网络犯罪和轻罪书评:战胜网络垃圾邮件制造者、跟踪者和骗子

IF 0.7 Q4 CRIMINOLOGY & PENOLOGY International Journal of Cyber Criminology Pub Date : 2007-01-01 DOI:10.5281/ZENODO.18284
Mari B. Pierce
{"title":"网络犯罪和轻罪书评:战胜网络垃圾邮件制造者、跟踪者和骗子","authors":"Mari B. Pierce","doi":"10.5281/ZENODO.18284","DOIUrl":null,"url":null,"abstract":"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"161-166"},"PeriodicalIF":0.7000,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists\",\"authors\":\"Mari B. Pierce\",\"doi\":\"10.5281/ZENODO.18284\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":\"1 1\",\"pages\":\"161-166\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2007-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.18284\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.18284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 0

摘要

当问到一个罪犯的例子时,可以公平地假设,很少有人会描述那些使用电脑进行非法行为的人。相反,大多数人会举出针对个人的暴力犯罪或涉及个人侵犯财产的犯罪的例子。如果有人真的用科技犯罪的例子,他们很可能会用网络恋童癖或黑客作为例证。虽然媒体的关注和社会意识的增加已经带来了一些类型的网络犯罪,但现实是,这个问题的严重性并不为公众所知,也不知道我们,计算机用户,应该如何保护自己免受潜在的受害者或寻求帮助,如果我们成为这些犯罪的目标。“每年有超过20万的网络犯罪和轻罪,而且这个数字每天都在增长”(Hitchcock 2006,2)。有了这么多的受害者,电脑用户需要知道如何保护自己。然而,一般的计算机用户并不精通技术。希区柯克理解普通计算机用户的技术知识的局限性。她的修订版《网络犯罪和轻罪:战胜网络垃圾邮件制造者、跟踪者和骗子》(2006)解释了各种类型的网络和计算机犯罪,并提供了适用于新手和有经验的计算机用户的定义和提示。希区柯克是美国研究网络犯罪的权威之一,他在计算机和技术领域有着多年的经验。她教过各种大学水平的课程,为杂志和报纸撰稿,做讲座,出现
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Book Review of Net crimes & misdemeanors: Outmaneuvering webspammers, stalkers and con artists
When asking for an example of a criminal, it is fair to assume that few will describe those who commit unlawful acts using the computer. Rather, most will give an instance of violent crimes committed against individuals or crimes involving personal invasion of property. If someone actually used an example of a crime focusing around technology, it is likely they will use an Internet pedophile or a hacker for their illustration. Although an increase of media attention and community awareness has been brought to a few types of Internet crimes, the reality is that the magnitude of this problem is not known to the general public nor how we, computer users, should protect ourselves from potential victimization or obtain help if we become a target of these crimes. “Net crimes and misdemeanors are committed against more than 200,000 a year and the numbers are growing every day” (Hitchcock 2006, 2). With this quantity of victims, computer users need to know how to protect themselves. However, the average computer user is not technologically savvy. J.A. Hitchcock understands the limitations of technical knowledge of the average computer user. Her revised edition of “Net Crimes and Misdemeanors: Outmaneuvering Webspammers, Stalkers and Con Artists” (2006) explains various types of Internet and computer based crimes, and provides definitions and tips applicable to the novice and experienced computer user. One of the nation’s leading authority on cybercrime, Hitchcock has years of experience working with computers and technology. She has taught various college level courses, written for magazines and newspapers, gives lectures, appears
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
2.60
自引率
40.00%
发文量
0
审稿时长
16 weeks
期刊介绍: International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
期刊最新文献
Cyberharassment Awareness Course (Cybac): influences from domestic abuse perpetrator programmes for its design and function Understanding Target Suitability in Cyberspace: An International Comparison of Cyber Victimization Processes Examining the Effect of Victimization Experience on Fear of Cybercrime: University Students' Experience of Credit/Debit Card Fraud Harmful discourse on social triggering factors of persecution truth era Project Leaked: research on non-consensual sharing of intimate images in Brazil
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1