Principles of cybercrime /
Saved in:
Author / Creator: | Clough, Jonathan, author. |
---|---|
Edition: | Second edition. |
Imprint: | Cambridge, United Kingdom ; New York : Cambridge University Press, 2015. ©2015 |
Description: | lvi, 524 pages ; 24 cm |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/10424406 |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | 10424406 | ||
003 | ICU | ||
005 | 20160108144912.9 | ||
008 | 150512t20152015enk b 001 0 eng | ||
010 | |a 2015018983 | ||
020 | |a 9781107034570 (hardback) | ||
020 | |a 1107034574 (hardback) | ||
020 | |a 9781107698161 (paperback) | ||
020 | |a 1107698162 (paperback) | ||
035 | |a (OCoLC)908935493 | ||
040 | |a DLC |e rda |b eng |c DLC |d YDX |d OCLCF |d CDX |d YDXCP |d GZL |d COO | ||
042 | |a pcc | ||
050 | 0 | 0 | |a XXK5215 |b .C58 2015 |
082 | 0 | 0 | |a 345/.0268 |2 23 |
090 | |a XXK5215 |b .C58 2015 | ||
100 | 1 | |a Clough, Jonathan, |e author. |0 http://id.loc.gov/authorities/names/nb2003000110 |1 http://viaf.org/viaf/53659638 | |
245 | 1 | 0 | |a Principles of cybercrime / |c Jonathan Clough. |
250 | |a Second edition. | ||
264 | 1 | |a Cambridge, United Kingdom ; |a New York : |b Cambridge University Press, |c 2015. | |
264 | |a ©2015 | ||
300 | |a lvi, 524 pages ; |c 24 cm | ||
336 | |a text |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a unmediated |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/n | ||
338 | |a volume |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/nc | ||
504 | |a Includes bibliographical references (pages 489-512) and index. | ||
505 | 0 | |g Part I. Introduction: 1. Cybercrime -- |g Part II. Computer as Target -- 2. Computer as target -- 3. Access offences -- 4. Modification or impairment of data -- 5. Misuse of devices -- 6. Interception of data -- |g Part III. Fraud and Related Offences -- 7. Fraud -- 8. Criminal copyright infringement -- 9. 'Spam' -- |g Part IV. Content-Related Offences -- 10. Child pornography -- |g Part V. Offences against the Person -- 11. 'Grooming' -- 12. Harassment -- 13. Voyeurism -- |g Part VI. Jurisdiction -- 14. Jurisdiction. | |
520 | |a "Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law"-- |c Provided by publisher. | ||
650 | 0 | |a Computer crimes. |0 http://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 7 | |a Computer crimes. |2 fast |0 (OCoLC)fst00872063 | |
903 | |a HeVa | ||
929 | |a cat | ||
999 | f | f | |i 6e37a866-9dbd-5e09-943c-5dd828d8cf0f |s 5a986a69-e9a0-5e41-a359-d4e4c31ce16c |
928 | |t Library of Congress classification |a XXK5215.C445 2015 |l DLL |c DLL-Law |i 8600146 | ||
927 | |t Library of Congress classification |a XXK5215.C445 2015 |l DLL |c DLL-Law |e PUTT |b 77348311 |i 9531337 |