Cybercrime: Security and Surveillance in the Information Age
Brian D. Loader, Douglas Thomas
Routledge, May 13, 2013 - Health & Fitness - 320 pages
Cybercrime focuses on the growing concern about the use of electronic communication for criminal activities and the appropriateness of the countermeasures that are being adopted by law enforcement agencies, security services and legislators to address such anxieties. Fuelled by sensational media headlines and news coverage which has done much to encourage the belief that technologies like the Internet are likely to lead to a lawless electronic frontier, Cybercrime provides a more considered and balanced perspective on what is an important and contested arena for debate. It looks at:
*electronic criminal behaviour
*privacy and liberty
*the dangers of surveillance.
Cybercrime explains the basic issues surrounding cybercrime and its impact on society.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
action activities adopted anonymous remailers approach Article attacks authority body business information cent communications computer crime computer hackers computer networks computer systems concern confidentiality countries criminal data cryptography culture cybercrime cyberpunk cyberspace cyberwar data protection data subject decrypt discussed documentary e-mail electronic encryption ensure Europol example files global Guidelines hacking human HUMINT ICTs illegal individual information infrastructure information society information systems information technologies information warfare intellectual property intelligence Internet investigation issues law enforcement legislation messages Microserfs Mitnick's Neuromancer non-hackers OECD operations organizational organizations Otaku passphrase password personal data phones plaintext police political possible privacy protection problem programmes prosecution punishment reasons recoverable encryption regulation require response rules Russian sector SIGINT steganography sub-state groups surveillance TECHINT technical threat tion trade secrets unauthorized access users websites