Document Type
Book
Publication Date
2-26-2010
Abstract
Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.
Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement’s ability to pursue cybercriminals and protecting the privacy of U.S. citizens.
This book features a chronology that traces the emergence and evolution of cybercrime from the 1950s to the present and detailed descriptions and analysis of real cybercrime cases that illustrate what cybercrime is and how cybercriminals operate. It incorporates cases from the past 50 years into a detailed, easily understood explanation of what cybercrime is and why it is a matter of great concern to governments — and citizens — around the world. Cybercrime: Criminal Threats from Cyberspace provides a comprehensive legal, historical, and sociological treatment of cybercrime as an empirical phenomenon and explores measures we can all take to secure our property and ourselves.
ISBN/ISSN
9780313365461
Copyright
Copyright © 2010, Susan W. Brenner
Publisher
Praeger
Place of Publication
Santa Barbara, CA
eCommons Citation
Brenner, Susan W., "Cybercrime: Criminal Threats from Cyberspace" (2010). School of Law Faculty Publications. 115.
https://ecommons.udayton.edu/law_fac_pub/115
Comments
The document available for download is a 2014 feature in the Dayton Lawyer magazine about the author, the above-named book, and her work in the field of computer crime. Story by Thomas M. Columbus. Permission documentation on file.