Skip to content

Digital Crime and Digital Terrorism

Spend $50 to get a free movie!

ISBN-10: 0131141376

ISBN-13: 9780131141377

Edition: 2006

Authors: Robert W. Taylor, Tory J. Caeti, Eric J. Fritsch, John Liederbach, Kall Loper

List price: $87.40
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


For courses in terrorism and computer crime. This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes.
Customers also bought

Book details

List price: $87.40
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 3/1/2005
Binding: Paperback
Pages: 416
Size: 6.75" wide x 9.00" long x 0.75" tall
Weight: 1.342
Language: English

(NOTE:Each chapter concludes with Summary and Review Questions.)
The Etiology Of Digital Crime And Digital Terrorism
Introduction and Overview of Digital Crime
Chapter Objectives
New Threats to the Information Age
Purpose and Scope of this Book
Digital Crime and Digital Terrorism
A Developmental Perspective of the Growing Problem
Increases in Cyber Victimization
The Changing Character of Cyber Victimization
Types of Computer Crime
The Computer as Target
The Computer as an Instrument of a Crime
The Computer as Incidental to a Crime
Crimes Associated with the Prevalence of Computers
Digital Terrorism
Chapter Objectives
Defining the Concepts
Buzzwords: Information Warfare and Cyber-Terrorism
Risk and Critical Infrastructure Attacks
Information Attacks
Web-Site Defacement
Cyberplagues-Viruses and Worms
Distributed Denial of Service Attacks
Unauthorized Intrusions
Cyber and Technological Facilitation. Facilitation of Attack
Data Hiding
Propaganda and Promotion
Cyber-Terrorism as an Adjunct Attack
Al-Qaeda and Information Technology
China and Information Warfare
The Criminology of Computer Crime
Choice Theory
Routine Activities
Deterrence Theory
Psychological Theories
Moral Development and Crime
Personality Disorders
Pedophiles and Psychological Theory
Social Structure Theories. Strain Theory
White-Collar Crime and Strain Theory
Subculture Theory
Hackers and Social Structure Theories
Social Process Theories. Learning Theory
Social Control Theory
Virus Writers and Social Process Theories
Terrorism and Political Theory
Digital Criminals and Hackers