The Human Factor of Cybercrime

Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal j...

Full description

Saved in:
Bibliographic Details
Main Authors: Leukfeldt, Rutger, Holt, Thomas J
Format: eBook
Language:English
Published: United Kingdom Routledge 2019
Taylor and Francis
Taylor & Francis Group
Edition:1
Series:Routledge Studies in Crime and Society
Subjects:
ISBN:9780429864186, 0429864183, 1138624691, 9781138624696, 1032087196, 9781032087191
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Cover -- Half Title -- Series Title -- Title -- Copyright -- Contents -- List of figures -- List of tables -- List of contributors -- Preface -- PART I Background -- 1 It ain't what it is, it's the way that they do it? Why we still don't understand cybercrime -- 2 Contributions of criminological theory to the understanding of cybercrime offending and victimization -- 3 The open and dark web: facilitating cybercrime and technology-enabled offences -- PART II Victims -- 4 Predictors of cybercrime victimization: causal effects or biased associations? -- 5 Virtual danger: an overview of interpersonal cybercrimes -- 6 Sexual violence in digital society: understanding the human and technosocial factors -- PART III Offenders -- 7 Cybercrime subcultures: vontextualizing offenders and the nature of the offence -- 8 On social engineering -- 9 Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods -- 10 Financial cybercrimes and situational crime prevention -- 11 Modelling cybercrime development: the case of Vietnam -- 12 Humanizing the cybercriminal: markets, forums, and the carding subculture -- 13 The roles of 'old' and 'new' media tools and technologies in the facilitation of violent extremism and terrorism -- 14 Child sex abuse images and exploitation materials -- PART IV Policing -- 15 Policing cybercrime: responding to the growing problem and considering future solutions -- 16 Responding to individual fraud: perspectives of the fraud justice network -- 17 The ecology of cybercrime -- 18 Displacing big data: how criminals cheat the system -- Index