Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts tagged Information Security
Future Crimes: Inside The Digital Underground And The Battle For Our Connected World

MAY CONTAIN MARKUP

Marc Goodman

In "Future Crimes: Inside The Digital Underground And The Battle For Our Connected World," author Marc Goodman delves into the dark and complex world of cybercrime. He explores the ways in which technology has transformed criminal activities, from hacking and identity theft to cyberterrorism and digital espionage. Goodman sheds light on the threats that the digital age poses to individuals, organizations, and governments, urging readers to become more vigilant and informed about cybersecurity. Through detailed research and gripping real-life stories, "Future Crimes" offers a compelling and sobering look at the vulnerabilities of our interconnected world.

ANCHOR BOOKS. A Division of Penguin Random House LLC New York. 2016. 601p.

Digital Crime and Digital Terrorism

MAY CONTAIN MARKUP

ROBERT W. TAYLOR, TORY J.CAETI, D. KALL LOPER, ERIC J. FRITSCH, and JOHN LIEDERBACH

FROM THE PREFACE: “The first section of the book covers the etiology of the digital crime and digital terrorism problem. The focus in this section is on the types of crimes and acts of terrorism that are committed using computers, networks, and the Internet. Additionally, the reasons why offenders commit these types of crimes are examined in relation to current criminological theories and explanations. As the reader will find, applying criminological theory to digital crime and terrorism is a relatively recent conception. Finally, the section concludes with a chapter on digital criminals and hackers. Chapter I provides an introduction and overview of computer crime. In particular, a categorization of types of computer crimes is presented including I) the computer as the target, 2) the computer as an instrument of a crime, 3) the computer as incidental to crime, and 4) crimes associated with the prevalence of computers. Chapter 2 provides a definition and overview of two key areas of concern in regards to computer crimes, specifically "information warfare" and "cyber-terrorism." Chapter 3 reviews criminological theories that can explain digital crime. Since few theories have been applied directly to digital crime, this chapter focuses on the classic criminological theories that can be applied to digital crime. In other words, the theories discussed in this chapter were developed to explain crime in general, not digital crime specifically. In particular, this chapter focuses on choice, deterrence, psychological. social structure, and social process theories. Finally, Chapter 4 presents an overview of the hacker subculture and presents a typology of hacker types based on relative levels of skill, resources, and enculturation in the values of the hacker subculture. The chapter closes with a discussion of contemporary hacker roles and terminology.”

Prentice Hall. Upper Saddle River, New Jersey. 2006. 413p.