In this exciting new text, David Wall carefully examines these and other important issues. He discusses what is known about cybercrime, disentangling the rhetoric of risk assessment from its reality.
Looking at the full range of cybercrime, he shows how the increase in personal computing power available within a globalized communications network has affected the nature of and response to criminal activities. Drawing on empirical research findings and multidisciplinary sources he goes on to argue that we are beginning to experience a new generation of automated cybercrimes, which are almost completely mediated by networked technologies that are themselves converging.
We have now entered the world of low impact, multiple victim crimes in which bank robbers, for example, no longer have to meticulously plan the theft of millions of dollars. New technological capabilities at their disposal now mean that one person can effectively commit millions of robberies of one dollar each. Against this background, David Wall scrutinizes the regulatory challenges that cybercrime poses for the criminal (and civil) justice processes, at both the national and the international levels.
This book offers the most comprehensive, and intellectually robust, account of cybercrime currently available. It is suitable for use on courses across the social sciences, and in computer science, and will appeal to advanced undergraduate and graduate students.
Preface and Acknowledgements
List of Tables and Figures
2 Understanding crime in the information age:
What are cybercrimes and what do we know about them?
3 Cyberspace and the transformation of criminal activity:
How have networked technologies changed opportunities for criminal activity?
4 Computer integrity crime: Hacking, cracking and denial of service
How has criminal activity changed in the information age? - Part 1
5 Computer assisted crime: Virtual robberies, scams and thefts
How has criminal activity changed in the information age? - Part 2
6 Computer content crime: Pornography, violence, offensive communications
How has criminal activity changed in the information age? - Part 3
7 Cybercrime futures: The automation of offender-victim engagement
How is criminal activity continuing to change in the information age?
8 Policing online behaviour: Order and law on the cyberbeat
How is cyberspace policed and by whom?
9 Controlling and preventing cybercrime
How are cybercrimes to be regulated and prevented?
10 Conclusions: The transformation of crime in the information age
Cases and References