Electronic Theft: Unlawful Acquisition in Cyberspace
Professor Emeritus Peter Grabosky, Peter Grabosky, Russell G. Smith, Russell Gordon Smith, Gillian Dempsey
Cambridge University Press, 02.04.2001 - 235 Seiten
The fundamental principle of criminology is that crime follows opportunity, and opportunities for theft abound in the digital age. Electronic Theft names, describes and analyses the range of electronic and digital theft, and constitutes the first major survey of the field.The authors cover a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorised use of personal information. The book poses and attempts to answer some pressing questions to do with national sovereignty and enforceability of laws.
Was andere dazu sagen - Rezension schreiben
Es wurden keine Rezensionen gefunden.
Theft and Cyberspace
Stealing Funds Electronically
Defrauding Governments Electronically
Telephone Fraud and Theft of Internet Services
Online Securities Fraud
Electronic Snake Oil Deceptive and Misleading Online Advertising and Business Practices
Andere Ausgaben - Alle anzeigen
able action activities advertising agencies Association Australian authorities bank become calls carried Chapter codes commerce communications conduct consumers created crime criminal customers cyberspace deal deceptive developed direct e-mail effective electronic employees enforcement ensure example exist extortion forms fraud funds identified illegal increase individuals industrial institutions interest Internet investment investors involved issue jurisdictions legislation limited material means million nature object obtained offenders offer Office operate opportunities organizations payment personal information police possible practices prevent problems prosecution protection purchase question records regulation regulatory relating reported require response risk schemes seek share surveillance telephone theft threat trading transactions transfer United users various victims visited