Cybercrime: The Psychology of Online OffendersCambridge University Press, 2013-08-08 Cybercrime is a growing problem in the modern world. Despite the many advantages of computers, they have spawned a number of crimes, such as hacking and virus writing, and made other crimes more prevalent and easier to commit, including music piracy, identity theft and child sex offences. Understanding the psychology behind these crimes helps to determine what motivates and characterises offenders and how such crimes can be prevented. This textbook on the psychology of the cybercriminal is the first written for undergraduate and postgraduate students of psychology, criminology, law, forensic science and computer science. It requires no specific background knowledge and covers legal issues, offenders, effects on victims, punishment and preventative measures for a wide range of cybercrimes. Introductory chapters on forensic psychology and the legal issues of cybercrime ease students into the subject, and many pedagogical features in the book and online provide support for the student. |
Turinys
individual theories | |
Preface | |
Hackers | |
breaches | |
Malware | |
Cyberbullying and cyberstalking | |
Victims of cyberbullying | |
Essay questions | |
Digital piracy and copyright infringement | |
behaviour and optimism bias | |
Cyberterrorism | |
Crime in virtual worlds | |
Identity theft and fraud | |
Child predation and child pornography online | |
offenders | |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
adolescents advance fee fraud antivirus software attack attempt avatars BBC News Online Bocij bullying cent chapter characteristics child predators cognitive distortions considered copyright infringement cyberbullying cybercriminal cyberspace cyberstalking cyberterrorism cyberterrorists definition describe deterrence digital piracy disorder downloading effects engage examining example feel files forensic psychology fraudsters governance hacker ethic hacking identify identity theft illegal indicates individuals infection interaction internet child pornography involved levels malware developers messages methods motives neutralisations occur offender profiling offline online behaviour online child online fraud online predators online virtual worlds paedophiles passwords personal information phishing police potential victim prevention punishment Retrieved risk scams sexual social engineering social networking sites soft law specific stalkers strategies suggests Summary box target terrorist organisations theories of crime traditional types of malware victimisation videos virtual worlds virus writers viruses Wolak