Muutke küpsiste eelistusi

E-raamat: Cybercrime, Digital Forensics and Jurisdiction

  • Formaat - PDF+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset.

The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
Part I Fundamentals of Cybercrime
1 Cybercrime: Introduction, Motivation and Methods
3(24)
1.2 Introduction
3(6)
1.2.1 Definition
3(4)
1.2.2 Contemporary Cybercrime
7(1)
1.2.3 Terrestrial Crimes Versus Cybercrimes
7(1)
1.2.4 Cybercrime and White Collar Crime
8(1)
1.2 The Scale of the Problem and Reasons for the Growth of Cybercrime
9(6)
1.2.1 United States
10(1)
1.2.2 United Kingdom
11(1)
1.2.3 Middle East
12(1)
1.2.4 Asia/Pacific---Japan (APJ)
13(2)
1.2 Profiling Cybercriminals
15(5)
1.2.1 Motives of the Cybercriminal
15(1)
1.2.2 How Cybercriminals Use the Network
15(1)
1.2.3 Types of Cyber Criminals
16(4)
1.2 Challenges for Criminal Justice and Law Enforcement
20(1)
1.2.1 Transnational Legal Jurisdictions
20(1)
1.2.2 Evidence Identification and Tracking
20(1)
1.2.3 Tactics for Evasion
21(1)
1.2 The Future of Cybercrime
21(1)
1.2 Summary
22(5)
References
23(4)
Part II Computer System as Target
2 Unauthorized Access Offences in Cyberworld
27(12)
2.2 Emerging Threats: Expected Targets and Forms
27(2)
2.2 Criminal Statues
29(5)
2.2.1 United States
29(3)
2.2.2 United Kingdom
32(2)
2.2 Other Offences Associated with Hacking
34(3)
2.2.1 Unauthorized Modification of Computer Programs or Data
34(2)
2.2.2 Computer Viruses
36(1)
2.2 Summary
37(2)
References
37(2)
3 Injection of Malicious Code in Application
39(16)
3.2 Introduction
39(1)
3.2 Types of Malicious Code
40(3)
3.2.1 File Infector Viruses
40(1)
3.2.2 Boot Sector Viruses
41(1)
3.2.3 Macro Viruses
41(1)
3.2.4 Worms
42(1)
3.2.5 Trojan Horses
42(1)
3.2 Threats Posed by Viruses, Worms, and Trojan Horses
43(4)
3.2.1 Data Corruption and Loss
43(1)
3.2.2 Data Theft
44(1)
3.2.3 Stuxnet Worm
45(1)
3.2.4 The Number of Threats
46(1)
3.2 Legislative Approaches
47(3)
3.2.1 The American Approach
47(1)
3.2.2 The Council of Europe Convention on Cybercrime
48(2)
3.2 Summary
50(5)
References
51(4)
Part III Computer System as Tool
4 Attempts and Impact of Phishing in Cyberworld
55(10)
4.2 The Problem of Phishing
55(1)
4.2 Impact and Harm Generated by Phishing
56(2)
4.2 Mechanisms of Cyberspace Phishing
58(3)
4.2.1 Dragnet Method
58(1)
4.2.2 Rod---and---Reel Method
58(1)
4.2.3 Lobsterpot Method
59(1)
4.2.4 Gillnet Phishing
59(1)
4.2.5 Political Phishing
60(1)
4.2 Using Stolen Financial Information
61(1)
4.2 Customer Vigilance
62(1)
4.2 Summary
63(2)
References
63(2)
5 Sexual Harassment in Cyberworld
65(16)
5.2 Introduction
65(1)
5.2 Harassment in Cyberworld
66(2)
5.2 Cases and Prevalence of Sexual Harassment in Cyberspace
68(1)
5.2 Enforcement Problems
69(1)
5.2.1 The International Stalker
69(1)
5.2.2 The Anonymous Stalker
69(1)
5.2 Legal Regulation
70(4)
5.2.1 United States
71(2)
5.2.2 United Kingdom
73(1)
5.2 Non Legal Regulation
74(1)
5.2.1 Software
74(1)
5.2.2 Education of Internet Users
75(1)
5.2.3 Internet Service Providers
75(1)
5.2 Prevention of Sexual Harassment on the Internet
75(2)
5.2.1 Legislation and Law Enforcement
76(1)
5.2.2 Changing the Culture and Norms
76(1)
5.2.3 Educating Potential Victims and Harassers
76(1)
5.2 Summary
77(4)
References
77(4)
Part IV Content-Related Offenses
6 Online Obscenity and Child Sexual Abuse
81(16)
6.2 Introduction
81(1)
6.2 The Role of the Internet in Promoting Child Sexual Abuse
82(4)
6.2.1 Production of Pornographic Content
83(1)
6.2.2 Distribution and Sharing
83(3)
6.2.3 Consumption of Pornographic Content
86(1)
6.2 Criminal Offenses Against Children
86(5)
6.2.1 Cybering
86(2)
6.2.2 Online Grooming
88(1)
6.2.3 Age Play
89(1)
6.2.4 Exposure to Online Obscenity
89(2)
6.2 Minimizing Risks
91(1)
6.2 Where Next?
92(5)
References
93(4)
Part V Privacy, Security and Crime Control
7 Anonymity, Privacy and Security Issues in Cyberworld
97(16)
7.2 Introduction
97(1)
7.2 Anonymity in Cyberspace
98(3)
7.2.1 True Anonymity
98(1)
7.2.2 Pseudo-Anonymity
99(1)
7.2.3 Anonymity, Privacy and Freedom of Speech
99(2)
7.2 Impact and Harm Generated by Anonymity
101(2)
7.2 Regulating Anonymity in Cyberspace
103(5)
7.2 The Case Law
108(1)
7.2.1 Al Farhan Case
108(1)
7.2.2 Bin Saleh Case
108(1)
7.2 The Appropriate Balance
109(1)
7.2 Summary
109(4)
References
110(3)
8 Strategies and Statutes for Prevention of Cybercrime
113(16)
8.2 Introduction
113(1)
8.2 National and Regional Strategies: The European Approach
114(4)
8.2.1 The Council of Europe Convention on Cybercrime
115(3)
8.2 The American Response
118(6)
8.2.1 Communication Interference Statute
118(1)
8.2.2 The Stored Communications Act (SCA)
118(1)
8.2.3 Wiretap Act
119(1)
8.2.4 Wire Fraud Statute
120(1)
8.2.5 Can-Spam Act
121(1)
8.2.6 Other Federal Statutes Related to Cyber Security
121(3)
8.2 Technical Approach
124(1)
8.2 The Future
125(1)
8.2 Summary
125(4)
References
126(3)
9 419 Scam: An Evaluation of Cybercrime and Criminal Code in Nigeria
129(16)
9.2 The Meaning of 419 Scam
129(1)
9.2 The Operation of the Scheme
130(1)
9.2 The Nature and Extent of the Problem
131(1)
9.2 Evaluation of the Current Situation in Nigeria
132(1)
9.2 419 Scam Combating Efforts in Nigeria
133(9)
9.2.1 Legislative Approaches
133(4)
9.2.2 Administrative Measures
137(3)
9.2.3 Technical Measures
140(2)
9.2 The Quest for Legislative Harmonisation
142(1)
9.2 Future Trends
143(1)
9.2 Summary
143(2)
References
144(1)
Appendix 145