The Law Of Cybercrimes And Their Investigations

The Law Of Cybercrimes And Their Investigations
by George Curtis / / / PDF


Read Online 26.7 MB Download


Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.

Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.The Law of Cybercrimes and Their Investigations

The Law of Cybercrimes and Their Investigations is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon.

is a comprehensive text exploring the gamut of issues surrounding this growing phenomenon. After an introduction to the history of computer crime, the book reviews a host of topics including:

After an introduction to the history of computer crime, the book reviews a host of topics including:Information warfare and cyberterrorism

Information warfare and cyberterrorismObscenity, child pornography, sexual predator conduct, and online gambling

Obscenity, child pornography, sexual predator conduct, and online gamblingCyberstalking, cyberharassment, cyberbullying, and other types of unlawful expression

Cyberstalking, cyberharassment, cyberbullying, and other types of unlawful expressionAuction fraud, Ponzi and pyramid schemes, access device fraud, identity theft and fraud, securities and bank fraud, money laundering, and electronic transfer fraud

Auction fraud, Ponzi and pyramid schemes, access device fraud, identity theft and fraud, securities and bank fraud, money laundering, and electronic transfer fraudData privacy crimes, economic espionage, and intellectual property crimes

Data privacy crimes, economic espionage, and intellectual property crimesPrinciples applicable to searches and seizures of computers, other digital devices, and peripherals

Principles applicable to searches and seizures of computers, other digital devices, and peripheralsLaws governing eavesdropping, wiretaps, and other investigatory devices

Laws governing eavesdropping, wiretaps, and other investigatory devicesThe admission of digital evidence in court

The admission of digital evidence in courtProcedures for investigating cybercrime beyond the borders of the prosecuting jurisdiction

Procedures for investigating cybercrime beyond the borders of the prosecuting jurisdiction Each chapter includes key words or phrases readers should be familiar with before moving on to the next chapter. Review problems are supplied to test assimilation of the material, and the book contains weblinks to encourage further study.

Each chapter includes key words or phrases readers should be familiar with before moving on to the next chapter. Review problems are supplied to test assimilation of the material, and the book contains weblinks to encourage further study.

views: 759