+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Cybercrime. The Transformation of Crime in the Information Age. Edition No. 1. Crime and Society

  • ID: 2250432
  • Book
  • July 2007
  • 288 Pages
  • John Wiley and Sons Ltd
How has the internet transformed criminal behaviour? What is different about cybercrime compared with traditional criminal activity? What new criminal opportunities have arisen? What impact might cybercrime have on public security?

In this exciting new text, David Wall carefully examines these and other important issues. He discusses what is known about cybercrime, disentangling the rhetoric of risk assessment from its reality.

Looking at the full range of cybercrime, he shows how the increase in personal computing power available within a globalized communications network has affected the nature of and response to criminal activities. Drawing on empirical research findings and multidisciplinary sources he goes on to argue that we are beginning to experience a new generation of automated cybercrimes, which are almost completely mediated by networked technologies that are themselves converging.

We have now entered the world of low impact, multiple victim crimes in which bank robbers, for example, no longer have to meticulously plan the theft of millions of dollars. New technological capabilities at their disposal now mean that one person can effectively commit millions of robberies of one dollar each. Against this background, David Wall scrutinizes the regulatory challenges that cybercrime poses for the criminal (and civil) justice processes, at both the national and the international levels.

This book offers the most comprehensive, and intellectually robust, account of cybercrime currently available. It is suitable for use on courses across the social sciences, and in computer science, and will appeal to advanced undergraduate and graduate students.

Note: Product cover images may vary from those shown

Preface and Acknowledgements

List of Tables and Figures

1 Introduction

2 Understanding crime in the information age:

What are cybercrimes and what do we know about them?

3 Cyberspace and the transformation of criminal activity:

How have networked technologies changed opportunities for criminal activity?

4 Computer integrity crime: Hacking, cracking and denial of service

How has criminal activity changed in the information age? - Part 1

5 Computer assisted crime: Virtual robberies, scams and thefts

How has criminal activity changed in the information age? - Part 2

6 Computer content crime: Pornography, violence, offensive communications

How has criminal activity changed in the information age? - Part 3

7 Cybercrime futures: The automation of offender-victim engagement

How is criminal activity continuing to change in the information age?

8 Policing online behaviour: Order and law on the cyberbeat

How is cyberspace policed and by whom?

9 Controlling and preventing cybercrime

How are cybercrimes to be regulated and prevented?

10 Conclusions: The transformation of crime in the information age

Cases and References

Glossary

Index

Note: Product cover images may vary from those shown
David S. Wall University of Leeds.
Note: Product cover images may vary from those shown
Adroll
adroll