Encyclopedia of Cybercrime, 1st Edition

  • Published By:
  • ISBN-10: 0313087040
  • ISBN-13: 9780313087042
  • DDC: 364.16803
  • Grade Level Range: 9th Grade - College Senior
  • 210 Pages | eBook
  • Original Copyright 2008 | Published/Released December 2009
  • This publication's content originally published in print form: 2008

  • Price:  Sign in for price

About

Overview

For over fifty years crime enabled by computing and telecommunications technologies have increasingly threatened societies as they have become reliant on information systems for sustaining modernized living. Cybercrime is not a new phenomenon, rather an evolving one with respect to adoption of information technology for abusive and criminal purposes. Further, by virtue of the myriad ways in which IT is abused, it represents a technological shift in the nature of crime rather than a new form of criminal behavior. In other words, the nature of crime and its impacts on society are changing to the extent computers and other forms of IT are used for illicit purposes. Understanding the subject, then, is imperative to combating it and to addressing it at various levels.

This work is the first comprehensive encyclopedia to address cybercrime. Topical articles address all key areas of concern and specifically those having to with: terminology, definitions and social constructs of crime; national infrastructure security vulnerabilities and capabilities; types of attacks to computers and information systems; computer abusers and cybercriminals; criminological, sociological, psychological and technological theoretical underpinnings of cybercrime; social and economic impacts of crime enabled with information technology inclusive of harms experienced by victims of cybercrimes and computer abuse; emerging and controversial issues such as online pornography, the computer hacking subculture and potential negative effects of electronic gaming and so-called "computer addiction"; bodies and specific examples of U.S. federal laws and regulations that help to prevent cybercrimes; examples and perspectives of law enforcement, regulatory and professional member associations concerned about cybercrime and its impacts; and computer forensics as well as general investigation/prosecution of high tech crimes and attendant challenges within the United States and internationally.

Reviews

"From phreaking to phishing, from botnets to zombies, the world of cyber crime is replete with jargon. As this type of crime proliferates, knowing the jargon becomes increasingly important in understanding the extent and nature of these illegal acts. Encyclopedia of Cybercrime offers a ready-reference guide of nontechnical explanations about important issues related to cyber crime. Alphabetically arranged, the 80+ entries generally run between one to four pages. Cross-referenced terms are set in bold face and each authored entry concludes with a list of suggested readings. Topics include terminology, security vulnerabilities and technologies, types of attacks, the psychology and sociology of cyber criminals, the impact of cyber crime on individual victims and society and regulatory and law enforcement efforts. Also included are a chronology of cyber crime and a resource guide that includes recommended books, websites and an annotated list of both documentary and feature films. This volume would be an excellent reference resource for those wishing to better understand the issues related to cyber crime. Of particular interest to schools might be entries related to copyright infringement, gaming, social networking and protection of children in an online environment. Recommended for high school and public libraries."--Doug's Student Reference Room, August 2009

— Doug Achterman

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Contents.
List of Entries.
Preface.
Acknowledgments.
Introduction.
Chronology of Selected Cybercrime-Related Events.
1: Academic Misconduct.
2: Addiction, Online.
3: Adult Entertainment and Pornography.
4: Arpanet.
5: Attack Vectors.
6: Banking Online.
7: Botnets, Zombies, and Remote Control Attacks.
8: Careers in Investigating and Preventing Cybercrime.
9: Certifications.
10: Certified Information Systems Security Professional Standard.
11: Child Pornography.
12: Computer Crime and Intellectual Property Section.
13: Computer Emergency Response Team.
14: Computer Forensics.
15: Computerization.
16: Copyright Infringement.
17: Corporate Espionage.
18: Council of Europe Convention on Cybercrime.
19: Critical Information Infrastructure.
20: Cryptography and Encryption.
21: Cyber Bullying, Threats, Harassment, and Stalking.
22: Cybercrime.
23: Cybercrime Attacks.
24: Cybercriminals.
25: Cybercriminals, Famous.
26: Cyber/Internet Culture.
27: Cyber Safety and Ethics Initiatives.
28: Cyberspace.
29: Cybersquatting.
30: Cyberterrorism.
31: Cyber Whimsy.
32: Dedicated Cybercrime Investigation and Prosecution Units.
33: Denial of Service Attacks.
34: Digital Youth Culture and Social Networking.
35: Election and Voting Fraud.
36: Electronic Frontier Foundation.
37: Ethical Use of Computers.
38: Fraudulent Schemes and Theft Online.
39: Gaming Online.
40: Government Intelligence Gathering.
41: Hacking and the Hacker Subculture.
42: Identity Theft.
43: Information Assurance.
44: Information Systems Security Association.
45: Intellectual Property.
46: International Cybercrime Laws and Agreements.
47: Internet.
48: Interpol.
49: Laws, Children Online.
50: Laws, Illegal Uses of Computers and IT Devices.
51: Laws, Information Security Requirements.
52: Laws, Privacy Protections.
53: Laws That Facilitate or Limit Cybercrime Investigations.
54: Leetspeak.
55: Malware.
56: Malware Incidents.
57: Meeting and Falling in Love Online—Be Careful!.
58: Mgm et al. V. Grokster Ltd. et al..
59: Napster.
60: National Center for Missing and Exploited Children.
61: National White Collar Crime Center.
62: Network Centric Warfare.
63: Organized Cybercrime.
64: Phishing.
65: Phreaking.
66: Piracy.
67: Preventing Cybercrime.
68: Prevention Education.
69: Privacy.
70: Regulatory Agencies with Cybercrime Oversight Responsibilities.
71: Research on Cybercrime.
72: Scientific and Professional Misconduct.
73: Security Management Responsibilities.
74: Social and Economic Impacts of Cybercrime.
75: Social Engineering.
76: Spam.
77: Technologies Commonly Used for Cybercrime.
78: Theories of Cybercrime.
79: Theory of Technology-Enabled Crime, Policing, and Security.
80: United States v. Lamacchia.
81: Victimization.
82: Wardriving and Wardialing.
83: Warez Groups.
Resource Guide.
Index.
About the Editor and Contributors.