Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
1810 Ergebnisse
Sortierung:
In: Global Viewpoints Ser.
Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Introduction -- Chapter 1 Vulnerability to Cybercrime -- Viewpoint 1 Increased Internet Access in South Africa Makes It More Vulnerable to Cybercrime -- Viewpoint 2 In Singapore, Young Adult Males Are Especially Vulnerable to Cybercrime -- Viewpoint 3 Women Are Especially Vulnerable to Cybercrime in Pakistan -- Viewpoint 4 Cybercrime Concerns Grow in China -- Viewpoint 5 Canadian Banks Look To Insurance To Decrease Vulnerability to Cybercrime -- Periodical and Internet Sources Bibliography -- Chapter 2 Law and Cybercrime -- Viewpoint 1 Thailand's Cybercrime Law Stifles Freedom of Speech -- ViewPoint 2 France's Cybercrime Laws May Threaten Internet Freedom -- Viewpoint 3 Iraq's Cybercrime Law Stifles Freedom of Speech -- Viewpoint 4 Weak Ukrainian Laws Allow Cybercrime to Proliferate -- Viewpoint 5 Weak Laws in Nigeria Allow Cybercrime to Proliferate -- Viewpoint 6 In Australia, Combating Cybercrime Should Begin by Supporting and Funding Existing Organizations -- Periodical and Internet Sources Bibliography -- Chapter 3 Organized Crime and Cybercrime -- Viewpoint 1 Russians Cybercrime Thrives as Soviet-Era Schools Spawn Hackers -- Viewpoint 2 Worldwide, Cybercrime is Commited by Organized Crime Members, Not By Hackers -- Viewpoint 3 In Mexico, Drug Cartels Are Moving into Cybercrime -- Viewpoint 4 In India, Cybercrime is Becoming Increasingly Organized and Professional -- Viewpoint 5 Eastern European Organized Cybercrime Rings Prey on Victims Worldwide -- Periodical and Internet Sources Bibliography -- Chapter 4 Cyber Espionage and Cyberterrorism -- Viewpoint 1 Worldwide, State-supported Cyber Espionage is a Growing Danger -- Viewpoint 2 The United States and Israel Launched a Cyber Attack Upon Iran
In: Crime Science Ser
Cover -- Title Page -- Copyright -- Contents -- Cybercrime -- Chapter 1: What is Cybercrime? -- Chapter 2: In the Lab -- Chapter 3: Computer Hacking -- Chapter 4: Infecting Computers -- Chapter 5: Spamming -- Chapter 6: Fraud on the Web -- Chapter 7: Online Bullies -- The Future of Cybercrime -- Glossary -- For More Information -- Index -- Back Cover
In: Keynotes in criminology and criminal justice series
Acknowledgments -- About the author -- Preface -- Introduction -- A brief history of cybercrime -- A typology of computer crime -- Cybercrime explained -- Incidence, prevalence, distribution, and impacts -- Trends in cybercrime -- Investigation, prosecution, and sentencing -- Conclusion: the future of cybercrime and its control -- Endnotes -- References -- Appendix: useful websites relating to cybercrime -- Index
In: Current Controversies Ser
Cover -- Half Title -- Title -- Copyright -- Contents -- Foreword -- Introduction -- Chapter 1: Does Cybercrime Pose a Serious Problem for US Security? -- Cyber Attacks Likely to Increase -- Cyberwar is Already Upon Us -- The Private Sector is at Risk for Cyberattacks -- Cyberattacks Could Result in Damage Similar to Natural Disasters -- Think Again: Cyberwar -- The Risk of Cyberattacks is Exaggerated -- Chapter 2: is Cybercrime Against Individuals a Serious Problem? -- Overview: Hacking Tops List of Crimes Americans Worry about Most -- Cyberattacks to Steal Customer Information are a Serious Problem -- Online Sexual Predators are a Serious Problem -- Concerns about Cyberattacks are Often Driven by Misinformation -- Online Sexual Predators are not a Serious Problem -- Chapter 3: How Should US Cybersecurity be Improved? -- Overview: Cybersecurity Issues and Challenges -- An International Approach is Needed to Combat Cybercrime -- Stuxnet and the Dangers of Cyberwar -- Ethical Questions Need to be Answered about Cyberweapons -- Why Aren't We Retaliating Right Now for the Sony Cyberattack? -- The United States Must Stay on the Offensive for Cybersecurity -- Cult of the Cyber Offensive -- Chapter 4: What Should be Done to Protect Internet Users from Cybercrime? -- Overview: Public Opinion on Security and Privacy -- The Cybersecurity Information Sharing Act Should be Passed -- The Cybersecurity Information Sharing Act Should not be Passed -- Websites Should not be Blocked to Protect Copyright -- Copyright Must be Protected on the Internet -- SOPA: A Bad Solution to a Very Real Problem -- Incentives Must be Created to Reduce Internet Piracy -- Organizations to Contact -- Bibliography -- Index -- Back Cover
In: Law, Crime and Law Enforcement
Intro -- CYBERCRIME CONCEPTUALIZED AND CODIFIED -- CYBERCRIME CONCEPTUALIZED AND CODIFIED -- CONTENTS -- PREFACE -- Chapter 1 CYBERCRIME: CONCEPTUAL ISSUES FOR CONGRESS AND U.S. LAW ENFORCEMENT* -- Summary -- Background -- Conceptualizing Cybercrime -- Where: Location of Criminal Activities, Actors, and Victims -- Technology: Cyber vs. Real World Crime -- Borders and Cyberspace -- Conceptualizing Cyberspace -- Why: Motivation -- Blurring Lines between Cybercrime and Related Threats -- Organized Criminals in Cyberspace-A National Security Threat -- Cyber Espionage-Profit vs. State Direction -- Cyber Warfare -- Who: Attribution -- Case Study: Anonymous -- Government Definitions and Agency Focus -- Is a Definition Needed? -- Strategies and Cybercrime -- Measuring and Tracking Cybercrime -- Self-Reporting Cybercrime Victimization -- Moving Forward -- Appendix: Existing Strategies and Cybercrime -- Department of Defense Strategy for Operating in Cyberspace -- Strategy to Combat Transnational Organized Crime -- International Strategy for Cyberspace -- National Strategy for Trusted Identities in Cyberspace -- Council of Europe Convention on Cybercrime -- Global Internet Freedom -- National Strategy to Secure Cyberspace -- End Notes -- Chapter 2 THE INTERPLAY OF BORDERS, TURF, CYBERSPACE, AND JURISDICTION: ISSUES CONFRONTING U.S. LAW ENFORCEMENT* -- Summary -- Introduction -- Boundaries in the Operational Realities -- Borders -- Turf -- Cyberspace -- Jurisdictional Lines -- Interplay of Borders, Turf, Cyberspace, and Jurisdiction Shaping Crime and Law Enforcement -- Physical Borders and Jurisdictional Lines -- Challenges for U.S. Law Enforcement -- Cyberspace and Advancing Technologies -- Cross-Border Criminal Networks -- Trans-border Victimization -- Barriers to Cyber Investigations -- Location of Crimes and Criminals
In: Crime Scene Investigations Ser
Cover -- Half Title -- Title -- Copyright -- Contents -- Foreword -- Introduction: New Technology, New Crimes -- Chapter 1: What is Cybercrime? -- Chapter 2: The Chase Through Cyberspace -- Chapter 3: Trapping the Cybercriminal -- Chapter 4: Gathering the Evidence -- Chapter 5: Making the Case -- Notes -- Glossary -- For More Information -- Index -- Picture Credits -- About the Author -- Back Cover
This book explains complex cybercrimes from the perspectives of multiple disciplines and scientifically analyzes their impact on individuals, society, and nations, both holistically and comprehensively. It explores how to legislate proactive cyberlaws.
In: Lehr- und Studienbriefe Kriminalistik / Kriminologie Band 26
Unter den Begriff Cybercrime werden Straftaten gefasst, die mittels Informationstechnologie und IT-Strukturen begangen werden. Diese Delikte sind durch eine Vielzahl, vor dem Hintergrund der technischen Entwicklung stark wandelbarer, Tatbegehungsformen gekennzeichnet. Das mannigfache Spektrum dieser Phänomene umfasst: die Botnetzkriminalität; den verbrecherischen Einsatz von Malware, Ransomware oder Scareware; Phishing, Pharming und Skimming; NFC-Betrug; Cybermobbing und Cybergrooming sowie vielfältige Formen strafbarer Urheberrechtsverletzungen. Die Darstellung dieser und weiterer Spielarten der unterschiedlichen Erscheinungsformen von Cybercrime und ihre strafrechtliche Beurteilung bilden den Ausgangspunkt dieses Studienbriefs. In den nachfolgenden Kapiteln stehen die Ermittlungsmöglichkeiten der Strafverfolgungsbehörden durch die Computerforensik und die Informationsgewinnung in Netzwerken im Fokus, gefolgt von Handlungsanweisungen zur polizeilichen Bekämpfung der Internetkriminalität im sog. Ersten Angriff. In einem Ausblick wird zudem auf den ermittlungstechnischen Einsatz von Big-Data-Technologie aufmerksam gemacht. Als Einführungswerk richtet sich die Schrift in erster Linie an Praktiker, die einen Neueinstieg in die Materie suchen, sowie an Polizeibeamte in Ausbildung und Studium.
In: Justitiële verkenningen 30,8
Information and communications technologies (ICT) have created untold benefits for life in industrialized societies, offering efficiencies in the delivery of education, health services, recreation, commerce and government. ICT has changed considerably the nature of modern workplaces and patterns of employment, and offered opportunities for people across the globe to stay in touch and to establish new personal and business relationship. ICT has also created unprecedented opportunities for crime in both Western and Eastern regions of the world. In the words of Grabosky & Smith: "since Wheatstone and Cooke first patented their system of communication by the means of electromagnetic impulses carried over wires in 1837, crimes have been committed either through the misuse of telecommunications equipment, or against telecommunications equipment. Every technological development has provided a new opportunity for criminality which has often been exploited". Identifying these changing vulnerabilities, and mobilizing appropriate countermeasures, are some of the great challenges of today, and of the years to come. Much technology-related crime lies beyond the capacity of contemporary law enforcement and regulatory agencies to control, if they act by themselves. Therefore, security in cyberspace will depend on the collaborative efforts of many institutions, coupled with self-help by potential victims. In cyberspace, the adage "prevention is better than cure" should be of paramount importance. The ideal configuration of responses will differ, depending upon the activity, but is likely to entail a mix of law enforcement, technological and market responses. Because cyberspace knows no boundaries and computer crime often crosses national frontiers, effective countermeasures will require a substantial degree of international co-operation.
BASE
International Journal of Advanced Computer Science and Applications(IJACSA), 10(4), 2019 ; Cybercrime encompasses all illegal actions and facts that target cyberspaces and cause enormous economic and financial damages to organizations and individuals. A cyberspace is essentially composed of digital information as well as its store and communication instruments/platforms. To remedy this phenomenon, attention has focused particularly on both computer security and legislation in an area where the human behavior is also decisive. Social psychology has well defined the concept of behavior and also studied its relations with the attitude in human action. This paper aims to broaden the scope of cybercrime to also discuss marginal phenomena which do not attract enough attention but could easily be converted to digital criminals once circumstances become appropriate. The main objective of this work is the study of the 'human'-'digital world' interactivity in a specific geographical area or precisely the study of the human behavior towards digital crimes. The proposed study targets young people of a small Moroccan city that is in the south of the country central region and constitutes its global economy barycenter. The study dealt specifically with a sample of Moroccan young living in El Jadida city that coincidentally contains individuals from other Moroccan cities which enriched this study more. ; http://thesai.org/Downloads/Volume10No4/Paper_57-Cybercrime_in_Morocco.pdf
BASE