In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the "cyber criminal curve." Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology- driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice,...
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon an...
Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to...
Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and t...
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.
Rather than presenting an overly technical discussion of the phenomenon of hacking, this work...
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? ...
Technology has become increasingly important to both the function and our understanding of the justice process. Many forms of criminal behaviour are highly dependent upon technology, and crime control has become a predominantly technologically driven process one where traditional technological aids such as fingerprinting or blood sample analysis are supplemented by a dizzying array of tools and techniques including surveillance devices and DNA profiling.
This book offers the first comprehensive and holistic overview of global research on technology, crime and justice. It is...
Technology has become increasingly important to both the function and our understanding of the justice process. Many forms of criminal behaviour ar...
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also...
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breache...
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. These fields have produced parallel scholarship to understand cybercrime offending and victimization, as well as techniques to harden systems from compromise and understand the tools used by cybercriminals. The literature developed from these two fields is diverse and informative, but until now there has been minimal interdisciplinary scholarship combining their insights in order to create a more informed and robust body of knowledge.
...
Research on cybercrime has been largely bifurcated, with social science and computer science researchers working with different research agendas. T...