|
Showing 1 - 6 of
6 matches in All Departments
This book explores the extraordinary difficulties a nation-state's
law enforcement and military face in attempting to prevent
cyber-attacks. In the wake of recent assaults including the denial
of service attack on Estonia in 2007 and the widespread use of the
Zeus Trojan Horse software, Susan W. Brenner explores how
traditional categories and procedures inherent in law enforcement
and military agencies can obstruct efforts to respond to
cyberthreats. Brenner argues that the use of a territorially-based
system of sovereignty to combat cyberthreats is ineffective, as
cyberspace erodes the import of territory. This problem is
compounded by the nature of cybercrime as a continually evolving
phenomenon driven by rapid and complex technological change.
Following an evaluation of the efficacy of the nation-state, the
book goes on to explore how individuals and corporations could be
integrated into a more decentralized, distributed system of
cyberthreat control. Looking at initiatives in Estonia and Sweden
which have attempted to incorporate civilians into their
cyber-response efforts, Brenner suggests that civilian involvement
may mediate the rigid hierarchies that exist among formal agencies
and increase the flexibility of any response. This book will be of
great interest to students and researchers of information
technological law and security studies.
This book explores the extraordinary difficulties a nation-state's
law enforcement and military face in attempting to prevent
cyber-attacks. In the wake of recent assaults including the denial
of service attack on Estonia in 2007 and the widespread use of the
Zeus Trojan Horse software, Susan W. Brenner explores how
traditional categories and procedures inherent in law enforcement
and military agencies can obstruct efforts to respond to
cyberthreats. Brenner argues that the use of a territorially-based
system of sovereignty to combat cyberthreats is ineffective, as
cyberspace erodes the import of territory. This problem is
compounded by the nature of cybercrime as a continually evolving
phenomenon driven by rapid and complex technological change.
Following an evaluation of the efficacy of the nation-state, the
book goes on to explore how individuals and corporations could be
integrated into a more decentralized, distributed system of
cyberthreat control. Looking at initiatives in Estonia and Sweden
which have attempted to incorporate civilians into their
cyber-response efforts, Brenner suggests that civilian involvement
may mediate the rigid hierarchies that exist among formal agencies
and increase the flexibility of any response. This book will be of
great interest to students and researchers of information
technological law and security studies.
Cybercrime is remarkably varied and widespread, and financial
losses range from a few hundred dollars being extorted to
multi-million dollar cyberfraud cases. Increasingly, cybercrime
also involves the risk of terrorist attacks bringing down a major
part of the Internet. Countries are discovering that it may be
impossible for them to prosecute cybercriminals. Cybercrimes,
unlike 'ordinary' crimes, are transnational in nature and it is
often difficult to say just where they take place. This causes
legal problems, since jurisdiction is usually still confined to the
place where the crime was committed. A related issue is to what
extent the police can investigate cybercrimes across borders,
through the Internet: do they infringe the sovereignty of other
countries? This book surveys how these issues in cybercrime
jurisdiction are dealt with by countries around the world,
including the US, Japan, Korea, India, Brazil, Chile, Australia,
New Zealand, Italy, Germany, Belgium, Denmark, and the UK. A score
of experts assess how well the laws of their countries and the
Cybercrime Convention deal with transnational cybercrime, and how
jurisdiction conflicts should be resolved. With this in-depth
survey of views and practices of cybercrime jurisdiction, the
authors hope to contribute to a more concerted international effort
towards effectively fighting cybercrime. The book is therefore
highly recommended to policy-makers, members of the judiciary,
academics and practitioners. Bert-Jaap Koops is Professor of
Regulation & Technology at the Tilburg Institute for Law,
Technology, and Society (TILT) of Tilburg University, The
Netherlands. Susan W. Brenner is NCR Distinguished Professor of Law
& Technology, University of Dayton School of Law, Ohio, US.
The exponential increase in cybercrimes in the past decade has
raised new issues and challenges for law and law enforcement. Based
on case studies drawn from her work as a lawyer, Susan W. Brenner
identifies a diverse range of cybercrimes, including crimes that
target computers (viruses, worms, Trojan horse programs, malware
and DDoS attacks) and crimes in which the computer itself is used
as a tool (cyberstalking, cyberextortion, cybertheft, and
embezzlement). Illuminating legal issues unique to investigations
in a digital environment, Brenner examines both national law
enforcement agencies and transnational crime, and shows how
cyberspace erodes the functional and empirical differences that
have long distinguished crime from terrorism and both from warfare.
It is time to arm ourselves with the information we need to remain
safe. Cybercrime: Criminal Threats from Cyberspace is intended to
explain two things: what cybercrime is and why the average citizen
should care about it. To accomplish that task, the book offers an
overview of cybercrime and an in-depth discussion of the legal and
policy issues surrounding it. Enhancing her narrative with
real-life stories, author Susan W. Brenner traces the rise of
cybercrime from mainframe computer hacking in the 1950s to the
organized, professional, and often transnational cybercrime that
has become the norm in the 21st century. She explains the many
different types of computer-facilitated crime, including identity
theft, stalking, extortion, and the use of viruses and worms to
damage computers, and outlines and analyzes the challenges
cybercrime poses for law enforcement officers at the national and
international levels. Finally, she considers the inherent tension
between improving law enforcement's ability to pursue
cybercriminals and protecting the privacy of U.S. citizens.
This fascinating and timely book traces the emergence and evolution
of cybercrime as an increasingly intransigent threat to society.
Cybercrime: Criminal Threats from Cyberspace is intended to explain
two things: what cybercrime is and why the average citizen should
care about it. To accomplish that task, the book offers an overview
of cybercrime and an in-depth discussion of the legal and policy
issues surrounding it. Enhancing her narrative with real-life
stories, author Susan W. Brenner traces the rise of cybercrime from
mainframe computer hacking in the 1950s to the organized,
professional, and often transnational cybercrime that has become
the norm in the 21st century. She explains the many different types
of computer-facilitated crime, including identity theft, stalking,
extortion, and the use of viruses and worms to damage computers,
and outlines and analyzes the challenges cybercrime poses for law
enforcement officers at the national and international levels.
Finally, she considers the inherent tension between improving law
enforcement's ability to pursue cybercriminals and protecting the
privacy of U.S. citizens.
|
You may like...
It: Chapter 1
Bill Skarsgård
Blu-ray disc
R111
Discovery Miles 1 110
Not available
|