Cybercrime
dc.contributor.author | Smith, Russell | |
dc.contributor.author | Grabosky, Peter | |
dc.contributor.editor | Palmer, Darren | |
dc.contributor.editor | de Lint, Willem | |
dc.contributor.editor | Dalton, Derek | |
dc.date.accessioned | 2021-04-08T01:56:19Z | |
dc.date.issued | 2017 | |
dc.date.updated | 2020-11-22T07:40:13Z | |
dc.description.abstract | Information and communications technologies (ICT) have created untold benefits for life in industrialized societies, offering efficiencies in the delivery of education, health services, recreation, commerce and government. ICT has changed considerably the nature of modern workplaces and patterns of employment, and offered opportunities for people across the globe to stay in touch and to establish new personal and business relationship. ICT has also created unprecedented opportunities for crime in both Western and Eastern regions of the world. In the words of Grabosky & Smith: "since Wheatstone and Cooke first patented their system of communication by the means of electromagnetic impulses carried over wires in 1837, crimes have been committed either through the misuse of telecommunications equipment, or against telecommunications equipment. Every technological development has provided a new opportunity for criminality which has often been exploited". Identifying these changing vulnerabilities, and mobilizing appropriate countermeasures, are some of the great challenges of today, and of the years to come. Much technology-related crime lies beyond the capacity of contemporary law enforcement and regulatory agencies to control, if they act by themselves. Therefore, security in cyberspace will depend on the collaborative efforts of many institutions, coupled with self-help by potential victims. In cyberspace, the adage "prevention is better than cure" should be of paramount importance. The ideal configuration of responses will differ, depending upon the activity, but is likely to entail a mix of law enforcement, technological and market responses. Because cyberspace knows no boundaries and computer crime often crosses national frontiers, effective countermeasures will require a substantial degree of international co-operation. | en_AU |
dc.format.mimetype | application/pdf | en_AU |
dc.identifier.isbn | 9780455238647 | en_AU |
dc.identifier.uri | http://hdl.handle.net/1885/229715 | |
dc.language.iso | en_AU | en_AU |
dc.publisher | Thomson Reuters (Professional) Australia Limited | en_AU |
dc.relation.ispartof | Crime and Justice: A Guide to Criminology (5th edition) | en_AU |
dc.relation.isversionof | Fifth Edition | |
dc.rights | © 2017 Thomson Reuters (Professional) Australia Limited | en_AU |
dc.title | Cybercrime | en_AU |
dc.type | Book chapter | en_AU |
local.bibliographicCitation.lastpage | 278 | en_AU |
local.bibliographicCitation.placeofpublication | Pyrmont, Sydney, NSW | |
local.bibliographicCitation.startpage | 243 | en_AU |
local.contributor.affiliation | Smith, Russell, Australian Institute of Criminology | en_AU |
local.contributor.affiliation | Grabosky, Peter, College of Asia and the Pacific, ANU | en_AU |
local.contributor.authoremail | peter.grabosky@anu.edu.au | en_AU |
local.contributor.authoruid | Grabosky, Peter, u4032886 | en_AU |
local.description.embargo | 2099-12-31 | |
local.description.notes | Imported from ARIES | en_AU |
local.identifier.absfor | 100500 - COMMUNICATIONS TECHNOLOGIES | en_AU |
local.identifier.absfor | 160201 - Causes and Prevention of Crime | en_AU |
local.identifier.ariespublication | u4860843xPUB373 | en_AU |
local.identifier.uidSubmittedBy | u4860843 | en_AU |
local.type.status | Published Version | en_AU |
Downloads
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 01_Smith_Cybercrime_2017.pdf
- Size:
- 5.08 MB
- Format:
- Adobe Portable Document Format