首页 > 最新文献

International Journal of Cyber Criminology最新文献

英文 中文
Book Review of Sexual Predators: How to Recognize Them on the Internet and on the Street - How to Keep Your Kids Away 性侵犯者书评:如何在网上和街上识别他们-如何让你的孩子远离
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18283
Catherine D. Marcum
“Before all this, I thought a predator is someone who lurks in the bushes. I didn’t think I was one. But then I realized the computer monitor was my bushes.” The above-referenced quote was made by serial child predator Jake Matthew Clawson in regards to his recognition of his online obsession. It was referenced as a demonstration of the common misconception many of us have regarding the tactics used by child pedophiles to stalk children. The stereotype of the dirty old man hanging out at the school playground in a dingy van waiting and watching for unsuspecting little girls and boys is being replaced by a different type of predator. This is the predator that hides behind false identities and personalities in chat room, instant messages or emails to gain the trust of the same unsuspecting, but now computer-savvy children. The book “Sexual Predators: How to Recognize Them on the Internet and on the Street – How to Keep Your Kids Away,” written by Stephen Dean, is the latest book that provides a wealth of information on these new types of predators and the tactics that they use on the technologically confident youth. Award-winning, investigative journalist Stephen Dean has had years of experience working with authorities investigating crimes against children. His current passion has led him to immerse himself in the world of Internet predators. He has posed as a child in chat rooms during multiple Internet investigations with the Houston Police Department and federal authorities to apprehend online predators. His work has been featured on ABC, NBC, CBS and CNN, as well as many local news stations. With these experiences, he describes in detail in his
“在这一切之前,我认为捕食者是潜伏在灌木丛中的人。我不认为我是一个。但后来我意识到电脑显示器是我的灌木丛。”以上引用的这句话是连环儿童侵犯者杰克·马修·克劳森在承认自己对网络的痴迷时说的。它被认为证明了我们许多人对儿童恋童癖者跟踪儿童所使用的策略的普遍误解。以前的刻板印象是,脏兮兮的老男人坐在脏兮兮的面包车里,在学校操场上闲逛,等着看着毫无戒心的小女孩和男孩,现在这种刻板印象正在被一种不同类型的捕食者所取代。这是一种隐藏在聊天室、即时消息或电子邮件中虚假身份和个性背后的掠夺者,以获得同样毫无戒心但现在精通电脑的孩子的信任。《性侵犯者:如何在网上和大街上识别他们——如何让你的孩子远离》一书是最新的一本书,该书提供了大量关于这些新型侵犯者的信息,以及他们对技术自信的年轻人所使用的策略。屡获殊荣的调查记者斯蒂芬·迪恩(Stephen Dean)有多年与当局一起调查针对儿童的犯罪的经验。他现在的热情使他沉浸在互联网掠夺者的世界里。在休斯顿警察局和联邦当局的多次网络调查中,他在聊天室里假扮成一个孩子,以逮捕网络掠夺者。他的作品曾在ABC、NBC、CBS和CNN以及许多地方新闻台播出。结合这些经历,他在他的书中进行了详细的描述
{"title":"Book Review of Sexual Predators: How to Recognize Them on the Internet and on the Street - How to Keep Your Kids Away","authors":"Catherine D. Marcum","doi":"10.5281/ZENODO.18283","DOIUrl":"https://doi.org/10.5281/ZENODO.18283","url":null,"abstract":"“Before all this, I thought a predator is someone who lurks in the bushes. I didn’t think I was one. But then I realized the computer monitor was my bushes.” The above-referenced quote was made by serial child predator Jake Matthew Clawson in regards to his recognition of his online obsession. It was referenced as a demonstration of the common misconception many of us have regarding the tactics used by child pedophiles to stalk children. The stereotype of the dirty old man hanging out at the school playground in a dingy van waiting and watching for unsuspecting little girls and boys is being replaced by a different type of predator. This is the predator that hides behind false identities and personalities in chat room, instant messages or emails to gain the trust of the same unsuspecting, but now computer-savvy children. The book “Sexual Predators: How to Recognize Them on the Internet and on the Street – How to Keep Your Kids Away,” written by Stephen Dean, is the latest book that provides a wealth of information on these new types of predators and the tactics that they use on the technologically confident youth. Award-winning, investigative journalist Stephen Dean has had years of experience working with authorities investigating crimes against children. His current passion has led him to immerse himself in the world of Internet predators. He has posed as a child in chat rooms during multiple Internet investigations with the Houston Police Department and federal authorities to apprehend online predators. His work has been featured on ABC, NBC, CBS and CNN, as well as many local news stations. With these experiences, he describes in detail in his","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"155-160"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cyber bullying: Clarifying Legal Boundaries for School Supervision in Cyberspace 网络欺凌:厘清网络空间学校监管的法律界限
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18279
S. Shariff, Dianne L. Hoff
Abstract Cyber bullying is a psychologically devastating form of social cruelty among adolescents. This paper reviews the current policy vacuum of the legal obligations and expectations of schools to monitor and supervise online discourse, while balancing student safety, education, and interaction in virtual space. The paper opens with a profile and conditions of cyber bullying using an analogy to Golding’s (1954), Lord of the Flies. The anarchy and deterioration of unsupervised adolescent relationships depicted in the book are compared to the deterioration of social relationships among adolescents in virtual space. A discussion of the institutional responses to cyber bullying follows. Finally, emerging and established law is highlighted to provide guidelines to help schools reduce cyber bullying through educational means that protect students and avoid litigation.
摘要网络欺凌是一种摧残青少年心理的社会残酷行为。本文回顾了当前政策真空中的法律义务和学校监督在线话语的期望,同时平衡学生安全、教育和虚拟空间中的互动。论文以戈尔丁(1954)的《蝇王》(Lord of The Flies)为例,介绍了网络欺凌的概况和情况。书中描写的无监督的青少年关系的混乱和恶化与虚拟空间中青少年之间社会关系的恶化进行了比较。接下来将讨论机构对网络欺凌的反应。最后,重点介绍了新兴法律和现有法律,以提供指导方针,帮助学校通过保护学生和避免诉讼的教育手段减少网络欺凌。
{"title":"Cyber bullying: Clarifying Legal Boundaries for School Supervision in Cyberspace","authors":"S. Shariff, Dianne L. Hoff","doi":"10.5281/ZENODO.18279","DOIUrl":"https://doi.org/10.5281/ZENODO.18279","url":null,"abstract":"Abstract Cyber bullying is a psychologically devastating form of social cruelty among adolescents. This paper reviews the current policy vacuum of the legal obligations and expectations of schools to monitor and supervise online discourse, while balancing student safety, education, and interaction in virtual space. The paper opens with a profile and conditions of cyber bullying using an analogy to Golding’s (1954), Lord of the Flies. The anarchy and deterioration of unsupervised adolescent relationships depicted in the book are compared to the deterioration of social relationships among adolescents in virtual space. A discussion of the institutional responses to cyber bullying follows. Finally, emerging and established law is highlighted to provide guidelines to help schools reduce cyber bullying through educational means that protect students and avoid litigation.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future 美国的计算机犯罪调查:利用过去的知识来应对未来
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18275
S. Hinduja
Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future.
许多传统的犯罪行为现在正通过使用计算机和网络得到帮助或教唆,由于信息系统的不可思议的能力,以前从未想象过的不法行为已经浮出水面。一般来说,计算机犯罪要求执法部门,特别是刑事调查人员,为成功地识别、逮捕和协助成功起诉犯罪者而不断增加他们的努力。本文对美国传统刑侦领域的主要研究成果进行了总结。然后介绍了传统犯罪调查与计算机犯罪调查之间的异同,并讨论了由此产生的影响。关于美国计算机犯罪调查工作队如何能够最有效地实现其预期目标的实用建议,最后通过一个专门单位的假设例子给出。希望过去的知识能够与目前对计算机相关犯罪的观察相结合,为今后的警察调查科学提供信息和指导。
{"title":"Computer Crime Investigations in the United States: Leveraging Knowledge from the Past to Address the Future","authors":"S. Hinduja","doi":"10.5281/ZENODO.18275","DOIUrl":"https://doi.org/10.5281/ZENODO.18275","url":null,"abstract":"Many traditional crimes are now being aided or abetted through the use of computers and networks, and wrongdoing previously never imagined has surfaced because of the incredible capabilities of information systems. Computer crimes are requiring law enforcement departments in general and criminal investigators in particular to tailor an increasing amount of their efforts toward successfully identifying, apprehending, and assisting in the successful prosecution of perpetrators. In the following text, key research findings in the area of traditional American criminal investigations are summarized. Similarities and differences between traditional and computer crime investigations are then presented, and consequent implications are discussed. Pragmatic suggestions as to how American computer crime investigative task forces can most competently fulfill their intended objectives are given in conclusion via a hypothetical example of a specialized unit. It is hoped that past knowledge can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"1-26"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Offshore Internet Gambling and the World Trade Organization: Is it Criminal Behavior or a Commodity? 离岸网络赌博与世界贸易组织:是犯罪行为还是商品?
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18280
H. Pontell, G. Geis, Gregory C. Brown
Internet gambling possesses an array of attractive attributes. For one thing, there is no necessity to leave home, with the associated outlay for lodging and meals, and the expenditure for transportation costs. For another, gambling at home avoids the noise and confusion of crowded confines, the distractions of seductive servers, the windowless gaming rooms, with no wall clocks to make customers aware of the time. Internet gambling is an industry that is growing exponentially and its perception as criminal is a matter of intense debate. On the transnational scene it has emerged as a public policy issue of significant ideological interest and of massive financial importance. This paper traces the development of the WTO case and attempts at its resolution and also offers a view of what is regarded as the most sensible, and probably the inevitable path that the trajectory of Internet gambling should and will take.
网络赌博具有一系列吸引人的特点。一方面,没有必要离开家,有住宿、吃饭和交通费用的相关支出。另一方面,在家赌博避免了拥挤的房间里的噪音和混乱,避免了诱人的服务器的干扰,避免了没有窗户的游戏室,也避免了没有挂钟让顾客知道时间的情况。互联网赌博是一个呈指数增长的行业,其被视为犯罪是一个激烈辩论的问题。在跨国舞台上,它已成为一个具有重大意识形态利益和巨大金融重要性的公共政策问题。本文追溯了世贸组织案件的发展,并试图解决它,也提供了一个观点,被认为是最明智的,可能是不可避免的路径,互联网赌博的轨迹应该和将采取。
{"title":"Offshore Internet Gambling and the World Trade Organization: Is it Criminal Behavior or a Commodity?","authors":"H. Pontell, G. Geis, Gregory C. Brown","doi":"10.5281/ZENODO.18280","DOIUrl":"https://doi.org/10.5281/ZENODO.18280","url":null,"abstract":"Internet gambling possesses an array of attractive attributes. For one thing, there is no necessity to leave home, with the associated outlay for lodging and meals, and the expenditure for transportation costs. For another, gambling at home avoids the noise and confusion of crowded confines, the distractions of seductive servers, the windowless gaming rooms, with no wall clocks to make customers aware of the time. Internet gambling is an industry that is growing exponentially and its perception as criminal is a matter of intense debate. On the transnational scene it has emerged as a public policy issue of significant ideological interest and of massive financial importance. This paper traces the development of the WTO case and attempts at its resolution and also offers a view of what is regarded as the most sensible, and probably the inevitable path that the trajectory of Internet gambling should and will take.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"119-136"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value 数字盗版、自我控制理论和理性选择:价值作用的考察
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18277
George E. Higgins
To date, several researchers have shown that attitudes, low self-control, social learning theory and deterrence theory to explain digital piracy. However, no study examined whether rational choice theory mediated the link between low self-control and digital piracy. Further, no study in digital piracy or criminological literature had considered the role of value in such an examination. Therefore, the purpose of the present study was to contribute to the literature by examining the links between low self-control, rational choice, value, and digital piracy. This study built on the mediating model presented by Piquero and Tibbetts (1996). That is, this study assumed that rational choice theory mediated the link between low self-control and digital piracy. Further, this study assumed that some situational factors would mediate the effect of other situational factors
迄今为止,已有几位研究者用态度、低自制力、社会学习理论和威慑理论来解释数字盗版。然而,没有研究检验理性选择理论是否介导了低自我控制与数字盗版之间的联系。此外,没有任何关于数字盗版或犯罪学文献的研究在这种审查中考虑到价值的作用。因此,本研究的目的是通过检验低自我控制、理性选择、价值和数字盗版之间的联系,为文献做出贡献。本研究以Piquero和Tibbetts(1996)提出的中介模型为基础。也就是说,本研究假设理性选择理论介导了低自我控制与数字盗版之间的联系。进一步,本研究假设某些情境因素会介导其他情境因素的影响
{"title":"Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value","authors":"George E. Higgins","doi":"10.5281/ZENODO.18277","DOIUrl":"https://doi.org/10.5281/ZENODO.18277","url":null,"abstract":"To date, several researchers have shown that attitudes, low self-control, social learning theory and deterrence theory to explain digital piracy. However, no study examined whether rational choice theory mediated the link between low self-control and digital piracy. Further, no study in digital piracy or criminological literature had considered the role of value in such an examination. Therefore, the purpose of the present study was to contribute to the literature by examining the links between low self-control, rational choice, value, and digital piracy. This study built on the mediating model presented by Piquero and Tibbetts (1996). That is, this study assumed that rational choice theory mediated the link between low self-control and digital piracy. Further, this study assumed that some situational factors would mediate the effect of other situational factors","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"5 1","pages":"33-55"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A Qualitative Analysis of Advance Fee Fraud E-mail Schemes 预付费欺诈电子邮件计划的定性分析
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18282
T. Holt, D. C. Graves
Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar losses attributed to advance fee fraud e-mail messages. These messages come from individuals who claim to need assistance moving a large sum of money out of their country. Individuals who respond to the messages often become victims of fraud and identity theft. Few criminologists have examined this type of fraud, thus this study explores the mechanisms employed by scammers through a qualitative analysis of 412 fraudulent e-mail messages. The findings demonstrate that multiple writing techniques are used to generate responses and information from victims. Half of all the messages also request that the recipient forward their personal information to the sender, thereby enabling identity theft. The implications of this study for law enforcement and computer security are also discussed.
犯罪分子利用互联网进行各种形式的欺诈,其中最大的美元损失归因于预付费用欺诈电子邮件。这些信息来自声称需要帮助将大笔资金转移到国外的个人。回复这些信息的个人往往成为欺诈和身份盗窃的受害者。很少有犯罪学家研究过这种类型的欺诈行为,因此本研究通过对412封欺诈性电子邮件的定性分析,探讨了诈骗者所采用的机制。研究结果表明,多种写作技巧被用来产生受害者的反应和信息。一半的短信还要求接收方将其个人信息转发给发送方,从而使身份盗窃成为可能。本文还讨论了本研究对执法和计算机安全的启示。
{"title":"A Qualitative Analysis of Advance Fee Fraud E-mail Schemes","authors":"T. Holt, D. C. Graves","doi":"10.5281/ZENODO.18282","DOIUrl":"https://doi.org/10.5281/ZENODO.18282","url":null,"abstract":"Criminals utilize the Internet to perpetrate all manner of fraud, with the largest dollar losses attributed to advance fee fraud e-mail messages. These messages come from individuals who claim to need assistance moving a large sum of money out of their country. Individuals who respond to the messages often become victims of fraud and identity theft. Few criminologists have examined this type of fraud, thus this study explores the mechanisms employed by scammers through a qualitative analysis of 412 fraudulent e-mail messages. The findings demonstrate that multiple writing techniques are used to generate responses and information from victims. Half of all the messages also request that the recipient forward their personal information to the sender, thereby enabling identity theft. The implications of this study for law enforcement and computer security are also discussed.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"137-154"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Cyber Criminology: Evolving a novel discipline with a new journal 网络犯罪学:在新期刊上发展一门新学科
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18276
K. Jaishankar
Cyberspace presents an exciting new frontier for criminologists. Virtual reality and computer mediated communications challenge the traditional discourse of criminology, introducing new forms of deviance, crime, and social control (McKenzie 1996). Since the 1990s, academics have observed how the cyberspace has emerged as a new locus of criminal activity (Thomas and Loader 2000; Littlewood 2003; Yar 2005), but in general, criminology has been remiss in its research into the phenomena of cyber crime and has been slow to recognize the importance of cyberspace in changing the nature and scope of offending and victimization (Mann and Sutton 1998; Jewkes 2006). A new, radical discipline named cyber criminology is the need of the hour to explain and analyze the crimes in the internet. The field of cyber criminology crystallizes for many Scientists and Social scientists an area of research at the interface between Computer Science, Internet Science and Criminology. I define cyber criminology as ʺthe study of causation of crimes that occur in the cyberspace and its impact in the physical space”. For a year or so, the word cyber criminology has slowly appeared in the internet. Also, McAfee has used an alternate word “Virtual Criminology” in their report published in 2006. The first conference devoted entirely to this area was the “Cyber Criminology and Digital Forensics Initiative Conference” which took place in Spokane Valley, WA, USA in October 2006. This was also a new direction to segregate cyber‐ forensics and cyber criminology. Quite often, cyber criminology is merged with cyber‐forensics. There is a need to identify the differences between cyber criminology and cyber‐forensics. Cyber‐forensics deals exclusively with the investigation of cyber crimes, whereas, cyber criminology deals with the causation of cyber crimes.
网络空间为犯罪学家提供了一个令人兴奋的新领域。虚拟现实和计算机媒介通信挑战了犯罪学的传统话语,引入了新的越轨行为、犯罪和社会控制形式(McKenzie 1996)。自20世纪90年代以来,学者们已经观察到网络空间如何成为犯罪活动的新场所(Thomas and Loader 2000;Littlewood 2003;Yar 2005),但总的来说,犯罪学在对网络犯罪现象的研究中一直是疏忽的,并且在认识到网络空间在改变犯罪和受害的性质和范围方面的重要性方面进展缓慢(Mann和Sutton 1998;Jewkes 2006)。一门名为网络犯罪学的新兴激进学科急需解释和分析互联网上的犯罪行为。对于许多科学家和社会科学家来说,网络犯罪学领域是计算机科学、互联网科学和犯罪学之间的一个研究领域。我把网络犯罪学定义为“研究发生在网络空间的犯罪的因果关系及其对物理空间的影响”。一年多来,网络犯罪学这个词慢慢出现在互联网上。此外,McAfee在2006年发表的报告中使用了另一个词“虚拟犯罪学”。第一次专门讨论这一领域的会议是2006年10月在美国华盛顿州斯波坎谷举行的“网络犯罪学和数字取证倡议会议”。这也是分离网络取证和网络犯罪学的一个新方向。很多时候,网络犯罪学与网络取证相结合。有必要确定网络犯罪学和网络取证学之间的差异。网络取证专门处理网络犯罪的调查,而网络犯罪学处理网络犯罪的原因。
{"title":"Cyber Criminology: Evolving a novel discipline with a new journal","authors":"K. Jaishankar","doi":"10.5281/ZENODO.18276","DOIUrl":"https://doi.org/10.5281/ZENODO.18276","url":null,"abstract":"Cyberspace presents an exciting new frontier for criminologists. Virtual reality and computer mediated communications challenge the traditional discourse of criminology, introducing new forms of deviance, crime, and social control (McKenzie 1996). Since the 1990s, academics have observed how the cyberspace has emerged as a new locus of criminal activity (Thomas and Loader 2000; Littlewood 2003; Yar 2005), but in general, criminology has been remiss in its research into the phenomena of cyber crime and has been slow to recognize the importance of cyberspace in changing the nature and scope of offending and victimization (Mann and Sutton 1998; Jewkes 2006). A new, radical discipline named cyber criminology is the need of the hour to explain and analyze the crimes in the internet. The field of cyber criminology crystallizes for many Scientists and Social scientists an area of research at the interface between Computer Science, Internet Science and Criminology. I define cyber criminology as ʺthe study of causation of crimes that occur in the cyberspace and its impact in the physical space”. For a year or so, the word cyber criminology has slowly appeared in the internet. Also, McAfee has used an alternate word “Virtual Criminology” in their report published in 2006. The first conference devoted entirely to this area was the “Cyber Criminology and Digital Forensics Initiative Conference” which took place in Spokane Valley, WA, USA in October 2006. This was also a new direction to segregate cyber‐ forensics and cyber criminology. Quite often, cyber criminology is merged with cyber‐forensics. There is a need to identify the differences between cyber criminology and cyber‐forensics. Cyber‐forensics deals exclusively with the investigation of cyber crimes, whereas, cyber criminology deals with the causation of cyber crimes.","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"1-6"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists 网络犯罪和轻罪书评:战胜网络垃圾邮件制造者、跟踪者和骗子
IF 1 Q4 CRIMINOLOGY & PENOLOGY Pub Date : 2007-01-01 DOI: 10.5281/ZENODO.18284
Mari B. Pierce
When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears
当问到一个罪犯的例子时,可以公平地假设,很少有人会描述那些使用电脑进行非法行为的人。相反,大多数人会举出针对个人的暴力犯罪或涉及个人侵犯财产的犯罪的例子。如果有人真的用科技犯罪的例子,他们很可能会用网络恋童癖或黑客作为例证。虽然媒体的关注和社会意识的增加已经带来了一些类型的网络犯罪,但现实是,这个问题的严重性并不为公众所知,也不知道我们,计算机用户,应该如何保护自己免受潜在的受害者或寻求帮助,如果我们成为这些犯罪的目标。“每年有超过20万的网络犯罪和轻罪,而且这个数字每天都在增长”(Hitchcock 2006,2)。有了这么多的受害者,电脑用户需要知道如何保护自己。然而,一般的计算机用户并不精通技术。希区柯克理解普通计算机用户的技术知识的局限性。她的修订版《网络犯罪和轻罪:战胜网络垃圾邮件制造者、跟踪者和骗子》(2006)解释了各种类型的网络和计算机犯罪,并提供了适用于新手和有经验的计算机用户的定义和提示。希区柯克是美国研究网络犯罪的权威之一,他在计算机和技术领域有着多年的经验。她教过各种大学水平的课程,为杂志和报纸撰稿,做讲座,出现
{"title":"Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists","authors":"Mari B. Pierce","doi":"10.5281/ZENODO.18284","DOIUrl":"https://doi.org/10.5281/ZENODO.18284","url":null,"abstract":"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"161-166"},"PeriodicalIF":1.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71043607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Criminology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1