• Complain

Robert Moore - Cybercrime: Investigating High-Technology Computer Crime

Here you can read online Robert Moore - Cybercrime: Investigating High-Technology Computer Crime full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: London, year: 2014, publisher: Routledge, genre: Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Robert Moore Cybercrime: Investigating High-Technology Computer Crime
  • Book:
    Cybercrime: Investigating High-Technology Computer Crime
  • Author:
  • Publisher:
    Routledge
  • Genre:
  • Year:
    2014
  • City:
    London
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cybercrime: Investigating High-Technology Computer Crime: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybercrime: Investigating High-Technology Computer Crime" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This innovative text provides an excellent introduction to technology-assisted crime and the basics of investigating such crime, from the criminal justice perspective. It presents clear, concise explanations for students and professionals, who need not be technically proficient to find the material easy-to-understand and practical. The book begins by identifying and defining the most prevalent and emerging high-technology crimes and exploring their history, their original methods of commission, and their current methods of commission. Then it delineates the requisite procedural issues associated with investigating technology-assisted crime. In addition, the text provides a basic introduction to computer forensics, explores legal issues in the admission of digital evidence, and then examines the future of high-technology crime, including legal responses.

Cybercrime: Investigating High-Technology Computer Crime — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybercrime: Investigating High-Technology Computer Crime" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
First Published 2011 by Anderson Publishing
Published 2015 by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
711 Third Avenue, New York, NY 10017, USA
Routledge is an imprint of the Taylor & Francis Group, an informa business
2011, Taylor & Francis. All rights reserved.
No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any infor mation storage or retrieval system, without permission in writing from the publishers.
Notices
No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use of operation of any methods, products, instructions or ideas contained in the material herein.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Library of Congress Control Number: 2010935324
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
ISBN 978-1-4377-5582-4 (pbk)
Table of Contents
The topic of high-technology crime and cybercrime is discussed much more today than it was five years ago when the first edition of this text was released. Computers have become integral parts of the daily lives of citizens around the world. The number of individuals who gain access to the World Wide Web, both for legitimate and for illegitimate reasons, continues to increase every day. Criminal activities involving computers and technology continue to be a problem for the criminal justice system. It is worth noting that while crime numbers have increased over the last five years, the criminal justice response has also increased. Today there are more criminal justice agencies staffing cybercrime-related investigators. Additionally, there are more computer forensics services available for investigators. However, there is still a continuing need to increase awareness and understanding of cyber-related crime.
There is an incredible amount of literature on the topic of cybercrime, ranging from works on cybercrime in general to more specific works that focus on particular cyber-related crimes. However, the current work seeks to continue its original goalto provide an introductory level of coverage to a rapidly changing field of the criminal justice system. This work is written for those who have limited or no knowledge of how computers work and/or computer networking principles. Readers are introduced to various complex topics in an easy-to-understand format. It is the hope of the author that these materials can be of use not just to university students but also to those who are currently working in the criminal justice field.
The book is divided into three sections. The first section consists of an introduction to high-technology crime, which is also commonly referred to as cybercrime . The second section addresses investigative issues associated with the investigation and prosecution of these crimes. The final section provides readers with some insight into the future of study in the area of high-technology crime, including current issues and an introduction to the emerging field of cybercriminology.
It is not the intent of this work to make the reader an expert in the area of high-technology crime, for no single work could accomplish this. The field is complex and constantly changing, as the technology used by both the criminals and the criminal justice system continues to evolve. Instead, the reader should view this work as a starting point for future study and research on the topic. To assist in this process each chapter concludes with a series of review questions designed to highlight the important terminology and concepts presented within each chapter. Each chapter also contains reference to related books, articles, or court cases that have been selected to provide interested readers with a means of continuing their education in this area. There are also a variety of websites and organizations that maintain a virtual presence on the World Wide Web, many of which provide up-to-date information on many of the topics discussed in this work. Therefore, each chapter will contain a brief listing of relevant websites that readers may visit in order to continue learning about the topics addressed in each chapter. Finally, every chapter except the final one will contain a brief spotlight on a news story that addresses how the materials discussed in the chapter are used or encountered in practice. These news stories are relatively recent; the stories come from news sources within the previous two to three years, with the majority published in the year before press time. The final chapter covers the new and exciting area of cybercriminology. Scholars in this area of study are working to gain a better understanding of what causes individuals to engage in the many cyber-related crimes that are discussed in this work. While there are few news articles that address these studies, numerous academic journal articles and textbooks are being developed on the topics, and readers are provided with information on these works.
As with the first edition, it is the hope of this author that this work will motivate readers to become more involved in the areas of research and training in the high-technology crime field.
Chapter 1
An Introduction to High-Technology Crime
When discussing crimes that involve computers and technology it is possible that prior to this reading the term high-technology crime may not have been heard by the reader. The term technology is often used to refer to mechanical or electrical devices that assist individuals in their day-to-day activities, but what does it mean to discuss high technology ? As this is a work designed for those who are either interested in or currently involved in the field of criminal justice, let us take the standard equipment of a law enforcement officer as an example. Today, most all law enforcement personnel carry a firearm of some type, regardless of whether they elect to utilize a revolver or a semi-automatic. Is the officers firearm a piece of technology? Of course. The firearm is a highly mechanical device, with the revolver having been developed by Samuel Colt in 1836. Therefore, the firearm is a piece of technology and one that has been around for more than a 100 years. Now, is the firearm a piece of high technology? This could be debatable, as some would consider the complex designs and manufacturing components of the firearm to make it a highly sophisticated piece of technology. But does being highly sophisticated equate to being considered high technology? Probably not. In the eyes of this author, the term high technology invokes images of highly developed electronic devicesmore in line with the components that make up a cellular telephone than the components of a firearm.
It is worth noting that for many people what they consider to be a computerthe large electronic device that we type our research papers on and use to browse the Internetis not the limitation for the technology. A computer is an electronic device that allows the user to input information, process that information, and then receive results that are based on the information provided by the user. Many of these devices do not come with monitors or keyboards. For example, many of us now commonly use a debit card at the local convenience store, thereby saving us the time and effort it takes to write out a check. To complete our financial transactions, the cashier merely takes our debit card and swipes the magnetic strip through a small machine, returning our card to us when he or she is finished. The small device attached to the cashiers cash register will obtain our account number from the magnetic strip on the back of the debit card. We as users then enter our PIN onto the keypad, and the transaction is either approved or rejected. The machine that reads our debit cards is a miniature computer. Furthermore, the debit card scanner would meet our earlier established criteria for being considered an example of a high-technology device. Another example of technological devices seeing increased use in our society would be cellular telephones. In the five years since the first edition of this text was published, a number of cellular phone manufacturers continue to release phones containing increasingly advanced software applications. Todays cellular phone can allow users from around the world to input information, process information, and send or receive information almost instantaneously. Each of these devices is a highly sophisticated electronic device that would therefore meet the previously discussed definition of a high-technology device. Now that we have a basic understanding of some examples of high-technology devices, questions that remain involve gaining a better understanding of high-technology crime and determining whether such criminal behavior is a serious problem that truly warrants examination and consideration.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybercrime: Investigating High-Technology Computer Crime»

Look at similar books to Cybercrime: Investigating High-Technology Computer Crime. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybercrime: Investigating High-Technology Computer Crime»

Discussion, reviews of the book Cybercrime: Investigating High-Technology Computer Crime and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.