{"title":"网络犯罪和轻罪书评:战胜网络垃圾邮件制造者、跟踪者和骗子","authors":"Mari B. Pierce","doi":"10.5281/ZENODO.18284","DOIUrl":null,"url":null,"abstract":"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"161-166"},"PeriodicalIF":0.7000,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists\",\"authors\":\"Mari B. Pierce\",\"doi\":\"10.5281/ZENODO.18284\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":\"1 1\",\"pages\":\"161-166\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2007-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.18284\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.18284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists
When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears
期刊介绍:
International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.