Principles of cybercrime:
Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, chi...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2015
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | DE-20 Volltext |
Zusammenfassung: | Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 Online-Ressource (lvi, 524 Seiten) |
ISBN: | 9781139540803 |
DOI: | 10.1017/CBO9781139540803 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049636680 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240405s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781139540803 |c Online |9 978-1-139-54080-3 | ||
024 | 7 | |a 10.1017/CBO9781139540803 |2 doi | |
035 | |a (ZDB-20-CBO)CR9781139540803 | ||
035 | |a (OCoLC)1429561002 | ||
035 | |a (DE-599)BVBBV049636680 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-20 | ||
082 | 0 | |a 345/.0268 |2 23 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Clough, Jonathan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles of cybercrime |c Jonathan Clough |
250 | |a Second edition | ||
264 | 1 | |a Cambridge |b Cambridge University Press |c 2015 | |
300 | |a 1 Online-Ressource (lvi, 524 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction | |
520 | |a Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law | ||
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781107034570 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781107698161 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9781139540803 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
966 | e | |u https://doi.org/10.1017/CBO9781139540803 |l DE-20 |p ZDB-20-CBO |q UBW_PDA_CBO_Kauf_2023 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805082096815833088 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Clough, Jonathan |
author_facet | Clough, Jonathan |
author_role | aut |
author_sort | Clough, Jonathan |
author_variant | j c jc |
building | Verbundindex |
bvnumber | BV049636680 |
classification_rvk | PZ 3700 ST 277 |
collection | ZDB-20-CBO |
contents | Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction |
ctrlnum | (ZDB-20-CBO)CR9781139540803 (OCoLC)1429561002 (DE-599)BVBBV049636680 |
dewey-full | 345/.0268 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 345 - Criminal law |
dewey-raw | 345/.0268 |
dewey-search | 345/.0268 |
dewey-sort | 3345 3268 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft Informatik |
discipline_str_mv | Rechtswissenschaft |
doi_str_mv | 10.1017/CBO9781139540803 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049636680</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240405s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139540803</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-139-54080-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9781139540803</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9781139540803</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429561002</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049636680</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">345/.0268</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clough, Jonathan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of cybercrime</subfield><subfield code="c">Jonathan Clough</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (lvi, 524 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781107034570</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781107698161</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9781139540803</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9781139540803</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">UBW_PDA_CBO_Kauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049636680 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:39:02Z |
indexdate | 2024-07-20T07:27:14Z |
institution | BVB |
isbn | 9781139540803 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034980391 |
oclc_num | 1429561002 |
open_access_boolean | |
owner | DE-20 |
owner_facet | DE-20 |
physical | 1 Online-Ressource (lvi, 524 Seiten) |
psigel | ZDB-20-CBO ZDB-20-CBO UBW_PDA_CBO_Kauf_2023 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Clough, Jonathan Verfasser aut Principles of cybercrime Jonathan Clough Second edition Cambridge Cambridge University Press 2015 1 Online-Ressource (lvi, 524 Seiten) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law Computer crimes Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 Erscheint auch als Druck-Ausgabe 9781107034570 Erscheint auch als Druck-Ausgabe 9781107698161 https://doi.org/10.1017/CBO9781139540803 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Clough, Jonathan Principles of cybercrime Machine generated contents note: Part I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Principles of cybercrime |
title_auth | Principles of cybercrime |
title_exact_search | Principles of cybercrime |
title_exact_search_txtP | Principles of cybercrime |
title_full | Principles of cybercrime Jonathan Clough |
title_fullStr | Principles of cybercrime Jonathan Clough |
title_full_unstemmed | Principles of cybercrime Jonathan Clough |
title_short | Principles of cybercrime |
title_sort | principles of cybercrime |
topic | Computer crimes Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Computer crimes Internetkriminalität |
url | https://doi.org/10.1017/CBO9781139540803 |
work_keys_str_mv | AT cloughjonathan principlesofcybercrime |