Curtis | The Law of Cybercrimes and Their Investigations | Buch | 978-1-4398-5831-8 | sack.de

Buch, Englisch, 414 Seiten, Format (B × H): 183 mm x 257 mm, Gewicht: 885 g

Curtis

The Law of Cybercrimes and Their Investigations


1. Auflage 2011
ISBN: 978-1-4398-5831-8
Verlag: Taylor & Francis

Buch, Englisch, 414 Seiten, Format (B × H): 183 mm x 257 mm, Gewicht: 885 g

ISBN: 978-1-4398-5831-8
Verlag: Taylor & Francis


Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means. The Law of Cybercrimes and Their Investigations is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon.

After an introduction to the history of computer crime, the book reviews a host of topics including:

Information warfare and cyberterrorism

Obscenity, child pornography, sexual predator conduct, and online gambling

Cyberstalking, cyberharassment, cyberbullying, and other types of unlawful expression

Auction fraud, Ponzi and pyramid schemes, access device fraud, identity theft and fraud, securities and band fraud, money laundering, and electronic transfer fraud

Data privacy crimes, economic espionage, and intellectual property crimes

Principles applicable to searches and seizures of computer, other digital devices, and peripherals

Laws governing eavesdropping, wiretaps, and other investigatory devices

The admission of digital evidence in court

Procedures for investigating cybercrime beyond the borders of the prosecuting jurisdiction

Each chapter includes key words or phrases readers should be familiar with before moving on to the next chapter. Review problems are supplied to test assimilation of the material, and the book contains weblinks to encourage further study.

Curtis The Law of Cybercrimes and Their Investigations jetzt bestellen!

Zielgruppe


Professors and students in cybercrime and internet crime courses, professionals, and investigators.


Autoren/Hrsg.


Weitere Infos & Material


Section I: Cybercrimes against the Digital Infrastructure and Computer SystemsCrimes Involving the Use of Computers IntroductionFederal Laws Governing Computer Crimes—Historical Development Federal Laws Governing Computer Crime—18 USC § 1030 Case Applications New York’s Computer Crime LawKey Words and Phrases Review Problems Weblinks Endnotes Information Warfare and Cyberterrorism What Is Information Warfare? Brown CommissionBrian C. Lewis Martin C. Libicki Dorothy Denning What Is Cyberterrorism? Laws Regulating Information Warfare and Cyberterrorism Federal Laws State Laws Key Words or Phrases Review Problems WeblinksEndnotes Section II: Cybercrimes against Individuals Crimes against Morality Introduction Obscenity Crimes 18 USC § 1462 18 USC § 1465 18 USC § 1466 18 USC § 1466A 18 USC § 1470 Case Law Pertaining to Online Obscenity Crimes Child Pornography LegislationLegislative History Current Child Pornography Laws 18 USC § 2251: Sexual Exploitation of Children 18 USC § 2252: Certain Activities Relating to Material Involving the Sexual Exploitation of Minors18 USC § 2252A: Certain Activities Relating to Material Constituting or Containing Child Pornography 18 USC § 2425: Use of Interstate Facilities to Transmit Case Law Pertaining to Online Child Pornography Online Gambling Federal Law State Gambling Laws Key Words and PhrasesReview Problems Weblinks Endnotes Crimes Threatening or Resulting in Physical or Mental Harm IntroductionSexual Predator Crimes 18 USC § 2425: Use of Interstate Facilities to Transmit Information abouta Minor Cyberstalking and Cyberharassment Legislation Federal Statutes Cases on Cyberstalking and CyberharassmentJudicial Interpretations of Federal Law Key Words and Phrases Review Problems Weblinks Internet Frauds Introduction Auction Fraud Ponzi and Pyramid SchemesAccess Device Fraud What Is an Access Device? How Is an Access Device Fraud Committed? Electronic Fund Transfer Fraud Identity Theft and Fraud Identity Theft The Federal Identity Theft Crimes State Identity Theft Laws Cyberlaundering Other Fraudulent Schemes Key Words and Phrases Review Problems Weblinks Endnotes Section III: Crimes against Information Assets, and Data PrivacyData Privacy CrimesIntroduction The Fair Credit Reporting Act (FCRA) The Fair and Accurate Credit Transactions Act (FACTA)The Gramm-Leach-Bliley Act (GLBA) The Health Insurance Portability and Accountability Act (HIPAA) After the Breach: Is There a Duty to Notify the Consumer That the Securityof Their Data Has Been Compromised? Key Words and Phrases Review Problems Weblinks Endnotes Intellectual Property Fraud Introduction Criminal Copyright InfringementSoftware Piracy Key Words and Phrases Review Problems Weblinks Section IV: Investigation and Enforcement of CybercrimesSearch and Seizure: Beginning PrinciplesIntroduction Constitutional Principles The Fourth Amendment Reasonable Expectation of Privacy Workplace Searches Protection from Government Activity The Mere Evidence Rule Searches with and without a Warrant Consent Plain View Exigent Circumstances Incident to a Lawful ArrestInventory Search Border Search Administrative Searches Automobile Exception Special Needs Exception Key Words and Phrases Review Problems Weblinks Endnotes Search and Seizure: Electronic Evidence IntroductionConducting the Search or SeizureSearches and Seizures without a Warrant Key Words and PhrasesReview Problems Weblinks Wiretapping and Eavesdropping IntroductionStatutes and RegulationsCase LawKey Words and PhrasesReview Problems Weblinks Access to Stored CommunicationsIntroductionCase Law Key Words and PhrasesReview Problems WeblinksPen Register, Trap and Trace, and GPS Devices Introduction Pen Register and Trap and Trace Devices Global Positioning Systems (GPSs) RFID TechnologyKey Words and Phrases Review Problems WeblinksDigital Evidence and Forensic Analysis IntroductionNature of EvidenceAdmissibility of EvidencePreservation of Evidence Chain of Custody Admissibility of Digital Evidence Th



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.