Electronic Theft: Unlawful Acquisition in CyberspaceCambridge University Press, 02.04.2001 - 235 Seiten When this book was first published in 2001, the convergence of communications and computing had begun to transform Western industrial societies. Increasing connectivity was accompanied by unprecedented opportunities for crimes of acquisition. The fundamental principle of criminology is that crime follows opportunity, and opportunities for theft abound in the digital age. Electronic Theft named, described and analysed the range of electronic and digital theft, and constituted the first major survey of the field. The authors covered a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorised use of personal information. They were able to capture impressively large amounts of data internationally from both scholarly and professional sources. The book posed and attempted to answer some of the pressing questions to do with national sovereignty and enforceability of laws in 2001. |
Inhalt
Theft and Cyberspace | 1 |
Stealing Funds Electronically | 15 |
Digital Extortion | 34 |
Defrauding Governments Electronically | 51 |
Telephone Fraud and Theft of Internet Services | 70 |
Online Securities Fraud | 81 |
Electronic Snake Oil Deceptive and Misleading Online Advertising and Business Practices | 105 |
Intellectual Property in Cyberspace | 130 |
Industrial Espionage in the Digital Age | 143 |
The Electronic Misappropriation and Dissemination of Personal Information | 157 |
The Limits of the Law in Controlling Electronic Theft | 179 |
References | 208 |
226 | |
Andere Ausgaben - Alle anzeigen
Electronic Theft: Unlawful Acquisition in Cyberspace Peter Grabosky,Russell G. Smith,Gillian Dempsey Keine Leseprobe verfügbar - 2010 |
Häufige Begriffe und Wortgruppen
ACCC activities advertising agencies America OnLine Australian Australian Federal Police authorities bank Chapter codes communications conduct consumers counterfeit credit card crime criminal customers cyberspace database developed digital age digital signatures digital technology digital watermarks disclosure e-mail electronic commerce electronic funds transfer electronic theft employees encryption ensure entail example extortion extortionist Federal forms fraudulent Grabosky identified illegal individuals industrial espionage intellectual property Internet investigation investment investors involved issue jurisdictions law enforcement legal pluralism legislation ment merchants million misappropriation Napster networks offenders offer organizations passwords payment systems perpetrated personal information police practices prevent problems prosecution protection purchase regulation regulatory relating require risk schemes securities fraud service providers smartcards steganography surveillance target telecommunications telephone threat trading transactions unauthorized United United Kingdom users victims visited 25 October watermarks