Part I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content? Related Offenses -- Part V Privacy, Security and Crime Control.;The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing
Cybercrime, Digital Forensics and Jurisdiction
โ Scribed by Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi (auth.)
- Publisher
- Springer International Publishing
- Year
- 2015
- Tongue
- English
- Leaves
- 151
- Series
- Studies in Computational Intelligence 593
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset.
The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
โฆ Table of Contents
Front Matter....Pages i-xviii
Front Matter....Pages 1-1
Cybercrime: Introduction, Motivation and Methods....Pages 3-23
Front Matter....Pages 25-25
Unauthorized Access Offences in Cyberworld....Pages 27-37
Injection of Malicious Code in Application....Pages 39-51
Front Matter....Pages 53-53
Attempts and Impact of Phishing in Cyberworld....Pages 55-63
Sexual Harassment in Cyberworld....Pages 65-78
Front Matter....Pages 79-79
Online Obscenity and Child Sexual Abuse....Pages 81-94
Front Matter....Pages 95-95
Anonymity, Privacy and Security Issues in Cyberworld....Pages 97-111
Strategies and Statutes for Prevention of Cybercrime....Pages 113-127
419 Scam: An Evaluation of Cybercrime and Criminal Code in Nigeria....Pages 129-144
Back Matter....Pages 145-145
โฆ Subjects
Computational Intelligence; Information Systems Applications (incl. Internet); International IT and Media Law, Intellectual Property Law; Security Science and Technology
๐ SIMILAR VOLUMES
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technolo
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technolo
<p><span>This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of
Vast manpower and resources are needed to investigate cybercrimes. The use of new advanced technologies, such as machine learning combined with automation, are effective in providing significant additional support in prevention of cyber-attacks, in the speedy recovery of data, and in reducing human
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly