The Human Factor of Cybercrime
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal j...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Milton :
Routledge,
2019.
|
Colección: | Routledge Studies in Crime and Society Ser.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Half Title; Series Title; Title; Copyright; Contents; List of figures; List of tables; List of contributors; Preface; PART I Background; 1 It ain't what it is, it's the way that they do it? Why we still don't understand cybercrime; 2 Contributions of criminological theory to the understanding of cybercrime offending and victimization; 3 The open and dark web: facilitating cybercrime and technology-enabled offences; PART II Victims; 4 Predictors of cybercrime victimization: causal effects or biased associations?; 5 Virtual danger: an overview of interpersonal cybercrimes
- 6 Sexual violence in digital society: understanding the human and technosocial factorsPART III Offenders; 7 Cybercrime subcultures: vontextualizing offenders and the nature of the offence; 8 On social engineering; 9 Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods; 10 Financial cybercrimes and situational crime prevention; 11 Modelling cybercrime development: the case of Vietnam; 12 Humanizing the cybercriminal: markets, forums, and the carding subculture
- 13 The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism14 Child sex abuse images and exploitation materials; PART IV Policing; 15 Policing cybercrime: responding to the growing problem and considering future solutions; 16 Responding to individual fraud: perspectives of the fraud justice network; 17 The ecology of cybercrime; 18 Displacing big data: how criminals cheat the system; Index