"In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime Online uses empirical tests and unique data to provide detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes. This text also includes a comprehensive exploration of cyberterrorism and activism in online environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level"--
1. Situating the problem of cybercrime in a multidisciplinary context / Thomas J. Holt -- 2. The evolution of cybercrime, 2006-2016 / Peter Grabosky -- 3. Cybercrime research at the crossroads : where the field currently stands and innovative strategies to move forward / Adam M. Bossler -- 4. Conducting large-scael analyses of underground hacker communities / Victor Benjamin, Sagar Samtani and Hsinchun Chen -- 5. The evolving nature of nation state malicious online actor relationships / Max Kilger -- 6. Exploring the possibility of 'moral hazard' among victims of identity fraud : the relation between reimbursement for unauthorized cash withdrawals and risky online behavior / Johan Van Wilsem -- 7. Ransomware and cryptocurrency : partners in crime / Gail-Joon Ahn.[et al.] -- 8. Organizational cybervictimization : data breach prevention using a victimological approach / Mark Stockman, Joseph Nedelec and William Mackey -- 9. Sanction threat and friendly persuasion effects on system trespassers' behaviors during a system trespassing event / Hattie Jones, David Maimon and Wuling Ren -- 10. Gendering cybercrime / Alice Hutchings and Yi Ting Chua -- 11. Seeing the forest through the trees : indentifying key players in the online distribution of child sexual exploitation material / Bryce G. Westlake and Richard Frank -- 12. Adaptation strategies of cybercriminals to intervations from public and private sectors / Floor Jansen and Jarmo van Lenthe.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Cybercrimes, or offenses enabled by technology, affect computer systems and people and prove difficult to pursue through traditional criminal justice strategies due to jurisdictional challenges and legal hurdles. As a result, corporations and industry have begun to play a role in mitigating various forms of cybercrime. This article examines what constitutes cybercrime and the successes and limitations of law enforcement in combatting these offenses. I present a detailed discussion of efforts by industry and regulatory bodies to deter cybercrime. Finally, I consider and discuss the risks and challenges that traditional criminal justice system operations face moving forward.
1. Introduction to Part I – Anita Lavorgna and Thomas J. Holt -- 2. Epistemologies of cyberspace: notes for interdisciplinary research, Anita Lavorgna -- 3. The how and why of cybercrime: the EU as a case study of the role of ideas, interests and institutions as drivers of a security-governance approach, Benjamin Farrand and Helena Carrapico -- 4. Programming the criminologist: developing cyber skills to investigate cybercrime, Ruth McAlister and Fabian Campbell-West -- 5. Profiling and predictions. Challenges in cybercrime research datafication, Bart Custers -- 6. Data-driven technologies in Justice Systems: Intersections of power, data configurations, and knowledge production, Pamela Ugwudike -- 7. Introduction to Part II, Anita Lavorgna and Thomas J. Holt -- 8. The challenges of empirically comparing cybercriminals and traditional offenders, Marleen Weulen Kranenbarg -- 9. Breaking the walls of silence: analyzing criminal investigations to improve our understanding of cybercrime – E. Rutger Leukfeldt and Edward R. Kleemans -- 10. Using digital open source and crowdsourced data in studies of deviance and crime, Rajeev V. Gundur, Mark Berry and Dean Taodang -- 11. Developing open-source databases from online sources to study online and offline phenomena, Emily Ann Greene-Colozzi, Joshua D. Freilich and Steven M. Chermak -- 12. Too much data? Opportunities and challenges of large datasets and cybercrime, Jack Hughes, Yi Ting Chua and Alice Hutchings -- 13. Use of Artificial Intelligence to support cybercrime research, Stuart E. Middleton -- 14. Honeypots for cybercrime research, Robert C. Perkins and C. Jordan Howell -- 15. Social and semantic online networks, Elena Pavan -- 16. Digital ethnography in cybercrime research: some notes from the virtual field, Nicholas Gibbs and Alexandra Hall -- 17. The meme is the method: examining the power of the image within extremist propaganda, Ashton Kingdon -- 18. Introduction to Part III, Anita Lavorgna and Thomas J. Holt -- 19. Researching cybercrime in the European Union: asking the right ethics questions, Francisco J. Castro-Toledo and Fernando Miró-Llinares -- 20. Ethical approaches to studying cybercrime: considerations, practice and experience in the United Kingdom, Brian Pickering, Silke Roth and Craig Webber -- 21. Conducting ethical research with online populations in the United States, Kacy Amory and George Burruss -- 22. Investigating the ethical boundaries for online research in Brazil, Felipe Cardoso Moreira de Oliveira -- 23. Ethics and internet-based cybercrime research in Australia, James Martin -- 24. Researching crime and deviance in Southeast Asia: challenges and ethics when using online data, Lennon Yao-Chung Chang and Souvik Mukherjee -- 25. The ethics of web crawling and web scraping in cybercrime research: navigating issues of consent, privacy and other potential harms associated with automated data collection, Russell Brewer, Bryce Westlake, Tahlia Hart and Omar Arauza -- 26. Does the institution have a plan for that? Researcher safety and the ethics of institutional responsibility, Ashley A. Mattheis and Ashton Kingdon -- 27 Engaging with incels: reflexivity, identity and the female cybercrime ethnographic researcher, Lisa Sugiura -- 28. Personal reflections on researching fraud: challenges surrounding the ethics of "doing", Cassandra Cross -- 29. At the intersection of digital research and sexual violence: insights on gaining informed consent from vulnerable participants, Tully O'Neil -- 30. Concluding thoughts, Anita Lavorgna and Thomas J. Holt.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
The growth of electronic commerce and malicious software tools designed to compromise various payment systems and computer networks has led to concurrent increase in data breaches, phishing, and hacking incidents targeting sensitive financial information. As a function of this increase, an underground market economy has developed around the sale of consumers' bank account details and other financial information. Recent research examining data markets operating on the Open Web demonstrate their basic functions and distribution of information sold. Emerging evidence suggests markets are now operating on the "Dark Web," or encrypted web sites operating on Tor-based networks. Little research to date has compared the distribution of victim nations in stolen data markets nor examined any variations between Open and Dark Web operations. This study utilizes a rational choice framework to examine this gap using a sample of 18 forums and 15 shops hosted on the Open Web and Tor. Using statistical analyses to examining the geography of victimization, this study provides a preliminary test of the applicability of rational choice theory to market operations.
It ain't what it is, its the way that they do it? Why we still don't understand cybercrime / Mike McGuire -- Contributions of criminological theory to the understanding of cybercrime offending and victimization / Adam Bossler -- The open and dark web : facilitating cybercrime and technology-enabled offenses / Claudia Flamand and David Décary-Hétu -- Predictors of cybercrime victimization : causal effects or biased associations? / Steve van de Weijer -- Virtual danger : an overview of interpersonal cybercrimes / Jordana Navarro -- Sexual violence in digital society : understanding the human and technosocial factors / Anastasia Powell, Asher Flynn and Nicola Henry -- Cybercrime subcultures : Contextualizing offenders and the nature of the offense / Thomas J. Holt -- On social engineering / Kevin Steinmetz, Richard Goe and Alexandra Pimentel -- Contrasting cyber-dependent and traditional offenders : a comparison on criminological explanations and potential prevention methods / Marleen Weulen Kranenbarg -- Financial cybercrimes and situational crime prevention / Rutger Leukfeldt and Jurjen Jansen -- Modelling cybercrime development : the case of Vietnam / Jonathan Lusthaus -- Humanising the cybercriminal : markets, forums and the carding subculture / Craig Webber and Michael Yip -- The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism / Ryan Scrivens and Maura Conway -- Child sex abuse images and exploitation materials / Roderic Broadhurst -- Policing cybercrime : responding to the growing problem and considering future solutions / Cassandra Dodge and George Burruss -- Responding to individual fraud : Perspectives of the 'Fraud Justice Network' / Cassandra Cross -- The ecology of cybercrime / Benoît Dupont -- Displacing big data : how criminals cheat the system / Alice Hutchings, Sergio Pastrana and Richard Clayton.
This Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences. The constant evolution of technology and our relationship to devices and their misuse creates a complex challenge requiring interdisciplinary knowledge and exploration. This work addresses this need by bringing disparate areas of social science research on cybercrime together. It covers the foundations, history and theoretical aspects of cybercrime, followed by four key sections on the main types of cybercrime: cyber-tresspass, cyber-deception/theft, cyber-porn and obscenity, and cyber-violence, including policy responses to cybercrime. This work will not only demonstrate the current knowledge of cybercrime but also its limitations and directions for future study.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Technology and cybercrime -- Issues in empirical assessments of cybercrime -- Applications of criminological theory to cybercrimes -- Issues in domestic and transnational cybercrime investigation -- Issues in the prevention of cybercrime -- The future of cybercrime and digital forensic research