Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
Cybercrime is remarkably varied and widespread, and financial losses range from a few hundred dollars being extorted to multi-million dollar cyberfraud cases. Increasingly, cybercrime also involves the risk of terrorist attacks bringing down a major part of the Internet. Countries are discovering that it may be impossible for them to prosecute cybercriminals. Cybercrimes, unlike 'ordinary' crimes, are transnational in nature and it is often difficult to say just where they take place. This causes legal problems, since jurisdiction is usually still confined to the place where the crime was committed. A related issue is to what extent the police can investigate cybercrimes across borders, through the Internet: do they infringe the sovereignty of other countries? This book surveys how these issues in cybercrime jurisdiction are dealt with by countries around the world, including the US, Japan, Korea, India, Brazil, Chile, Australia, New Zealand, Italy, Germany, Belgium, Denmark, and the UK. A score of experts assess how well the laws of their countries and the Cybercrime Convention deal with transnational cybercrime, and how jurisdiction conflicts should be resolved. With this in-depth survey of views and practices of cybercrime jurisdiction, the authors hope to contribute to a more concerted international effort towards effectively fighting cybercrime. The book is therefore highly recommended to policy-makers, members of the judiciary, academics and practitioners. Bert-Jaap Koops is Professor of Regulation & Technology at the Tilburg Institute for Law, Technology, and Society (TILT) of Tilburg University, The Netherlands. Susan W. Brenner is NCR Distinguished Professor of Law & Technology, University of Dayton School of Law, Ohio, US.
This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.
This book explores the extraordinary difficulties a nation-state's law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.
As new technologies develop, terrorist groups are developing new
methods of attack by using the Internet, and by using cyberspace as
a battlefield, it has become increasingly difficult to discover the
identity of attackers and bring them to justice. The seemingly
limitless boundaries of cyberspace has allowed virtually anyone to
launch an attack from a remote and anonymous location. But once
these attacks occur, it raises several important questions; who
should respond, and how?; how should nation-states effectively deal
with a cyber-attack?; and will the United States and other
nation-states be able to survive in a world where virtual
boundaries are limitless?
It is time to arm ourselves with the information we need to remain safe. Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it. Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
|
You may like...
|