Cybercrime: The Psychology of Online OffendersCambridge University Press, 2013-08-08 - 280 psl. Cybercrime is a growing problem in the modern world. Despite the many advantages of computers, they have spawned a number of crimes, such as hacking and virus writing, and made other crimes more prevalent and easier to commit, including music piracy, identity theft and child sex offences. Understanding the psychology behind these crimes helps to determine what motivates and characterises offenders and how such crimes can be prevented. This textbook on the psychology of the cybercriminal is the first written for undergraduate and postgraduate students of psychology, criminology, law, forensic science and computer science. It requires no specific background knowledge and covers legal issues, offenders, effects on victims, punishment and preventative measures for a wide range of cybercrimes. Introductory chapters on forensic psychology and the legal issues of cybercrime ease students into the subject, and many pedagogical features in the book and online provide support for the student. |
Turinys
Psychology of cybercrime | 1 |
Components of forensic psychology | 4 |
Police psychology | 11 |
Societal community socialisation influence and individual theories | 17 |
Cybercrimes and cyberlaw | 28 |
Hackers | 51 |
Malware | 79 |
Identity theft and fraud | 103 |
Cyberbullying and cyberstalking | 147 |
Digital piracy and copyright infringement | 169 |
Cyberterrorism | 189 |
11 | 192 |
Crime in virtual worlds | 207 |
224 | |
12 | 225 |
251 | |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
advance fee fraud antivirus software attacks attempt avatar BBC News Online Bocij cent chapter cognitive distortions considered copy copyright infringement crime in online crimes in virtual criminal cyberbullying cybercrime cybercriminal cyberstalking cyberterrorism cyberterrorists definitions describe deterrence digital piracy engage examined example feel file-sharing files forensic psychology fraudsters governance hacker ethic hacking Hinduja identify identity theft important indicates individuals infection interaction internet child pornography involved levels malware developers messages methods motives neutralisations occur offender profiling offline online behaviour online community online fraud online predators online virtual worlds paedophiles passwords perceived personal information phishing police possible prevent problem psychological punishment risk scams sexual social engineering social networking sites soft law specific stalkers strategies suggests Summary box target terrorism terrorist activity terrorist organisations types of malware users victimisation virus writers viruses Wolak