The Human Factor of Cybercrime

Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal j...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autoři: Leukfeldt, Rutger, Holt, Thomas J
Médium: E-kniha
Jazyk:angličtina
Vydáno: United Kingdom Routledge 2019
Taylor and Francis
Taylor & Francis Group
Vydání:1
Edice:Routledge Studies in Crime and Society
Témata:
ISBN:9780429864186, 0429864183, 1138624691, 9781138624696, 1032087196, 9781032087191
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Cover -- Half Title -- Series Title -- Title -- Copyright -- Contents -- List of figures -- List of tables -- List of contributors -- Preface -- PART I Background -- 1 It ain't what it is, it's the way that they do it? Why we still don't understand cybercrime -- 2 Contributions of criminological theory to the understanding of cybercrime offending and victimization -- 3 The open and dark web: facilitating cybercrime and technology-enabled offences -- PART II Victims -- 4 Predictors of cybercrime victimization: causal effects or biased associations? -- 5 Virtual danger: an overview of interpersonal cybercrimes -- 6 Sexual violence in digital society: understanding the human and technosocial factors -- PART III Offenders -- 7 Cybercrime subcultures: vontextualizing offenders and the nature of the offence -- 8 On social engineering -- 9 Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods -- 10 Financial cybercrimes and situational crime prevention -- 11 Modelling cybercrime development: the case of Vietnam -- 12 Humanizing the cybercriminal: markets, forums, and the carding subculture -- 13 The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism -- 14 Child sex abuse images and exploitation materials -- PART IV Policing -- 15 Policing cybercrime: responding to the growing problem and considering future solutions -- 16 Responding to individual fraud: perspectives of the fraud justice network -- 17 The ecology of cybercrime -- 18 Displacing big data: how criminals cheat the system -- Index