Principles of cybercrime:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge Univ. Press
2010
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | LIII, 449 S. |
ISBN: | 9780521899253 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036085913 | ||
003 | DE-604 | ||
005 | 20120820 | ||
007 | t | ||
008 | 100318s2010 |||| 00||| eng d | ||
020 | |a 9780521899253 |c hardback |9 978-0-521-89925-3 | ||
035 | |a (OCoLC)730966247 | ||
035 | |a (DE-599)BVBBV036085913 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-12 |a DE-355 | ||
050 | 0 | |a K5215 | |
082 | 0 | |a 345/.0268 |2 22 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Clough, Jonathan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles of cybercrime |c Jonathan Clough |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2010 | |
300 | |a LIII, 449 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018976874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018976874 |
Datensatz im Suchindex
_version_ | 1804141146433126401 |
---|---|
adam_text | CONTENTS
Preface
ix
Acknowledgements
xi
List of abbreviations
xii
Table of cases
xiii
Table of legislation
xxvii
PART I Introduction
1
1
Cybercrime
3
1.
The evolution of cybercrime
3
2.
The challenges of cybercrime
5
3.
Defining cybercrime
8
4.
Cyberterrorism
11
5.
The scale of the problem
13
6.
Online/offline consistency
15
7.
Virtual crimes?
16
8.
A global problem: the Convention on Cybercrime
21
part
π
Computer as target
25
2
Computer as target
27
1.
Introduction
27
2.
The prevalence of cybercrime
39
3.
The legislative environment
40
3
Access offences
48
1.
Introduction
48
2.
The meaning of computer
52
3.
Access
58
VI
CONTENTS
4.
Unauthorised
70
5.
Fault element
92
6.
Additional elements
95
4
Impairment of data
101
1.
Introduction
101
2.
Legislative provisions
102
3.
Conduct causing modification or impairment
106
4.
Modification or impairment 111
5
Misuse of devices
120
1.
Introduction
120
2.
Australia
123
3.
Canada
124
4.
The United Kingdom
128
5.
The United States
130
6
Interception of data
135
1.
The changing nature of telecommunications
135
2.
The legislative framework
136
3.
The meaning of telecommunication
143
4.
What is a communication? (Content vs. Traffic data)
152
5.
Interception (Live vs. Stored communications)
164
part in Fraud and related offences
181
7
Fraud
183
L
Fraudonline 183
2.
The scale of the problem
199
3.
Legal responses
201
4.
Identity theft
207
8
Criminal copyright infringement
221
1.
Copyright infringement is (not) theft
221
2.
Legislative provisions
225
9
Spam
232
1.
Electronic junk mail
232
2.
Regulating spam
235
3.
Anti-spam legislation
238
CONTENTS
Vil
PART
iv
Content-related offences
245
10
Child pornography
247
1.
Child abuse online
247
2.
The criminalisation of child pornography
251
3.
Defining child pornography
255
4.
Producing child pornography
282
5.
Offering or making available
286
6.
Distributing or transmitting
292
7.
Procuring child pornography
295
8.
Possession of child pornography
301
9.
Defences
324
part v Offences against the person
329
11
Grooming
331
1.
Sexual predators online
331
2.
Transmitting indecent or obscene material to minors
337
3.
Grooming
343
4.
Inducing or procuring
351
5.
Travelling with intent
361
12
Cyberstalking
365
1.
Harassment in cyberspace
365
2.
Legislative responses
368
3.
Forms of cyberstalking
375
13
Voyeurism
388
1.
Digital voyeurs
388
2.
Criminalising voyeurism
389
3.
Legislative responses
393
part
Vi
Jurisdiction
403
14
Jurisdiction
405
1.
Crime in cyberspace
405
2.
Prescriptive jurisdiction
406
3.
Adjudicative jurisdiction
410
4.
Enforcement jurisdiction
413
Bibliography
417
Index
438
|
any_adam_object | 1 |
author | Clough, Jonathan |
author_facet | Clough, Jonathan |
author_role | aut |
author_sort | Clough, Jonathan |
author_variant | j c jc |
building | Verbundindex |
bvnumber | BV036085913 |
callnumber-first | K - Law |
callnumber-label | K5215 |
callnumber-raw | K5215 |
callnumber-search | K5215 |
callnumber-sort | K 45215 |
callnumber-subject | K - General Law |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)730966247 (DE-599)BVBBV036085913 |
dewey-full | 345/.0268 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 345 - Criminal law |
dewey-raw | 345/.0268 |
dewey-search | 345/.0268 |
dewey-sort | 3345 3268 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01296nam a2200361 c 4500</leader><controlfield tag="001">BV036085913</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120820 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100318s2010 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521899253</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-521-89925-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)730966247</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036085913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">K5215</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">345/.0268</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clough, Jonathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of cybercrime</subfield><subfield code="c">Jonathan Clough</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge Univ. Press</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">LIII, 449 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018976874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018976874</subfield></datafield></record></collection> |
id | DE-604.BV036085913 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:11:14Z |
institution | BVB |
isbn | 9780521899253 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018976874 |
oclc_num | 730966247 |
open_access_boolean | |
owner | DE-20 DE-12 DE-355 DE-BY-UBR |
owner_facet | DE-20 DE-12 DE-355 DE-BY-UBR |
physical | LIII, 449 S. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Cambridge Univ. Press |
record_format | marc |
spelling | Clough, Jonathan Verfasser aut Principles of cybercrime Jonathan Clough 1. publ. Cambridge [u.a.] Cambridge Univ. Press 2010 LIII, 449 S. txt rdacontent n rdamedia nc rdacarrier Computer crimes Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018976874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Clough, Jonathan Principles of cybercrime Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Principles of cybercrime |
title_auth | Principles of cybercrime |
title_exact_search | Principles of cybercrime |
title_full | Principles of cybercrime Jonathan Clough |
title_fullStr | Principles of cybercrime Jonathan Clough |
title_full_unstemmed | Principles of cybercrime Jonathan Clough |
title_short | Principles of cybercrime |
title_sort | principles of cybercrime |
topic | Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Computer crimes Internetkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018976874&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cloughjonathan principlesofcybercrime |