Understanding and Managing Cybercrime

ISBN-10: 020543973X
ISBN-13: 9780205439737
Edition: 2006
List price: $112.40 Buy it from $33.00
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Used Starting from $49.24
New Starting from $121.11
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Careers in Legal Assisting Online content $4.95 $1.99
Add to cart
Study Briefs
Sociology Online content $4.95 $1.99
Add to cart
Study Briefs
Business Ethics Online content $4.95 $1.99
Add to cart
Study Briefs
Business Law Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $112.40
Copyright year: 2006
Publisher: Allyn & Bacon, Incorporated
Publication date: 10/20/2005
Binding: Paperback
Pages: 512
Size: 7.25" wide x 9.50" long x 1.00" tall
Weight: 1.584
Language: English

SAMUEL C. MCQUADE III currently serves as the Professional Studies Graduate Program Coordinator at the Rochester Institute of Technology. He is a former Air National Guard security officer, deputy sheriff and police officer, police organizational change consultant, National Institute of Justice Program Manager for the U.S Department of Justice, and Study Director for the Committee on Law and Justice at the National Research Council of the National Academies of Sciences. He is the author of Understanding and Managing Cybercrime, among many other publications.

Preface
Foreword
Acknowledgments
Understanding Cybercrime
Cybercrime: A New High-Tech Crime Paradigm
Introduction: What Is Cybercrime?
Understanding Human Behavior in Evolving Social and Technological Contexts
Relatively Normal versus Deviant Behavior
Normal versus Deviant Use of Information Technology
Inappropriate Use of Cell Phones in Public
Normalcy, Deviancy, and Crime in Cyberspace
High-Tech Crime Constructs and Terms
White Collar, Financial, and Organized Crime
The Emergence of Computer-Related Abuse and Crime
Policing without Desktop and Laptop Computers and Other IT Devices
Technology Fusion Brings about Cybercrime
Policing with Desktop and Laptop Computers and other IT Devices
The Importance of Defining and Understanding Crime Terms
What Is Cybercrime and Why Should We Care about It?
Definitional Constructs of High-Tech Crime
Creating, Complying with, and Enforcing Laws and Regulations
Research and Justice Systems Improvement
Why Definitions of Crime Matter: State of New York v. Robert Versaggi
Principles for Better Understanding Cybercrime and Future Crime Labels
Recognize and Accept that Views of Cybercrime Differ
Education and Training Helps Professionals Stay Informed
The Inter and Multidisciplinary Nature of Cybercrime and Organization of the Text
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Information and Other Assets in Need of Assurance
Introduction: What Are We Protecting?
Technology, Information, and Data in Justice and Security Management
Six Primary Characteristics of Information
Six Primary Characteristics of Data
Data versus Knowledge Management
Additional Knowledge and Data Considerations
Information Assurance
The Basic Prescription for What Is Needed: CIA
Becoming Pragmatic about Information Assurance
Who Can You Trust? Credit Card Fraud by "Friends"
Attack Dimensions
Cyber versus Physical Attacks and Security Systems
Insider versus Outsider Threats to Assets
A Phone Service-Scamming Prison Warden
A Collective of Money-Laundering Professionals
A Double Rip-off Mortgage Scheme
Diagnosing and Responding to Threats and Attacks
Critical Infrastructure Protection
What are Critical Infrastructures and Critical Information Infrastructures?
Conceptual and National Differences in Infrastructures
Critical Information Infrastructure Protection
Can the Net Be Taken Down?
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
IT-Enabled Abuse, Attacks, and Crimes
Introduction: How Are Information Technologies Misused?
Types of Abuse, Attacks, and Crime
Writing and Distributing Malicious Code
Differences between Computer Viruses, Worms, and Trojans
Fraudulent Schemes and Theft
How One Student Avoided Being Defrauded Online
A Student Victim of Credit Card Fraud
Interfering with and Disrupting Computer Services
How One Student Fought Fraud with Fraud
Suckered as the Result of Porn Curiosity
Denial-of-Service Attacks Hit Gaming Website
Computer Spying and Intrusions
Free and Illegal Phone Phreaking
The Infamous Back Orifice Remote Control Tool
Unauthorized and Illegal File Sharing
Abuse of Computers and Electronic Devices in Academia
Mass-Distributed Illegal File Sharing
Online Harassment and Computer-Enabled Sex Crimes
Online Harassment via a Website Soliciting Sex
Cyberstalking Star Trek Voyager's Seven of Nine
Evolving Forms of Cybercrimes, Attacks, and Conflict
Emerging Crime and Attack Trends
Futuristic Forms of Cyber Conflict
Installation of Multiple Alien Servers
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Computer Abusers and Cybercriminals
Introduction: Who Commits Computer Abuse and Cybercrime?
Behavioral and Social Traits of Abusers, Attackers, and Criminals
Social Engineering Tactics
Victimized by a Social Engineering Friend
The Adversarial SKRAM Model
Three Friends, of Whom Two Were Hackers
Juvenile Geek Paid for Corporate Espionage and Sabotage
What Cybercriminals Fear
SKRAM Needed to Create and Use Fake Ids
Categorizing Cyber Abusers, Attackers, and Criminals
Stereotypical and Other Adversary Profiles
Who Are Cybercriminals Really?
A More Comprehensive Categorization Schema
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Theoretical and Social Perspectives on Cybercrime
Theories of Computer-Enabled Abuse and Crime
Introduction: Why Do People Commit Cyber Abuse and Crime?
Theories: The Building Blocks of Knowledge and Understanding
The Practicality of Good Theories
The Process of Knowledge-Building
General Criminological Explanations of Cybercrime
Classical/Choice Theory
Rational Choice Theory
General Deterrence Theory
People Can and Sometimes Do Choose to Change Their Criminal Ways
Routine Activities Theory
Trait Theory
Major Strengths and Limitations of Classical Criminology
Arousal Theory
Cognitive Theory
Behavioral Theory
Social Process Theory
Major Strengths and Limitations of Trait Theories
Social Control Theories
Social Learning Theories
Neutralization Theory
Labeling Theory
Differential Enforcement
Major Strengths and Limitations of Social Process Theories
Negative Labels as Badges of Honor
Social Structure Theory
General Social Structure Theory
Social Disorganization Theory
Strain Theories
Cultural Deviance Theory
Conflict Theory
Major Strengths and Limitations of Social Structure Theories
General Conflict Theory
Marxist Criminology
The Case of Unabomber Ted Kaczynski
The Presidential Pardoning of Financier Mark Rich
Other Conflict Theories of Crime
Making an Example of Martha Stewart?
Integrated and Technological Theories
Overview of Integrated Theories
Major Strengths and Weaknesses of Conflict Theory
Which Theories Help Explain This Criminal Behavior?
Technology-Enabled Crime, Policing, and Security
New Crime: Fictitious Characters Socially Engineer Real-World Stabbing
Strengths and Limitations of Integrated and Technological Theories
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
The Social and Economic Impacts of Cybercrime
Introduction: Who Is Harmed and by How Much Cybercrime?
The Human and Financial Costs of Computer Abuse and Cybercrime
Victimization Concepts
How Victimization Can Lead to Cybercrime
Harm Experienced by Victims of Cybercrime
Cybercrime as Nonviolent Property Crime
How Much Cybercrime Is There?
Primary Means of Generating Crime Statistics
An Examination of Early Uniform Crime Reports
Overview of Major IT-Enabled Abuse and Crime Studies
Research by U.S. Organizations that Track Cybercrime
Economic Estimates and Impact Studies of Cybercrime
A Worldwide Online Auction Scam
What Are the Economic Impacts of Spam?
Why Research the Nature and Extent of Cybercrime?
The General State of Research on Cybercrime
Types of Research Needed on Cybercrime
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Emerging and Controversial Cybercrime Issues
Introduction: How is IT Creating New Opportunities for Cybercrime?
Emerging Potential for IT-Enabled Abuse and Cybercrime
Transformations in Academic Education and Professional Training
Online Banking and E-Commerce
Benefits and Risks of Online Auctions
Meeting and Courting Significant Others Online
IT-Enabled Democratization
An Obsessive Cyber Spooning Love Affair
Controversial Cybercrime-Related Issues
The Computer Hacker Subculture
How the Movie Hackers Inspired One Student to Abuse Computers
The Open Source Community
The Death of Cyberpunk
Electronic Gaming Enclaves
Online Pornography
Information Privacy Protections and Infringement
A Discredited Study on the Amount of Internet Pornography
Real-Time Electronic Surveillance, Tracking, and Recording Capabilities Relative to Behavioral, Investigative, and Security Functions
Basic Principles for Safeguarding Information Privacy
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Managing Cybercrime
Cyber Laws and Regulations
Introduction: How Does Society Prohibit Cybercrime?
The Rationale and Reach of Cyber Laws and Regulations
Legal Philosophies
Concepts of Due Process and Legal Jurisprudence
International Agreements for Managing Cybercrime
Determining Jurisdiction in Cyber Suits: Zippo Manufacturing v. Zippo.com
Operation Buccaneer Targets International Warez Groups
Bodies of Law Pertaining to IT and Cybercrime Issues
International Computer Gaming Bust
Constitutional Law and Case Law
The U.S. Constitution and its Amendments
ACLU v. Reno: Striking Down of the Communications Decency Act
Criminal Law
Administrative and Regulatory Law
Code Writer Faces Federal Prosecution
Intellectual Property (IP) Law
Tort Law
Types of Intellectual Property Law Protections
How Laws and Regulations Are Created and Administered
Legislative Bills and Executive Approval
Implementation and Enforcement of Laws and Regulations
Federal Regulatory Agencies with InfoSec Oversight Responsibilities
Key Federal Cybercrime Laws and Information Security Regulations
Laws Specifying Illegal Use of Computers and Electronic Devices
Laws that Facilitate or Limit Cybercrime Investigations
Laws Protecting Children from Online Pornography
Laws Specifying Information Security Requirements
Laws Affording Privacy Protections
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Investigating and Prosecuting Cybercrime
Introduction: What Happens When Cybercrime Laws Are Broken?
Collaborative Criminal Justice System Responses to Cybercrime
Roles of Public Law Enforcement and Private Security
Dedicated Cybercrime Investigation and Prosecution Units
Key Investigative and Technical Assistance Agencies
Legal Issues Governing Investigative Procedures
Evidentiary Challenges Faced by Investigators and Prosecutors
Physical and Cyber Monitoring, Surveillance, and Investigative Operations
Mapp v. Ohio Results in Nationwide Exclusionary Rule
Crime Scene Processing and Evidence Management
Responding to and Protecting the Crime Scene
Typical Crime Scene Processing Equipment
Searching for Physical and Electronic Evidence of Counterfeiting
Collecting and Preserving Physical and Electronic Evidence
Controversy and Evidentiary Challenges of Child Porn Morphing
The Challenge of Putting a Cybercriminal Behind a Keyboard
Interviewing Victims, Witnesses, and Cybercriminals
Prosecuting Cybercriminals
Pretrial Procedures and Hearings
Trial Procedures and the Art of Presenting Evidence
Trial Verdicts, Sentencing Policies, and Appeals
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Preventing Cybercrime with Information Security
Introduction: How Can We Better Protect our Computer Systems and Data?
Personal and Organizational Information Security
What Every Person Should Know about Information Security
A Security Lesson about Purchasing Inferior Technology
A Case of Sloppy Password Administration
Software Firewall Programs May Not Provide Complete Protection
The Importance of Patch Management
Backup Data Only on Trusted Media!
Broadband Connectivity: Learn to be a Savvy ISP Customer
Avoid Being Swindled in Online Auction Fraud
A Security Conscious Traveling Executive
Assuring Protection of Information in Organizations
Advancing the Security Posture of Organizations
Security Change Procedures
Risk Management
Due Care and Diligence
The Need for Computer Use and Security Policies
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Future Opportunities for Managing Cybercrime
Introduction: Where Can We Go from Here?
What More Can Government Do to Prevent Cybercrime?
Preparing to Manage Cybercrime
Actions Government Can Take to Prevent and Control Cybercrime, Improve Information Security Capabilities Nationally, and Protect Critical Information Infrastructure
Getting Set and Moving Forward
Information Insecurity at ChoicePoint
Computer Ethics Education and Intolerance of Cybercrime
The Philosophy of Ethics
Get Ahead by Joining a Professional Membership Association
Not Everyone Likes Using Computers
Classical Ethics Theories
Unethical Employment Practices: Don't Get Burned!
Computer Ethics
Is It Ethical to Use a Work Computer for Personal Reasons?
Key Terms and Concepts
Critical Thinking and Discussion Questions
References and Endnotes
Cyber Stakeholders and Online Resources
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×