The Human Factor of Cybercrime
Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal j...
Uloženo v:
| Hlavní autoři: | , |
|---|---|
| Médium: | E-kniha |
| Jazyk: | angličtina |
| Vydáno: |
United Kingdom
Routledge
2019
Taylor and Francis Taylor & Francis Group |
| Vydání: | 1 |
| Edice: | Routledge Studies in Crime and Society |
| Témata: | |
| ISBN: | 9780429864186, 0429864183, 1138624691, 9781138624696, 1032087196, 9781032087191 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime.
The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. |
|---|---|
| AbstractList | Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime.
The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Bringing together leading experts, this book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Part I: Background 1. It ain’t what it is, its the way that they do it? Why we still don’t understand cybercrime Mike McGuire 2. Contributions of Criminological Theory to the Understanding of Cybercrime Offending and Victimization Adam Bossler 3. The Open And Dark Web: Facilitating Cybercrime And Technology-Enabled Offenses Claudia Flamand and David Décary-Hétu Part II: Victims 4. Predictors of Cybercrime Victimization: Causal Effects or Biased Associations? Steve van de Weijer 5. Virtual Danger: An Overview of Interpersonal Cybercrimes Jordana Navarro 6. Sexual Violence in Digital Society: Understanding the Human and Technosocial Factors Anastasia Powell, Asher Flynn and Nicola Henry Part III: Offenders 7. Cybercrime subcultures: Contextualizing offenders and the nature of the offence Thomas J. Holt 8. On Social Engineering Kevin Steinmetz, Richard Goe, and Alexandra Pimentel 9. Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods Marleen Weulen Kranenbarg; 10. Financial cybercrimes and situational crime prevention Rutger Leukfeldt and Jurjen Jansen; 11. Modelling Cybercrime Development: The case of Vietnam Jonathan Lusthaus 12. Humanizing the Cybercriminal: Markets, Forums, and the Carding Subculture Craig Webber and Michael Yip 13. The Roles of ‘Old’ and ‘New’ Media Tools and Technologies in the Facilitation of Violent Extremism and Terrorism Ryan Scrivens and Maura Conway 14. Child Sex Abuse Images and Exploitation Materials Roderic Broadhurst Part IV : Policing; 15. Policing Cybercrime: Responding to the Growing Problem and Considering Future Solutions Cassandra Dodge and George Burruss 16. Responding to individual fraud: Perspectives of the Fraud Justice Network Cassandra Cross 17. The Ecology of Cybercrime Benoît Dupont 18. Displacing big data: How criminals cheat the system Alice Hutchings, Sergio Pastrana and Richard Clayton Dr. Rutger Leukfeldt is senior researcher and cybercrime cluster coordinator at the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR). Furthermore, Rutger is director of the Cybersecurity & SMEs Research Center of the Hague University of Applied Sciences. Over the last decade, Rutger worked on a number of cybercrime studies for the Dutch government and private companies. Rutger is currently the chair of the Cybercrime Working Group of the European Society of Criminology (ESC). Dr. Thomas J. Holt is a professor in the School of Criminal Justice at Michigan State University specializing in cybercrime, cyberterrorism, and the police response to these threats. His work has been published in a range of journals, and he is also the author of multiple books and edited works. Open access – no commercial reuse Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. |
| Author | Rutger Leukfeldt Thomas J. Holt |
| Author_xml | – sequence: 1 fullname: Leukfeldt, Rutger – sequence: 2 fullname: Holt, Thomas J |
| BookMark | eNqNkbtPwzAQh414CFo6sqKIBTEU_IofI0QtRarEUmbLSRwamtjFTlv1vyclXbJ1sk7-ft_p7gbgwjprALhD8JkSTF8kF5BiSRmMJTkDo2MtGEUMn_dqwa7AACFMGSIwptdgFMIPhBDj9h-hG3C_WJpotqm1jaY6a5yPXBEl-9T4zJe1uQWXha6CGR3fIfiaThbJbDz_fP9IXudjTSDnbGxMTDFCaavNMYxTInOOBWaFwLzINE1NZpiQWhiWc1kgTkXM0xbP8zwmjAzBU-fVYWV2YemqJqhtZVLnVkH1Bjqd5bJlHzt27d3vxoRG_WOZsY3XlZq8JbGk7TYOVtqRpS2cr_XO-SpXjd5Xzhde26wMvQbd9tvY5LQYgupwvH5cbY0PpbO49Tx0nkwHXZW2VLWz7tvr9TIoKiASEJI_LRKVaw |
| ContentType | eBook |
| Copyright | 2020 selection and editorial matter, Rutger Leukfeldt and Thomas J. Holt; individual chapters, the contributors |
| Copyright_xml | – notice: 2020 selection and editorial matter, Rutger Leukfeldt and Thomas J. Holt; individual chapters, the contributors |
| DBID | I4C |
| DEWEY | 005 |
| DOI | 10.4324/9780429460593 |
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Social Welfare & Social Work Computer Science |
| EISBN | 9780429864162 9780429460593 0429460597 9780429864186 9780429864179 0429864183 0429864167 0429864175 |
| Edition | 1 1st edition. |
| Editor | Leukfeldt, Rutger Holt, Thomas J |
| Editor_xml | – sequence: 1 fullname: Holt, Thomas J – sequence: 2 fullname: Leukfeldt, Rutger |
| ExternalDocumentID | 9780429864186 9780429864179 EBC5940226 9780429460593 10_4324_9780429460593_version2 4801800 |
| GroupedDBID | 38. AABBV ABARN ABEQL ABMRC ABQPQ ACBYE ACRME ACSVZ ADVEM AERYV AESSL AEUHU AEZWE AFOJC AHWGJ AIXXW AJFER ALKVF ALMA_UNASSIGNED_HOLDINGS AXTGW BBABE BIANM CZZ EBATF EBSCA EMKMY GEOUK I4C INALI JTX UCHLF A7I PYIOH V1H |
| ID | FETCH-LOGICAL-a30776-ee54211b229d205b39d72826f827fca4bece689a8e6d79f174857bb22ddd5363 |
| ISBN | 9780429864186 0429864183 1138624691 9781138624696 1032087196 9781032087191 |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000530476000020&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 13 06:00:36 EDT 2025 Thu Apr 17 09:01:28 EDT 2025 Wed Dec 10 13:38:35 EST 2025 Sun Feb 23 05:33:15 EST 2025 Mon Aug 04 11:06:37 EDT 2025 Wed Sep 10 09:11:00 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Keywords | Cyber Dependent Crime Child Sexual Exploitation Material Anti-virus Software Malware Victimization Cyberstalking Victimization Vice Versa Digital Piracy Online Sexual Harassment Antivirus Software Carding Forums SARA Method Money Mules Situational Crime Prevention Young Men Fraud Victims Big Data Solutions Fraud Detection Systems Low Self-control Cybercrime Victimization LGBTQ Youth Traditional Offending Criminal Entrepreneurs Offline Social Ties Malware Infection Routine Activities Theory |
| LCCallNum_Ident | Q |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a30776-ee54211b229d205b39d72826f827fca4bece689a8e6d79f174857bb22ddd5363 |
| OCLC | 1124613054 |
| PQID | EBC5940226 |
| PageCount | 448 16 432 |
| ParticipantIDs | askewsholts_vlebooks_9780429864186 askewsholts_vlebooks_9780429864179 proquest_ebookcentral_EBC5940226 informaworld_taylorfrancisbooks_9780429460593 informaworld_taylorfrancisbooks_10_4324_9780429460593_version2 casalini_monographs_4801800 |
| PublicationCentury | 2000 |
| PublicationDate | 2019 2020 20191011 2019-10-11 2019-10-28 |
| PublicationDateYYYYMMDD | 2019-01-01 2020-01-01 2019-10-11 2019-10-28 |
| PublicationDate_xml | – year: 2019 text: 2019 |
| PublicationDecade | 2010 2020 |
| PublicationPlace | United Kingdom |
| PublicationPlace_xml | – name: United Kingdom – name: Oxford |
| PublicationSeriesTitle | Routledge Studies in Crime and Society |
| PublicationYear | 2019 2020 |
| Publisher | Routledge Taylor and Francis Taylor & Francis Group |
| Publisher_xml | – name: Routledge – name: Taylor and Francis – name: Taylor & Francis Group |
| SSID | ssj0002229811 |
| Score | 2.2193487 |
| Snippet | Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools.... Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools.... Bringing together leading experts, this book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. |
| SourceID | askewsholts proquest informaworld casalini |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Big Data Computer crimes-Social aspects Computer Fraud, Hacking & Viruses Computer programming, programs, data Crime and Society Crime Prevention criminal justice response criminological theory Criminology - Law Criminology and Criminal Justice Cyber Crime Cyber Security Cybercrime cybercrime victimization Cybercriminal networks cybercriminals Cyberculture Cyberspace Dark Web Digital markets Digital Society Hacking Human Computer Interaction information security Legal, Ethical & Social Aspects of IT Malware Policing Social Aspects of Computing & IT Social Impact of Computing & IT on Society Sociology of Media Sociology of Science & Technology Technoculture Theoretical Criminology Victims |
| TableOfContents | Cover -- Half Title -- Series Title -- Title -- Copyright -- Contents -- List of figures -- List of tables -- List of contributors -- Preface -- PART I Background -- 1 It ain't what it is, it's the way that they do it? Why we still don't understand cybercrime -- 2 Contributions of criminological theory to the understanding of cybercrime offending and victimization -- 3 The open and dark web: facilitating cybercrime and technology-enabled offences -- PART II Victims -- 4 Predictors of cybercrime victimization: causal effects or biased associations? -- 5 Virtual danger: an overview of interpersonal cybercrimes -- 6 Sexual violence in digital society: understanding the human and technosocial factors -- PART III Offenders -- 7 Cybercrime subcultures: vontextualizing offenders and the nature of the offence -- 8 On social engineering -- 9 Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods -- 10 Financial cybercrimes and situational crime prevention -- 11 Modelling cybercrime development: the case of Vietnam -- 12 Humanizing the cybercriminal: markets, forums, and the carding subculture -- 13 The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism -- 14 Child sex abuse images and exploitation materials -- PART IV Policing -- 15 Policing cybercrime: responding to the growing problem and considering future solutions -- 16 Responding to individual fraud: perspectives of the fraud justice network -- 17 The ecology of cybercrime -- 18 Displacing big data: how criminals cheat the system -- Index |
| Title | The Human Factor of Cybercrime |
| URI | http://digital.casalini.it/9780429864186 https://www.taylorfrancis.com/books/9780429460593 https://www.taylorfrancis.com/books/9780429864179 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5940226 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780429864179 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780429864186 |
| WOSCitedRecordID | wos000530476000020&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8QwEB58HfTkE-uLIOKtuN02r4sHZVUQ1IOit5K2KYjSlXZd9N87Sdp9VPCBeCndkM5mZ2aTmTTzfQAHGCIkKpUdXzGa-hENlS8Vl34QBQawilNKU0s2wa-uxMODvKmZMitLJ8CLQry9yZd_NTW2obFN6ewvzD0Sig14j0bHK5odr62IePRxbHG3J39mSXTsSYv3RJepgfCfTO-7nVZ6P30uqMn7giA0hR3MkcG2Z0EDsucOPpjVxrz4dCSELWBpDP9Nz3iqXzx023S4qs1yhlPG_Hnv-u5ytG1l6L_x6y3nUj2GoEbOGo3JQZka2UdTspdgSVVPOHfjvD6oTCCgKmXqP1swsZ-WRbvW3y7DvDYFICswo4tV2HH1y-ReP-eq1OSQNA398mkN9lDpxCqdOKWTfk7GSl-Hu7Pe7emFX1NO-Co0wEa-1jTCnDjBn5l1OzQJZcYxK2W56PI8VRG6vGZCKqFZxmWO-ZygPMHuWZbRkIUbMFf0C70JJGeYrCnR1UIojFnTJGM055iOd1QgVKg82J_QRjx8tm_Hq8YcghluuB90EsyD7UaTMTqzgzqvYgMMhOmAB8eTyo0Hdicod7QtTtrXnuCB_52AqQc9II35Yjvc-phx3Ds5pTJCF2Jbfx3TNiyO_yw7MDcoX_UuLKTDwWNV7tVO-wGolF3v |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=The+Human+Factor+of+Cybercrime&rft.date=2020-01-01&rft.pub=Routledge&rft.isbn=9781138624696&rft_id=info:doi/10.4324%2F9780429460593&rft.externalDocID=10_4324_9780429460593_version2 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804298%2F9780429864179.jpg http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97804298%2F9780429864186.jpg |

