Buch, Englisch, 414 Seiten, Format (B × H): 183 mm x 257 mm, Gewicht: 885 g
Buch, Englisch, 414 Seiten, Format (B × H): 183 mm x 257 mm, Gewicht: 885 g
ISBN: 978-1-4398-5831-8
Verlag: Taylor & Francis
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means. The Law of Cybercrimes and Their Investigations is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon.
After an introduction to the history of computer crime, the book reviews a host of topics including:
Information warfare and cyberterrorism
Obscenity, child pornography, sexual predator conduct, and online gambling
Cyberstalking, cyberharassment, cyberbullying, and other types of unlawful expression
Auction fraud, Ponzi and pyramid schemes, access device fraud, identity theft and fraud, securities and band fraud, money laundering, and electronic transfer fraud
Data privacy crimes, economic espionage, and intellectual property crimes
Principles applicable to searches and seizures of computer, other digital devices, and peripherals
Laws governing eavesdropping, wiretaps, and other investigatory devices
The admission of digital evidence in court
Procedures for investigating cybercrime beyond the borders of the prosecuting jurisdiction
Each chapter includes key words or phrases readers should be familiar with before moving on to the next chapter. Review problems are supplied to test assimilation of the material, and the book contains weblinks to encourage further study.
Zielgruppe
Professors and students in cybercrime and internet crime courses, professionals, and investigators.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Section I: Cybercrimes against the Digital Infrastructure and Computer SystemsCrimes Involving the Use of Computers IntroductionFederal Laws Governing Computer Crimes—Historical Development Federal Laws Governing Computer Crime—18 USC § 1030 Case Applications New York’s Computer Crime LawKey Words and Phrases Review Problems Weblinks Endnotes Information Warfare and Cyberterrorism What Is Information Warfare? Brown CommissionBrian C. Lewis Martin C. Libicki Dorothy Denning What Is Cyberterrorism? Laws Regulating Information Warfare and Cyberterrorism Federal Laws State Laws Key Words or Phrases Review Problems WeblinksEndnotes Section II: Cybercrimes against Individuals Crimes against Morality Introduction Obscenity Crimes 18 USC § 1462 18 USC § 1465 18 USC § 1466 18 USC § 1466A 18 USC § 1470 Case Law Pertaining to Online Obscenity Crimes Child Pornography LegislationLegislative History Current Child Pornography Laws 18 USC § 2251: Sexual Exploitation of Children 18 USC § 2252: Certain Activities Relating to Material Involving the Sexual Exploitation of Minors18 USC § 2252A: Certain Activities Relating to Material Constituting or Containing Child Pornography 18 USC § 2425: Use of Interstate Facilities to Transmit Case Law Pertaining to Online Child Pornography Online Gambling Federal Law State Gambling Laws Key Words and PhrasesReview Problems Weblinks Endnotes Crimes Threatening or Resulting in Physical or Mental Harm IntroductionSexual Predator Crimes 18 USC § 2425: Use of Interstate Facilities to Transmit Information abouta Minor Cyberstalking and Cyberharassment Legislation Federal Statutes Cases on Cyberstalking and CyberharassmentJudicial Interpretations of Federal Law Key Words and Phrases Review Problems Weblinks Internet Frauds Introduction Auction Fraud Ponzi and Pyramid SchemesAccess Device Fraud What Is an Access Device? How Is an Access Device Fraud Committed? Electronic Fund Transfer Fraud Identity Theft and Fraud Identity Theft The Federal Identity Theft Crimes State Identity Theft Laws Cyberlaundering Other Fraudulent Schemes Key Words and Phrases Review Problems Weblinks Endnotes Section III: Crimes against Information Assets, and Data PrivacyData Privacy CrimesIntroduction The Fair Credit Reporting Act (FCRA) The Fair and Accurate Credit Transactions Act (FACTA)The Gramm-Leach-Bliley Act (GLBA) The Health Insurance Portability and Accountability Act (HIPAA) After the Breach: Is There a Duty to Notify the Consumer That the Securityof Their Data Has Been Compromised? Key Words and Phrases Review Problems Weblinks Endnotes Intellectual Property Fraud Introduction Criminal Copyright InfringementSoftware Piracy Key Words and Phrases Review Problems Weblinks Section IV: Investigation and Enforcement of CybercrimesSearch and Seizure: Beginning PrinciplesIntroduction Constitutional Principles The Fourth Amendment Reasonable Expectation of Privacy Workplace Searches Protection from Government Activity The Mere Evidence Rule Searches with and without a Warrant Consent Plain View Exigent Circumstances Incident to a Lawful ArrestInventory Search Border Search Administrative Searches Automobile Exception Special Needs Exception Key Words and Phrases Review Problems Weblinks Endnotes Search and Seizure: Electronic Evidence IntroductionConducting the Search or SeizureSearches and Seizures without a Warrant Key Words and PhrasesReview Problems Weblinks Wiretapping and Eavesdropping IntroductionStatutes and RegulationsCase LawKey Words and PhrasesReview Problems Weblinks Access to Stored CommunicationsIntroductionCase Law Key Words and PhrasesReview Problems WeblinksPen Register, Trap and Trace, and GPS Devices Introduction Pen Register and Trap and Trace Devices Global Positioning Systems (GPSs) RFID TechnologyKey Words and Phrases Review Problems WeblinksDigital Evidence and Forensic Analysis IntroductionNature of EvidenceAdmissibility of EvidencePreservation of Evidence Chain of Custody Admissibility of Digital Evidence Th