Syndetics cover image
Image from Syndetics

Cybercrime : Law enforcement, security and surveillance in the information age

By: Thomas, Douglas Loader, Brian DPublisher: Routledge, 2000001: 7542ISBN: 0415213266Subject(s): Computer crime | Right of privacyDDC classification: 364.168 THO

Enhanced descriptions from Syndetics:

Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties. Fuelled by sensational media headlines and news coverage which has done much to encourage the belief that technologies like the Internet are likely to lead to a lawless electronic frontier, Cybercrime provides a more considered and balanced perspective on what is an important and contested arena for debate. It looks at:
*legislation
*electronic criminal behaviour
*privacy and liberty
*the dangers of surveillance.
Cybercrime explains the basic issues surrounding cybercrime and its impact on society.

Table of contents provided by Syndetics

  • List of illustrations (p. ix)
  • Notes on contributors (p. x)
  • Preface (p. xii)
  • 1 Introduction--cybercrime: law enforcement, security and surveillance in the information age (p. 1)
  • Part I Perceptions of cybercriminals: hackers, insurgents and extremist groups (p. 15)
  • 2 Criminality on the electronic frontier: corporality and the judicial construction of the hacker (p. 17)
  • 3 Hackers--cyberpunks or microserfs? (p. 36)
  • 4 Attitudes towards computer hacking in Russia (p. 56)
  • 5 The new spectacle of crime (p. 85)
  • Part II Privacy, surveillance and protection (p. 103)
  • 6 Hiding crimes in cyberspace (p. 105)
  • 7 Encryption, anonymity and markets: law enforcement and technology in a free market virtual world (p. 132)
  • 8 Keeping secrets: international developments to protect undisclosed business information and trade secrets (p. 153)
  • 9 Privacy and security at risk in the global information society (p. 173)
  • 10 Data protection of law offenders (p. 193)
  • Part III Information warfare, critical national infrastructure and security (p. 219)
  • 11 Information warfare and sub-state actors: an organizational approach (p. 221)
  • 12 Far right extremists on the Internet (p. 234)
  • 13 Information warfare and the future of the spy (p. 251)
  • Bibliography (p. 269)
  • Index (p. 286)

Reviews provided by Syndetics

CHOICE Review

This volume, assembled for the most part from articles in the journal Information, Communication, and Society, examines the use of global computer networks by criminals and a range of potential countermeasures. Its strength is its geographic and disciplinary range. Authors vary from Russian psychologists and a former assistant director of the FBI to academic experts in communications, computer science, and security studies from around the world. The volume includes analyses of the psychology and culture of hacking, presents examples of encryption and data protection, and devotes a section to the links between cyber crime and information warfare. However, this range makes it difficult to identify common themes. Social theory meets the practical details of law enforcement, but it is seldom drawn together into a neat bundle. Nevertheless, for one who is inclined to make the effort there are several nuggets of insight for both security professionals and communications theorists. Recommended for practitioners, graduate students, and faculty. D. McIntosh; Slippery Rock University of Pennsylvania

There are no comments on this title.

to post a comment.

Powered by Koha