Principles of cybercrime:
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that c...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2010
|
Schlagworte: | |
Online-Zugang: | BSB01 UBG01 Volltext |
Zusammenfassung: | We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (liii, 449 pages) |
ISBN: | 9780511845123 |
DOI: | 10.1017/CBO9780511845123 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043923773 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161202s2010 |||| o||u| ||||||eng d | ||
020 | |a 9780511845123 |c Online |9 978-0-511-84512-3 | ||
024 | 7 | |a 10.1017/CBO9780511845123 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511845123 | ||
035 | |a (OCoLC)706989967 | ||
035 | |a (DE-599)BVBBV043923773 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 345/.0268 |2 22 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
100 | 1 | |a Clough, Jonathan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles of cybercrime |c Jonathan Clough |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2010 | |
300 | |a 1 online resource (liii, 449 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Cybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction | |
520 | |a We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes | ||
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-72812-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-89925-3 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511845123 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029332851 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511845123 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511845123 |l UBG01 |p ZDB-20-CBO |q UBG_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176848406446080 |
---|---|
any_adam_object | |
author | Clough, Jonathan |
author_facet | Clough, Jonathan |
author_role | aut |
author_sort | Clough, Jonathan |
author_variant | j c jc |
building | Verbundindex |
bvnumber | BV043923773 |
classification_rvk | PZ 3700 |
collection | ZDB-20-CBO |
contents | Cybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction |
ctrlnum | (ZDB-20-CBO)CR9780511845123 (OCoLC)706989967 (DE-599)BVBBV043923773 |
dewey-full | 345/.0268 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 345 - Criminal law |
dewey-raw | 345/.0268 |
dewey-search | 345/.0268 |
dewey-sort | 3345 3268 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1017/CBO9780511845123 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03018nmm a2200469zc 4500</leader><controlfield tag="001">BV043923773</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161202s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511845123</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-84512-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511845123</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511845123</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706989967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043923773</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">345/.0268</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clough, Jonathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of cybercrime</subfield><subfield code="c">Jonathan Clough</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (liii, 449 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-72812-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-89925-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511845123</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029332851</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511845123</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511845123</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBG_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043923773 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:38:42Z |
institution | BVB |
isbn | 9780511845123 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029332851 |
oclc_num | 706989967 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | 1 online resource (liii, 449 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO UBG_PDA_CBO |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Clough, Jonathan Verfasser aut Principles of cybercrime Jonathan Clough Cambridge Cambridge University Press 2010 1 online resource (liii, 449 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Cybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the US, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes Computer crimes Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s 1\p DE-604 Erscheint auch als Druckausgabe 978-0-521-72812-6 Erscheint auch als Druckausgabe 978-0-521-89925-3 https://doi.org/10.1017/CBO9780511845123 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Clough, Jonathan Principles of cybercrime Cybercrime -- Computer as target -- Access offences -- Impairment of data -- Misuse of devices -- Interception of data -- Fraud -- Criminal copyright infringement -- 'Spam' -- Child pornography -- 'Grooming' -- Cyberstalking -- Voyeurism -- Jurisdiction Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Principles of cybercrime |
title_auth | Principles of cybercrime |
title_exact_search | Principles of cybercrime |
title_full | Principles of cybercrime Jonathan Clough |
title_fullStr | Principles of cybercrime Jonathan Clough |
title_full_unstemmed | Principles of cybercrime Jonathan Clough |
title_short | Principles of cybercrime |
title_sort | principles of cybercrime |
topic | Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Computer crimes Internetkriminalität |
url | https://doi.org/10.1017/CBO9780511845123 |
work_keys_str_mv | AT cloughjonathan principlesofcybercrime |