The Law Of Cybercrimes And Their Investigations
by George Curtis /
2011 / English / PDF
26.7 MB Download
Cybercrime has become increasingly prevalent in the new
millennium as computer-savvy criminals have developed more
sophisticated ways to victimize people online and through other
digital means.
Cybercrime has become increasingly prevalent in the new
millennium as computer-savvy criminals have developed more
sophisticated ways to victimize people online and through other
digital means.The Law of Cybercrimes and Their
Investigations
The Law of Cybercrimes and Their
Investigations is a comprehensive text exploring the
gamut of issues surrounding this growing phenomenon.
is a comprehensive text exploring the
gamut of issues surrounding this growing phenomenon.
After an introduction to the history of computer crime, the book
reviews a host of topics including:
After an introduction to the history of computer crime, the book
reviews a host of topics including:Information warfare and cyberterrorism
Information warfare and cyberterrorismObscenity, child pornography, sexual predator conduct, and
online gambling
Obscenity, child pornography, sexual predator conduct, and
online gamblingCyberstalking, cyberharassment, cyberbullying, and other
types of unlawful expression
Cyberstalking, cyberharassment, cyberbullying, and other
types of unlawful expressionAuction fraud, Ponzi and pyramid schemes, access device
fraud, identity theft and fraud, securities and bank fraud, money
laundering, and electronic transfer fraud
Auction fraud, Ponzi and pyramid schemes, access device
fraud, identity theft and fraud, securities and bank fraud, money
laundering, and electronic transfer fraudData privacy crimes, economic espionage, and intellectual
property crimes
Data privacy crimes, economic espionage, and intellectual
property crimesPrinciples applicable to searches and seizures of computers,
other digital devices, and peripherals
Principles applicable to searches and seizures of computers,
other digital devices, and peripheralsLaws governing eavesdropping, wiretaps, and other
investigatory devices
Laws governing eavesdropping, wiretaps, and other
investigatory devicesThe admission of digital evidence in court
The admission of digital evidence in courtProcedures for investigating cybercrime beyond the borders of
the prosecuting jurisdiction
Procedures for investigating cybercrime beyond the borders of
the prosecuting jurisdiction
Each chapter includes key words or phrases readers should be
familiar with before moving on to the next chapter. Review
problems are supplied to test assimilation of the material, and
the book contains weblinks to encourage further study.
Each chapter includes key words or phrases readers should be
familiar with before moving on to the next chapter. Review
problems are supplied to test assimilation of the material, and
the book contains weblinks to encourage further study.