Cybercrime: The Transformation of Crime in the Information Age
How has the internet transformed criminal behaviour? What is different about cybercrime compared with traditional criminal activity? What new criminal opportunities have arisen? What impact might cybercrime have on public security?
In this exciting new text, David Wall carefully examines these and other important issues. He discusses what is known about cybercrime, disentangling the rhetoric of risk assessment from its reality.
Looking at the full range of cybercrime, he shows how the increase in personal computing power available within a globalized communications network has affected the nature of and response to criminal activities. Drawing on empirical research findings and multidisciplinary sources he goes on to argue that we are beginning to experience a new generation of automated cybercrimes, which are almost completely mediated by networked technologies that are themselves converging.
We have now entered the world of low impact, multiple victim crimes in which bank robbers, for example, no longer have to meticulously plan the theft of millions of dollars. New technological capabilities at their disposal now mean that one person can effectively commit millions of robberies of one dollar each. Against this background, David Wall scrutinizes the regulatory challenges that cybercrime poses for the criminal (and civil) justice processes, at both the national and the international levels.
This book offers the most comprehensive, and intellectually robust, account of cybercrime currently available. It is suitable for use on courses across the social sciences, and in computer science, and will appeal to advanced undergraduate and graduate students.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Understanding Crime in the Information Age What are cybercrimes and what do we know about them?
Cyberspace and the Transformation of Criminal Activity How have networked technologies changed opportunities for criminal activity?
Computer Integrity Crime Hacking Cracking and Denial of Service How has criminal activity changed in the information age? Part 1
ComputerAssisted Crime Virtual Robberies Scams and Thefts How has criminal activity changed in the information age? Part 2
Computer Content Crime Pornography Violence Offensive Communications How has criminal activity changed in the information age? Part 3
Cybercrime Futures The Automation of OffenderVictim Engagement How is criminal activity continuing to change in the information age?
Policing Online Behaviour Maintaining Order and Law on the Cyberbeat How is cyberspace policed and by whom?
action advanced fee advanced fee frauds attacks automated BBC News Online become blogs botnets bulk email chapter chatrooms child pornography communications create credit card crime criminal activity criminal justice cyber cyberspace debate deﬁned deﬁnition diﬀerent eBay eﬀect example exploit ﬁles ﬁlm ﬁnancial ﬁnd ﬁndings ﬁrst ﬂows fraud fraudsters global governance groups hackers hacking harmful identiﬁed identity theft illegal impact increase individuals infected information age information warfare intellectual property internet fraud internet protocol internet users ISPs Jennicam jurisdictions law enforcement Lessig Leyden malicious software networked technologies obscene oﬀences oﬀending oﬀensive oﬀers Oﬃce oﬃcers online behaviour online gambling organizations phishing potential problem prosecution public police recipients reﬂects relationships risk scams sexual social engineering society Sophos spam spammers speciﬁc spyware Survey tend threat tion trojans victims virtual environment virus viruses websites worms