Snippet

Policing Cyber Crime

Policing Cyber Crime


Description

Computer crime is an overwhelming problem worldwide. It has brought an array of new crime activities and actors and, consequently, a series of new challenges in the fight against this new threat (Picard, 2009). Policing computer crime is a knowledge-intensive challenge because of the innovative aspect of many kinds of computer crime.
In this textbook you will learn more about Policing Cyber Crime. In this book a definition and examples of cyber crime will be given. Further you can read about crime protection and crime investigations.

Preface

The risk of computer crime has become a global issue affecting almost all countries. Salifu (2008) argues that the Internet is a "double-edged sword" providing many opportunities for individuals and organizations to develop and prosper, but at the same time has brought with it new opportunities to commit crime. For example, Nigeria-related financial crime is extensive and 122 out of 138 countries at an Interpol meeting complained about Nigerian involvement in financial fraud in their countries. The most notorious type attempted daily on office workers all over the world, is the so-called advance fee fraud. The sender will seek to involve the recipient in a scheme to earn millions of dollars if the recipient pays an advance fee (Ampratwum, 2009).
Cyberspace presents a challenging new frontier for criminology, police science, law enforcement and policing. Virtual reality and computer-mediated communications challenge the traditional discourse of criminology and police work, introducing new forms of deviance, crime, and social control. Since the 1990s, academics and practitioners have observed how cyberspace has emerged as a new field of criminal activity. Cyberspace is changing the nature and scope of offending and victimization. A new discipline named cyber criminology is emerging. Jaishankar (2007) defines cyber criminology as the study of causation of crimes that occur in the cyberspace and its impact in the physical space.

Content

Introduction
1. Cyber Crime Defined
1.1 Computer Crime Technology
1.2 Computer Crime on the Internet
1.4 White-Collar Computer Crime
1.5 Crime Offender or Victim
2. Cyber Crime Cases 
2.1 Fake Websites
2.2 Money Laundering
2.3 Bank Fraud
2.4 Advance Fee Fraud
2.5 Malicious Agents
2.6 Stock Robot Manipulation
2.7 Identity Theft
2.8 Digital Piracy
2.9 Intellectual Property Crime
2.10 Internet Gambling
3. Child Grooming Case
3.1 Online Offenders
3.2 Internet Characteristics
3.3 Internet Relationships
3.4 Grooming Legislation
3.5 European Policy
3.6 Seventeen Internet Characteristics
3.7 Virtual Offender Communities
4. Crime Protection
4.1 Criminal Profiling
4.2 White-Collar Criminals
4.3 Deterrence Theory
4.4 Neutralization Theory
4.5 Regulation and Response
4.6 Criminal Justice Response
4.7 Regulation
4.8 Financial Regulation
4.9 Cyber Security
4.10 Shari’ah Perspective
4.11 Protecting Information Resources
4.12 The Case of Chinese Securities Commission 65
5. Corporate Reputation
5.1 Reputation Defined
5.2 Resource-Based Theory
5.3 Determinants of Corporate Reputation
5.4 Effects of Corporate Reputation
5.5 Theories of Corporate Reputation
5.6 Measurement of Corporate Reputation
5.7 Rebuilding Corporate Reputation
5.8 Social Responsibility
5.9 Corporate Governance Ratings

6. Knowledge Management
6.1 Knowledge Organization
6.2 Business Intelligence
6.3 Stages of Growth
6.4 Knowledge Resources
6.5 Core Competence
6.6 Entrepreneurship Capabilities
6.7 A Case of Dynamic Capabilities
6.8 Knowledge Driven Innovation
7. Intelligence Strategy
7.1 Strategy Characteristics
7.2 Information Sources
7.3 Knowledge Categories
8. Crime Investigations
8.1 Value Shop Configuration
8.2 Investigation Issues
8.3 Senior Investigating Officer
8.4 Electronic Evidence
8.5 How Detectives Work
8.6 Detective Thinking Styles
8.7 The Case of Økokrim in Norway
References

About the Author

http://home.bi.no/fgl98023/

Leave a Reply