Order instruction
Cybercrime includes any crime committed using computers, the Internet, and/or online communications. Just using a computer connected to the Internet can make you vulnerable to cybercrime.
It is important to be aware of the dangers of cybercrime so that you can avoid becoming a victim. Cybercrime can involve a variety of offenses ranging from petty nuisance crimes to major crimes.
Depending on the nature of the cybercrime, serious damage can occur and costs can be immeasurable. As the public depends more on computer technology to conduct daily tasks and operations, the vulnerability to cybercrime increases.
Learning Resources
Readings
- Article: Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408-433.
Copyright 2006 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. - Article: Burden, K., & Palmer, C. (2003). Internet crime: Cyber crime — A new breed of criminal?Computer Law & Security Review, 19(3), 222-227.
Copyright 2003 by ELSEVIER LIMITED. Reprinted by permission of ELSEVIER LIMITED via the Copyright Clearance Center. - Article: Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Review, 27(1), 61-67.
Copyright 2011 by ELSEVIER SCIENCE & TECHNOLOGY JOURNALS. Reprinted by permission of ELSEVIER SCIENCE & TECHNOLOGY JOURNALS via the Copyright Clearance Center. - Article: Marcum, C. D., Higgins, G. E., Freiburger, T. L., & Ricketts, M. L. (2010). Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime. International Journal of Police Science & Management, 12(4), 516-525.
Copyright 2010 by VATHEK PUBLISHING. Reprinted by permission of VATHEK PUBLISHING via the Copyright Clearance Center. - Article: Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crime. Computer Law & Security Review, 21(5), 408-414.
Copyright 2005 by ELSEVIER SCIENCE & TECHNOLOGY JOURNALS. Reprinted by permission of ELSEVIER SCIENCE & TECHNOLOGY JOURNALS via the Copyright Clearance Center. - Article: U.S. Department of Justice. (2011). Hacker pleads guilty to identity theft and credit card fraud resulting in losses of more than $36 million [Press release]. Retrieved from http://www.justice.gov/opa/pr/2011/April/11-crm-501.html