Cybercrime

dc.contributor.authorSmith, Russell
dc.contributor.authorGrabosky, Peter
dc.contributor.editorPalmer, Darren
dc.contributor.editorde Lint, Willem
dc.contributor.editorDalton, Derek
dc.date.accessioned2021-04-08T01:56:19Z
dc.date.issued2017
dc.date.updated2020-11-22T07:40:13Z
dc.description.abstractInformation and communications technologies (ICT) have created untold benefits for life in industrialized societies, offering efficiencies in the delivery of education, health services, recreation, commerce and government. ICT has changed considerably the nature of modern workplaces and patterns of employment, and offered opportunities for people across the globe to stay in touch and to establish new personal and business relationship. ICT has also created unprecedented opportunities for crime in both Western and Eastern regions of the world. In the words of Grabosky & Smith: "since Wheatstone and Cooke first patented their system of communication by the means of electromagnetic impulses carried over wires in 1837, crimes have been committed either through the misuse of telecommunications equipment, or against telecommunications equipment. Every technological development has provided a new opportunity for criminality which has often been exploited". Identifying these changing vulnerabilities, and mobilizing appropriate countermeasures, are some of the great challenges of today, and of the years to come. Much technology-related crime lies beyond the capacity of contemporary law enforcement and regulatory agencies to control, if they act by themselves. Therefore, security in cyberspace will depend on the collaborative efforts of many institutions, coupled with self-help by potential victims. In cyberspace, the adage "prevention is better than cure" should be of paramount importance. The ideal configuration of responses will differ, depending upon the activity, but is likely to entail a mix of law enforcement, technological and market responses. Because cyberspace knows no boundaries and computer crime often crosses national frontiers, effective countermeasures will require a substantial degree of international co-operation.en_AU
dc.format.mimetypeapplication/pdfen_AU
dc.identifier.isbn9780455238647en_AU
dc.identifier.urihttp://hdl.handle.net/1885/229715
dc.language.isoen_AUen_AU
dc.publisherThomson Reuters (Professional) Australia Limiteden_AU
dc.relation.ispartofCrime and Justice: A Guide to Criminology (5th edition)en_AU
dc.relation.isversionofFifth Edition
dc.rights© 2017 Thomson Reuters (Professional) Australia Limiteden_AU
dc.titleCybercrimeen_AU
dc.typeBook chapteren_AU
local.bibliographicCitation.lastpage278en_AU
local.bibliographicCitation.placeofpublicationPyrmont, Sydney, NSW
local.bibliographicCitation.startpage243en_AU
local.contributor.affiliationSmith, Russell, Australian Institute of Criminologyen_AU
local.contributor.affiliationGrabosky, Peter, College of Asia and the Pacific, ANUen_AU
local.contributor.authoremailpeter.grabosky@anu.edu.auen_AU
local.contributor.authoruidGrabosky, Peter, u4032886en_AU
local.description.embargo2099-12-31
local.description.notesImported from ARIESen_AU
local.identifier.absfor100500 - COMMUNICATIONS TECHNOLOGIESen_AU
local.identifier.absfor160201 - Causes and Prevention of Crimeen_AU
local.identifier.ariespublicationu4860843xPUB373en_AU
local.identifier.uidSubmittedByu4860843en_AU
local.type.statusPublished Versionen_AU

Downloads

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
01_Smith_Cybercrime_2017.pdf
Size:
5.08 MB
Format:
Adobe Portable Document Format