence, the justice response, and policymakers'
attempts to legislate against these crimes. This book focuses on
the human factor in cybercrime: its offenders, victims, and parties
involved in tackling cybercrime. The distinct nature of cybercrime
has consequences for the entire spectrum of crime and raises myriad
questions about the nature of offending and victimization. For
example, are cybercriminals the same as traditional offenders, or
are there new offender types with distinct characteristics and
motives? What foreground and situational characteristics influence
the decision-making process of offenders? Which personal and
situational characteristics provide an increased or decreased risk
of cybercrime victimization? This book brings together leading
criminologists from around the world to consider these questions
and examine all facets of victimization, offending, offender
networks, and policy responses.
Cybercrimes are often viewed as technical offenses that require
technical solutions, such as antivirus programs or automated
intrusion detection tools. However, these crimes are committed by
individuals or networks of people which prey upon human victims and
are detected and prosecuted by criminal justice personnel. As a
result, human decision-making plays a substantial role in the
course of an offence, the justice response, and policymakers'
attempts to legislate against these crimes. This book focuses on
the human factor in cybercrime: its offenders, victims, and parties
involved in tackling cybercrime. The distinct nature of cybercrime
has consequences for the entire spectrum of crime and raises myriad
questions about the nature of offending and victimization. For
example, are cybercriminals the same as traditional offenders, or
are there new offender types with distinct characteristics and
motives? What foreground and situational characteristics influence
the decision-making process of offenders? Which personal and
situational characteristics provide an increased or decreased risk
of cybercrime victimization? This book brings together leading
criminologists from around the world to consider these questions
and examine all facets of victimization, offending, offender
networks, and policy responses.
This edited book promotes and facilitates cybercrime research by
providing a cutting-edge collection of perspectives on the critical
usage of online data across platforms, as well as the
implementation of both traditional and innovative analysis methods.
The accessibility, variety and wealth of data available online
presents substantial opportunities for researchers from different
disciplines to study cybercrimes and, more generally, human
behavior in cyberspace. The unique and dynamic characteristics of
cyberspace often demand cross-disciplinary and cross-national
research endeavors, but disciplinary, cultural and legal
differences can hinder the ability of researchers to collaborate.
This work also provides a review of the ethics associated with the
use of online data sources across the globe. The authors are drawn
from multiple disciplines and nations, providing unique insights
into the value and challenges evident in online data use for
cybercrime scholarship. It is a key text for researchers at the
upper undergraduate level and above.
This book examines the practices of cybercriminals who steal and
sell personal information acquired through various means, including
mass data breaches, to engage in cybercrime and fraud. Using data
from multiple English and Russian language web forums, the authors
identify the range of products sold in these active on-line
marketplaces and the prospective profits earned by these actors.
The social organization of these markets is analysed using
sociological theory to understand the sophistication of the
markets. Social network analyses of the relational networks of
participants are also utilised to examine their sophistication and
structure. In doing so, this work will contribute to the
development of cybercrime studies, and will appeal to both social
and computer scientists alike with an interest in the human aspects
of cybercrime.
Corporate Hacking and Technology-Driven Crime: Social Dynamics and
Implications addresses various aspects of hacking and
technology-driven crime, including the ability to understand
computer-based threats, identify and examine attack dynamics, and
find solutions. Including findings from experts in Criminal
Justice, Business, and Information Technology Security from around
the world, this book presents current research undertakings and
findings in order to find interdisciplinary solutions to the
complex domain of cyber crime and network breaches.
Computers and the Internet play an increasingly pivotal role in
daily life, making it vitally important to understand the dynamics
of cybercrime and those victimized by it. The anthology "Cybercrime
and Criminological Theory: Fundamental Readings on Hacking, Piracy,
Theft, and Harassment" explores the predictors for participation in
various forms of cybercrime and deviance, from common problems like
media piracy, to more distinct offenses such as computer hacking.
Most criminological theories were developed to account for street
crimes, so it is unclear how these theories may apply to virtual
offending. This text provides critical insight into the utility of
multiple theories to account for cybercrimes.
"Cybercrime and Criminological Theory" gives direct insight into
the rates and prevalence of cybercrime offenses using data sets
from populations across the United States. It gives readers a
fundamental understanding of, and appreciation for various forms of
cybercrime, and outlines prospective predictors of both offending
and victimization. The selected readings identify research
questions that must be addressed in order to improve the legal,
technical, and policy responses to cybercrimes.
"Cybercrime and Criminological Theory" begins with an introduction
to cybercrime and virtual criminality. From there, the book offers
five sections featuring seminal and cutting edge works on topics
in:
- Routine Activities Theory
- Deterrence Theory
- Social Learning and Self Control
- General Strain Theory
- Deviant Subcultures
The book uses articles and cutting-edge research in the field to
create a text that is relevant for students at all levels of study,
as well as scholars in criminology, sociology, and information
security. Undergraduate students will gain insight into the value
of various theories to account for victimization and offending, and
learn basic research methods applied by criminologists to assess
crime and victimization. Graduate students benefit from the detail
provided on research methods, measurement, and research questions
that must be addressed to fully understand cybercrimes.
Thomas J. Holt earned his Ph.D. at the University of Missouri,
Saint Louis. He is currently an Associate Professor in the School
of Criminal Justice at Michigan State University. His areas of
research include computer hacking, malware, and the role played by
technology and computer-mediated communications in facilitating
crime and deviance. Dr. Holt is the co-author of "Digital Crime and
Digital Terror," and the co-editor of "Corporate Hacking and
Technology-Driven Crime." He is also the editor of the book
"Cybercrime: Causes, Correlates, and Context." His work has also
been published in numerous academic journals, including "Crime and
Delinquency," "Deviant Behavior," and the "Journal of Criminal
Justice." Dr. Holt received two grants from the U.S. National
Institute of Justice to examine the market for malicious software,
and the social dynamics of carders and on-line data thieves.
Additionally, he is the project lead for the Spartan Devils Chapter
of the Honeynet Project, and directs the MSU Open Source Research
Laboratory, which explores cyber threats around the globe through
on-line research.
This book provides an in-depth exploration of the phenomenon of
hacking from a multidisciplinary perspective that addresses the
social and technological aspects of this unique activity as well as
its impact. What defines the social world of hackers? How do
individuals utilize hacking techniques against corporations,
governments, and the general public? And what motivates them to do
so? This book traces the origins of hacking from the 1950s to today
and provides an in-depth exploration of the ways in which hackers
define themselves, the application of malicious and ethical hacking
techniques, and how hackers' activities are directly tied to the
evolution of the technologies we use every day. Rather than
presenting an overly technical discussion of the phenomenon of
hacking, this work examines the culture of hackers and the
technologies they exploit in an easy-to-understand format.
Additionally, the book documents how hacking can be applied to
engage in various forms of cybercrime, ranging from the creation of
malicious software to the theft of sensitive information and
fraud-acts that can have devastating effects upon our modern
information society. Documents how computer hacking fits into
various forms of cybercrime Describes the subculture of computer
hackers and explains how this social world plays an integral role
in the business of hacking Clarifies the subtle differences between
ethical and malicious hacks Focuses on the non-technical aspects of
computer hacking to enable the reader to better understand the
actors and their motives
|
You may like...
Catan
(16)
R1,150
R889
Discovery Miles 8 890
Harry's House
Harry Styles
CD
(1)
R238
R197
Discovery Miles 1 970
|