\(
\def\WIPO{World Intellectual Property Organisation}
\)
Principles of cybercrime / Jonathan Clough.
2010
N 629 GLO.P
Available at WIPO Library
Форматы
| Формат | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DataCite | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Items
Полное описание
Название
Principles of cybercrime / Jonathan Clough.
Описание
liii, 449 pages ; 24 cm
ISBN
9780521728126
9780521899253 hardback
0521899257 hardback
9780511729782 electronic book
0511729782 electronic book
9780511845123 electronic book
051184512X electronic book
9780511726491
9780521899253 hardback
0521899257 hardback
9780511729782 electronic book
0511729782 electronic book
9780511845123 electronic book
051184512X electronic book
9780511726491
Альтернативный идентификационный номер
N 629 GLO.P
Резюме
"We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, have transformed the way in which we socialize and do business. While overwhelmingly positive, there has also been a dark side to these developments proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes: so-called 'cybercrimes'. Whether it is fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions Focusing on Australia, Canada, the UK and USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes."--Jacket.
Библиографическая и др. запись
Includes bibliographical references (pages 417-437) and index.
Запись форматированного содержания
1. Cybercrime; 2. Computer as target; 3. Access offences; 4. Impairment of data; 5. Misuse of devises; 6. Interception of data; 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; 10. Child pornography; 11. 'Grooming'; 12. Cyberstalking; 13. Voyeurism; 14. Jurisdiction.
Cybercrime
Computer as target
Access offences
Impairment of data
Misuse of devices
Interception of data
Fraud
Criminal copyright infringement
'Spam'
Child pornography
'Grooming'
Cyberstalking
Voyeurism
Jurisdiction.
Cybercrime
Computer as target
Access offences
Impairment of data
Misuse of devices
Interception of data
Fraud
Criminal copyright infringement
'Spam'
Child pornography
'Grooming'
Cyberstalking
Voyeurism
Jurisdiction.
Location
Z01 02 HC 40848
E02 E02RA 004.49 CLO
E02 E02RA 004.49 CLO
Опубликовано
Cambridge, UK : Cambridge University Press, 2010.
Язык(и)
eng
Запись имеется в
Review
"We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, have transformed the way in which we socialize and do business. While overwhelmingly positive, there has also been a dark side to these developments proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes: so-called 'cybercrimes'. Whether it is fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions Focusing on Australia, Canada, the UK and USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes."--Jacket.