Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Examining the consequences of technology-driven lifestyles for both crime commission and victimization, this comprehensive Handbook provides an overview of a broad array of techno-crimes as well as exploring critical issues concerning the criminal justice system’s response to technology-facilitated criminal activity.The Handbook adopts a unique three-fold typology of technology-enabled crime: techno-crime committed by professional criminals (crime as work), techno-crime committed in traditional workplace settings (crime at work), and techno-crime committed by individuals outside of traditional workplace settings (crime after work.) Chapters explore an extensive range of criminal activities facilitated by the digital age, from embezzlement, financial fraud, corporate espionage, phishing, and ransomware to identity theft, hacking, cyber terrorism, and internet sex and hate crimes. Looking to the future, the Handbook considers timely questions posed by our continued reliance on information technology, including whether we are in danger of becoming a global surveillance state and how we might prevent the facilitation of cyber terrorism by social media giants.This dynamic Handbook will be an invaluable resource for scholars and students interested in criminology, digital sociology, terrorism and security, and surveillance studies. Offering practical insights on the need for a coordinated global techno-crime control strategy, it will serve as a resource for policymakers seeking cutting edge solutions to the growing problem of techno-crime.
Edited by Don Hummer, Associate Professor of Criminal Justice, School of Public Affairs, Penn State Harrisburg and James M. Byrne, Professor Emeritus, School of Criminology and Justice Studies, University of Massachusetts Lowell, US
Contents:Techno-crime cause, prevention, and control: issues to consider 1Don Hummer and James M. ByrnePART I TECHNO-CRIME AS WORK1 Hook, line, and sinker: the mechanics of fraud 17Max M. Houck2 Identity theft and financial loss 38Don Hummer and Donald J. Rebovich3 Phishing for profit 54Eric Chan-Tin and Loretta J. Stalans4 Advance fee scams 72Claire Seungeun Lee, Juan Merizalde and Katelyn L. Greer5 Ransomware 86Thomas S. Hyslip and George W. Burruss6 Online health/drug and COVID-19 fraud 105Claire Seungeun Lee, Katelyn L. Greer and Juan Merizalde7 Internet sex crimes 116Loretta J. Stalans and Amber Horning-Ruf8 Sale of private, confidential, and personal data 135Yi Ting Chua9 Online auction fraud 153Claire Seungeun Lee, Katelyn L. Greer and Juan Merizalde10 Internet piracy 162Jaeyong Choi and Jennifer LaPradePART II TECHNO-CRIME AT WORK11 Money laundering 176Arthur J. Lurigio12 Embezzlement 190Emily M. Homer and James Byrne13 The illicit stolen data market 211Rachel L. McNealey and Jin R. LeePART III TECHNO-CRIME AFTER WORK14 Spreading viruses and malicious codes 229Kyung-Shick Choi, Claire Seungeun Lee and Juan Merizalde15 Child pornography, child predators, and sex tourism 248Joshua S. Long16 Online hate crimes 275Ina Kamenova and Arie Perliger17 Cyberstalking 300Sabrina S. Rapisarda and Kimberly R. Kras18 Hacking 331Marlon Mike Toro-AlvarezPART IV THE GLOBAL RESPONSE TO TECHNO-CRIME: PUBLICSECTOR AND PRIVATE SECTOR PREVENTION ANDCONTROL STRATEGIES19 Techno-crime prevention: the role of the private sector and itspartnerships with the public sector 356Jaeyong Choi and Brandon Dulisse20 The jigsaw initiative: theoretical and practical considerations forpreventing harm from extreme and extremist content online 372Neil Shortland and Presley McGarry21 The prevention and control of online consumer fraud 392Catarina Cardoso Fonseca, Samuel Moreira and Inês Guedes22 Managing cyber-risk in offender populations 408Art Bowker23 The prosecution, conviction, and sentencing of techno-criminals: thelimits of international cooperation 422Sean M. Perry and Pauline K. BrennanIndex
‘This pioneering volume must be in the library of any scholar or practitioner concerned with the radical upending of crime and responses to it brought by new information technologies. Never in the history of criminology have changes come so quickly, nor been so poorly understood. The book offers a cornucopia of concepts, data and constructive suggestions to help understand and respond thoughtfully to the challenges.’