|
Part I Fundamentals of Cybercrime |
|
|
|
1 Cybercrime: Introduction, Motivation and Methods |
|
|
3 | (24) |
|
|
3 | (6) |
|
|
3 | (4) |
|
1.2.2 Contemporary Cybercrime |
|
|
7 | (1) |
|
1.2.3 Terrestrial Crimes Versus Cybercrimes |
|
|
7 | (1) |
|
1.2.4 Cybercrime and White Collar Crime |
|
|
8 | (1) |
|
1.2 The Scale of the Problem and Reasons for the Growth of Cybercrime |
|
|
9 | (6) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.2.4 Asia/Pacific---Japan (APJ) |
|
|
13 | (2) |
|
1.2 Profiling Cybercriminals |
|
|
15 | (5) |
|
1.2.1 Motives of the Cybercriminal |
|
|
15 | (1) |
|
1.2.2 How Cybercriminals Use the Network |
|
|
15 | (1) |
|
1.2.3 Types of Cyber Criminals |
|
|
16 | (4) |
|
1.2 Challenges for Criminal Justice and Law Enforcement |
|
|
20 | (1) |
|
1.2.1 Transnational Legal Jurisdictions |
|
|
20 | (1) |
|
1.2.2 Evidence Identification and Tracking |
|
|
20 | (1) |
|
1.2.3 Tactics for Evasion |
|
|
21 | (1) |
|
1.2 The Future of Cybercrime |
|
|
21 | (1) |
|
|
22 | (5) |
|
|
23 | (4) |
|
Part II Computer System as Target |
|
|
|
2 Unauthorized Access Offences in Cyberworld |
|
|
27 | (12) |
|
2.2 Emerging Threats: Expected Targets and Forms |
|
|
27 | (2) |
|
|
29 | (5) |
|
|
29 | (3) |
|
|
32 | (2) |
|
2.2 Other Offences Associated with Hacking |
|
|
34 | (3) |
|
2.2.1 Unauthorized Modification of Computer Programs or Data |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
37 | (2) |
|
3 Injection of Malicious Code in Application |
|
|
39 | (16) |
|
|
39 | (1) |
|
3.2 Types of Malicious Code |
|
|
40 | (3) |
|
3.2.1 File Infector Viruses |
|
|
40 | (1) |
|
3.2.2 Boot Sector Viruses |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
3.2 Threats Posed by Viruses, Worms, and Trojan Horses |
|
|
43 | (4) |
|
3.2.1 Data Corruption and Loss |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
3.2.4 The Number of Threats |
|
|
46 | (1) |
|
3.2 Legislative Approaches |
|
|
47 | (3) |
|
3.2.1 The American Approach |
|
|
47 | (1) |
|
3.2.2 The Council of Europe Convention on Cybercrime |
|
|
48 | (2) |
|
|
50 | (5) |
|
|
51 | (4) |
|
Part III Computer System as Tool |
|
|
|
4 Attempts and Impact of Phishing in Cyberworld |
|
|
55 | (10) |
|
4.2 The Problem of Phishing |
|
|
55 | (1) |
|
4.2 Impact and Harm Generated by Phishing |
|
|
56 | (2) |
|
4.2 Mechanisms of Cyberspace Phishing |
|
|
58 | (3) |
|
|
58 | (1) |
|
4.2.2 Rod---and---Reel Method |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
4.2 Using Stolen Financial Information |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (2) |
|
|
63 | (2) |
|
5 Sexual Harassment in Cyberworld |
|
|
65 | (16) |
|
|
65 | (1) |
|
5.2 Harassment in Cyberworld |
|
|
66 | (2) |
|
5.2 Cases and Prevalence of Sexual Harassment in Cyberspace |
|
|
68 | (1) |
|
|
69 | (1) |
|
5.2.1 The International Stalker |
|
|
69 | (1) |
|
5.2.2 The Anonymous Stalker |
|
|
69 | (1) |
|
|
70 | (4) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
5.2.2 Education of Internet Users |
|
|
75 | (1) |
|
5.2.3 Internet Service Providers |
|
|
75 | (1) |
|
5.2 Prevention of Sexual Harassment on the Internet |
|
|
75 | (2) |
|
5.2.1 Legislation and Law Enforcement |
|
|
76 | (1) |
|
5.2.2 Changing the Culture and Norms |
|
|
76 | (1) |
|
5.2.3 Educating Potential Victims and Harassers |
|
|
76 | (1) |
|
|
77 | (4) |
|
|
77 | (4) |
|
Part IV Content-Related Offenses |
|
|
|
6 Online Obscenity and Child Sexual Abuse |
|
|
81 | (16) |
|
|
81 | (1) |
|
6.2 The Role of the Internet in Promoting Child Sexual Abuse |
|
|
82 | (4) |
|
6.2.1 Production of Pornographic Content |
|
|
83 | (1) |
|
6.2.2 Distribution and Sharing |
|
|
83 | (3) |
|
6.2.3 Consumption of Pornographic Content |
|
|
86 | (1) |
|
6.2 Criminal Offenses Against Children |
|
|
86 | (5) |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
89 | (1) |
|
6.2.4 Exposure to Online Obscenity |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
92 | (5) |
|
|
93 | (4) |
|
Part V Privacy, Security and Crime Control |
|
|
|
7 Anonymity, Privacy and Security Issues in Cyberworld |
|
|
97 | (16) |
|
|
97 | (1) |
|
7.2 Anonymity in Cyberspace |
|
|
98 | (3) |
|
|
98 | (1) |
|
|
99 | (1) |
|
7.2.3 Anonymity, Privacy and Freedom of Speech |
|
|
99 | (2) |
|
7.2 Impact and Harm Generated by Anonymity |
|
|
101 | (2) |
|
7.2 Regulating Anonymity in Cyberspace |
|
|
103 | (5) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
7.2 The Appropriate Balance |
|
|
109 | (1) |
|
|
109 | (4) |
|
|
110 | (3) |
|
8 Strategies and Statutes for Prevention of Cybercrime |
|
|
113 | (16) |
|
|
113 | (1) |
|
8.2 National and Regional Strategies: The European Approach |
|
|
114 | (4) |
|
8.2.1 The Council of Europe Convention on Cybercrime |
|
|
115 | (3) |
|
8.2 The American Response |
|
|
118 | (6) |
|
8.2.1 Communication Interference Statute |
|
|
118 | (1) |
|
8.2.2 The Stored Communications Act (SCA) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
8.2.6 Other Federal Statutes Related to Cyber Security |
|
|
121 | (3) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (4) |
|
|
126 | (3) |
|
9 419 Scam: An Evaluation of Cybercrime and Criminal Code in Nigeria |
|
|
129 | (16) |
|
9.2 The Meaning of 419 Scam |
|
|
129 | (1) |
|
9.2 The Operation of the Scheme |
|
|
130 | (1) |
|
9.2 The Nature and Extent of the Problem |
|
|
131 | (1) |
|
9.2 Evaluation of the Current Situation in Nigeria |
|
|
132 | (1) |
|
9.2 419 Scam Combating Efforts in Nigeria |
|
|
133 | (9) |
|
9.2.1 Legislative Approaches |
|
|
133 | (4) |
|
9.2.2 Administrative Measures |
|
|
137 | (3) |
|
|
140 | (2) |
|
9.2 The Quest for Legislative Harmonisation |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (2) |
|
|
144 | (1) |
Appendix |
|
145 | |