skip to content
Cybercrime Preview this item
ClosePreview this item
Checking...

Cybercrime

Author: Louise I Gerdes
Publisher: Detroit : Greenhaven Press, A part of Gale, Cengage Learning, [2013]
Series: Opposing viewpoints series (Unnumbered)
Edition/Format:   Book : English
Database:WorldCat
Summary:
This volume explores the topic of the cybercrime and crime involving computers and computer networks by presenting varied expert opinions that examine many of the different aspects that surround this issue. The editors investigate topics such as the seriousness of cybercrime, how criminals use computer resources to commit cybercrime, if the use of electronic computer technologies such as WikiLeaks, social media,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Louise I Gerdes
ISBN: 9780737763126 0737763124 9780737763133 0737763132
OCLC Number: 783171211
Description: 243 pages : illustrations ; 25 cm.
Contents: Ch. 1 Is cybercrime a serious problem?: Identity theft is a serious problem / Sid Kirchheimer --
The impact of identity theft for most victims is minimal / Lynn Langton, Michael Planty --
Cyberterrorism poses a serious threat to national security / John R. Rossi --
The threat of cyberterrorism is exaggerated / Maura Conway --
Music piracy poses a serious threat to the US economy / Stephen E. Siwek --
The economic impact of music piracy is exaggerated / Eric Bangeman. Ch. 2 How do cybercriminals use online media to commit crimes? : Fighting back online predators / Kim Hone-McMahan --
The number of predators that exploit children online is exaggerated / Steve Rendall --
Cybercriminals use personal information on social networking websites to commit crimes / Consumer Reports --
Flash mobs, no longer just dance parties and pillow fights, pose growing criminal threat: cops / Eric Tucker, and Thomas Watkins --
Domestic abusers use technology to stalk and threaten their victims / Dalia Colòn. Ch. 3 Is Internet activism a cybercrime? : Activist websites that reveal sensitive documents threaten diplomatic negotiations / John Feffer --
Activist websites that reveal sensitive documents are a useful form of journalism / David Carr --
Some activists hack the Internet to promote political beliefs / Peter Ludlow --
Some activist hackers have become too corrupt to be effective / Charles Arthur --
Some activist hackers oppose corporate control of the Internet / Tim Hwang --
Great firewall: Chinese censors of Internet face "Hacktivists" in U.S. / Geoffrey Fowler. Ch. 4 What laws will best prevent cybercrime? : A strict national standard is necessary to encourage companies to disclose data breaches / Andrew Crocker --
Industry self-regulation, not government intervention, is the best way to protect consumers from data attacks / William H. Saito --
Laws to protect children from Internet pornographers are necessary / Lamar Smith, Debbie Wasserman Schultz --
Proposed laws to protect children from Internet pornographers are unconstitutional / Laura W. Murphy, Christopher Calabrese, Jesselyn McCurdy --
Brake the Internet pirates: how to slow down intellectual property theft in the digital era / Wall Street Journal --
The Stop Online Piracy Act will not prevent online piracy / Julian Sanchez --
Internet service providers should be held liable for cybercrime / Noah Shachtman --
Making Internet service providers liable will not reduce cybercrime / Mike Masnick.
Series Title: Opposing viewpoints series (Unnumbered)
Other Titles: Cybercrime : opposing viewpoints
Responsibility: Louise I. Gerdes, Book Editor.

Abstract:

This volume explores the topic of the cybercrime and crime involving computers and computer networks by presenting varied expert opinions that examine many of the different aspects that surround this issue. The editors investigate topics such as the seriousness of cybercrime, how criminals use computer resources to commit cybercrime, if the use of electronic computer technologies such as WikiLeaks, social media, e-mail, and podcasts for various forms of activism can be considered a crime, and what measures and laws will be prevent crimes being committed via computers in the future. The viewpoints are selected from a wide range of highly respected and often hard-to-find sources and publications. Allows the reader to attain the higher-level critical thinking and reading skills that are essential in a culture of diverse and contradictory opinions.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/783171211>
library:oclcnum"783171211"
library:placeOfPublication
owl:sameAs<info:oclcnum/783171211>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:contributor
schema:datePublished"2013"
schema:description"This volume explores the topic of the cybercrime and crime involving computers and computer networks by presenting varied expert opinions that examine many of the different aspects that surround this issue. The editors investigate topics such as the seriousness of cybercrime, how criminals use computer resources to commit cybercrime, if the use of electronic computer technologies such as WikiLeaks, social media, e-mail, and podcasts for various forms of activism can be considered a crime, and what measures and laws will be prevent crimes being committed via computers in the future. The viewpoints are selected from a wide range of highly respected and often hard-to-find sources and publications. Allows the reader to attain the higher-level critical thinking and reading skills that are essential in a culture of diverse and contradictory opinions."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1098229102>
schema:inLanguage"en"
schema:name"Cybercrime : opposing viewpoints"@en
schema:name"Cybercrime"@en
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.