Synopses & Reviews
Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.
Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
Review
"Recommended. All readers." - Choice
Review
"Brenner (law and technology, Univ. of Dayton School of Law) has written an exceptionally clear, well-organized
account of the expansion of cybercrime from the playful hackers and 'phone phreaks' of the mainframe era to today's
sophisticated cross-national criminal operations. . . . Recommended. All readers." - Choice
Synopsis
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society.
Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.
Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement's ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
Synopsis
This fascinating and timely book traces the emergence and evolution of cybercrime as an increasingly intransigent threat to society.
Synopsis
• A chronology traces the emergence and evolution of cybercrime from the 1950s to the present
• Detailed descriptions and analysis of real cybercrime cases illustrate what cybercrime is and how cybercriminals operate
Synopsis
In Russia, there are people who earn their living trading in personal information belonging to American citizens. They maintain websites where one can buy names, addresses, and Social Security and credit card numbers. Cybercrime flourishesboth transnationally and within our own borders. It is time to arm ourselves with the information we need to remain safe.
Synopsis
• Incorporates cases from the past 50 years into a detailed, easily understood explanation of what cybercrime is and why it is a matter of great concern to governments—and citizens—around the world
• Provides a comprehensive legal, historical, and sociological treatment of cybercrime as an empirical phenomenon
• Explores measures we can all take to secure our property and ourselves