The Human Factor of Cybercrime

Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal j...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavní autori: Leukfeldt, Rutger, Holt, Thomas J
Médium: E-kniha
Jazyk:English
Vydavateľské údaje: United Kingdom Routledge 2019
Taylor and Francis
Taylor & Francis Group
Vydanie:1
Edícia:Routledge Studies in Crime and Society
Predmet:
ISBN:9780429864186, 0429864183, 1138624691, 9781138624696, 1032087196, 9781032087191
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Obsah:
  • Cover -- Half Title -- Series Title -- Title -- Copyright -- Contents -- List of figures -- List of tables -- List of contributors -- Preface -- PART I Background -- 1 It ain't what it is, it's the way that they do it? Why we still don't understand cybercrime -- 2 Contributions of criminological theory to the understanding of cybercrime offending and victimization -- 3 The open and dark web: facilitating cybercrime and technology-enabled offences -- PART II Victims -- 4 Predictors of cybercrime victimization: causal effects or biased associations? -- 5 Virtual danger: an overview of interpersonal cybercrimes -- 6 Sexual violence in digital society: understanding the human and technosocial factors -- PART III Offenders -- 7 Cybercrime subcultures: vontextualizing offenders and the nature of the offence -- 8 On social engineering -- 9 Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods -- 10 Financial cybercrimes and situational crime prevention -- 11 Modelling cybercrime development: the case of Vietnam -- 12 Humanizing the cybercriminal: markets, forums, and the carding subculture -- 13 The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism -- 14 Child sex abuse images and exploitation materials -- PART IV Policing -- 15 Policing cybercrime: responding to the growing problem and considering future solutions -- 16 Responding to individual fraud: perspectives of the fraud justice network -- 17 The ecology of cybercrime -- 18 Displacing big data: how criminals cheat the system -- Index