"In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime Online uses empirical tests and unique data to provide detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes. This text also includes a comprehensive exploration of cyberterrorism and activism in online environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level"--
1. Situating the problem of cybercrime in a multidisciplinary context / Thomas J. Holt -- 2. The evolution of cybercrime, 2006-2016 / Peter Grabosky -- 3. Cybercrime research at the crossroads : where the field currently stands and innovative strategies to move forward / Adam M. Bossler -- 4. Conducting large-scael analyses of underground hacker communities / Victor Benjamin, Sagar Samtani and Hsinchun Chen -- 5. The evolving nature of nation state malicious online actor relationships / Max Kilger -- 6. Exploring the possibility of 'moral hazard' among victims of identity fraud : the relation between reimbursement for unauthorized cash withdrawals and risky online behavior / Johan Van Wilsem -- 7. Ransomware and cryptocurrency : partners in crime / Gail-Joon Ahn.[et al.] -- 8. Organizational cybervictimization : data breach prevention using a victimological approach / Mark Stockman, Joseph Nedelec and William Mackey -- 9. Sanction threat and friendly persuasion effects on system trespassers' behaviors during a system trespassing event / Hattie Jones, David Maimon and Wuling Ren -- 10. Gendering cybercrime / Alice Hutchings and Yi Ting Chua -- 11. Seeing the forest through the trees : indentifying key players in the online distribution of child sexual exploitation material / Bryce G. Westlake and Richard Frank -- 12. Adaptation strategies of cybercriminals to intervations from public and private sectors / Floor Jansen and Jarmo van Lenthe.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
1. Introduction to Part I – Anita Lavorgna and Thomas J. Holt -- 2. Epistemologies of cyberspace: notes for interdisciplinary research, Anita Lavorgna -- 3. The how and why of cybercrime: the EU as a case study of the role of ideas, interests and institutions as drivers of a security-governance approach, Benjamin Farrand and Helena Carrapico -- 4. Programming the criminologist: developing cyber skills to investigate cybercrime, Ruth McAlister and Fabian Campbell-West -- 5. Profiling and predictions. Challenges in cybercrime research datafication, Bart Custers -- 6. Data-driven technologies in Justice Systems: Intersections of power, data configurations, and knowledge production, Pamela Ugwudike -- 7. Introduction to Part II, Anita Lavorgna and Thomas J. Holt -- 8. The challenges of empirically comparing cybercriminals and traditional offenders, Marleen Weulen Kranenbarg -- 9. Breaking the walls of silence: analyzing criminal investigations to improve our understanding of cybercrime – E. Rutger Leukfeldt and Edward R. Kleemans -- 10. Using digital open source and crowdsourced data in studies of deviance and crime, Rajeev V. Gundur, Mark Berry and Dean Taodang -- 11. Developing open-source databases from online sources to study online and offline phenomena, Emily Ann Greene-Colozzi, Joshua D. Freilich and Steven M. Chermak -- 12. Too much data? Opportunities and challenges of large datasets and cybercrime, Jack Hughes, Yi Ting Chua and Alice Hutchings -- 13. Use of Artificial Intelligence to support cybercrime research, Stuart E. Middleton -- 14. Honeypots for cybercrime research, Robert C. Perkins and C. Jordan Howell -- 15. Social and semantic online networks, Elena Pavan -- 16. Digital ethnography in cybercrime research: some notes from the virtual field, Nicholas Gibbs and Alexandra Hall -- 17. The meme is the method: examining the power of the image within extremist propaganda, Ashton Kingdon -- 18. Introduction to Part III, Anita Lavorgna and Thomas J. Holt -- 19. Researching cybercrime in the European Union: asking the right ethics questions, Francisco J. Castro-Toledo and Fernando Miró-Llinares -- 20. Ethical approaches to studying cybercrime: considerations, practice and experience in the United Kingdom, Brian Pickering, Silke Roth and Craig Webber -- 21. Conducting ethical research with online populations in the United States, Kacy Amory and George Burruss -- 22. Investigating the ethical boundaries for online research in Brazil, Felipe Cardoso Moreira de Oliveira -- 23. Ethics and internet-based cybercrime research in Australia, James Martin -- 24. Researching crime and deviance in Southeast Asia: challenges and ethics when using online data, Lennon Yao-Chung Chang and Souvik Mukherjee -- 25. The ethics of web crawling and web scraping in cybercrime research: navigating issues of consent, privacy and other potential harms associated with automated data collection, Russell Brewer, Bryce Westlake, Tahlia Hart and Omar Arauza -- 26. Does the institution have a plan for that? Researcher safety and the ethics of institutional responsibility, Ashley A. Mattheis and Ashton Kingdon -- 27 Engaging with incels: reflexivity, identity and the female cybercrime ethnographic researcher, Lisa Sugiura -- 28. Personal reflections on researching fraud: challenges surrounding the ethics of "doing", Cassandra Cross -- 29. At the intersection of digital research and sexual violence: insights on gaining informed consent from vulnerable participants, Tully O'Neil -- 30. Concluding thoughts, Anita Lavorgna and Thomas J. Holt.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
It ain't what it is, its the way that they do it? Why we still don't understand cybercrime / Mike McGuire -- Contributions of criminological theory to the understanding of cybercrime offending and victimization / Adam Bossler -- The open and dark web : facilitating cybercrime and technology-enabled offenses / Claudia Flamand and David Décary-Hétu -- Predictors of cybercrime victimization : causal effects or biased associations? / Steve van de Weijer -- Virtual danger : an overview of interpersonal cybercrimes / Jordana Navarro -- Sexual violence in digital society : understanding the human and technosocial factors / Anastasia Powell, Asher Flynn and Nicola Henry -- Cybercrime subcultures : Contextualizing offenders and the nature of the offense / Thomas J. Holt -- On social engineering / Kevin Steinmetz, Richard Goe and Alexandra Pimentel -- Contrasting cyber-dependent and traditional offenders : a comparison on criminological explanations and potential prevention methods / Marleen Weulen Kranenbarg -- Financial cybercrimes and situational crime prevention / Rutger Leukfeldt and Jurjen Jansen -- Modelling cybercrime development : the case of Vietnam / Jonathan Lusthaus -- Humanising the cybercriminal : markets, forums and the carding subculture / Craig Webber and Michael Yip -- The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism / Ryan Scrivens and Maura Conway -- Child sex abuse images and exploitation materials / Roderic Broadhurst -- Policing cybercrime : responding to the growing problem and considering future solutions / Cassandra Dodge and George Burruss -- Responding to individual fraud : Perspectives of the 'Fraud Justice Network' / Cassandra Cross -- The ecology of cybercrime / Benoît Dupont -- Displacing big data : how criminals cheat the system / Alice Hutchings, Sergio Pastrana and Richard Clayton.
This Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences. The constant evolution of technology and our relationship to devices and their misuse creates a complex challenge requiring interdisciplinary knowledge and exploration. This work addresses this need by bringing disparate areas of social science research on cybercrime together. It covers the foundations, history and theoretical aspects of cybercrime, followed by four key sections on the main types of cybercrime: cyber-tresspass, cyber-deception/theft, cyber-porn and obscenity, and cyber-violence, including policy responses to cybercrime. This work will not only demonstrate the current knowledge of cybercrime but also its limitations and directions for future study.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Technology and cybercrime -- Issues in empirical assessments of cybercrime -- Applications of criminological theory to cybercrimes -- Issues in domestic and transnational cybercrime investigation -- Issues in the prevention of cybercrime -- The future of cybercrime and digital forensic research
1. Introduction -- 2. The marketing and sales of stolen data -- 3. The economic impact of stolen data markets -- 4. The social organizations of actors in stolen data markets -- 5. Visualizing the networks of economic transactions and ads in stolen data markets -- 6. Implications and conclusions
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also utilised to examine their sophistication and structure. In doing so, this work will contribute to the development of cybercrime studies, and will appeal to both social and computer scientists alike with an interest in the human aspects of cybercrime. Thomas Holt is an Associate Professor in the School of Criminal Justice, Michigan State University, USA. He has published extensively on cybercrime and cyberterror, and has received multiple grants from the National Institute of Justice and the National Science Foundation to examine malware writers, data thieves, and hackers using on-line data. Olga Smirnova is an Assistant Professor at the MPA program, Political Science Department, East Carolina University, USA. Her research interests include social networks, institutional stability, economic development, performance measurement, and visualizations of complex systems. She teaches various courses at graduate and undergraduate levels, including economic development, public budgeting, and professional papers. Yi Ting Chua is a PhD student in the School of Criminal Justice, Michigan State University, USA. Although gender and criminal justice systems have been her primary interests, she is also interested in how policing, domestic violence, and comparative criminal justice interact with the dynamics between gender and criminal justice.
"This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives; computer hacking and malicious software; digital piracy and intellectual theft; economic crime and online fraud; pornography and online sex crime; cyber-bullying and cyber-stalking; cyber-terrorism and extremism; the rise of the Dark Web; digital forensic investigation and its legal context around the world; the law enforcement response to cybercrime transnationally; cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology"--