Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Author
Title
Principles of cybercrime / Jonathan Clough.
Published
Cambridge, United Kingdom : Cambridge University Press, 2015.
Call Number
K5215 .C58 2015
Edition
Second edition.
ISBN
9781107034570 (hardback)
1107034574 (hardback)
9781107698161 (paperback)
1107698162 (paperback)
1107034574 (hardback)
9781107698161 (paperback)
1107698162 (paperback)
Description
lvi, 524 pages ; 23 cm
System Control No.
(OCoLC)908935493
Summary
"Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law"-- Provided by publisher.
Bibliography, etc. Note
Includes bibliographical references (pages 489-512) and index.
Record Appears in
Gift
Purchased from the income of the Schiller Fund
Gift

The Arthur W. Diamond Law Library
Purchased from the income of the Schiller Fund
Table of Contents
Preface
viii
Acknowledgements
x
Table of legislation
xi
Table of cases
xxxvi
List of abbreviations
lv
pt. I
Introduction
1
1.
Cybercrime
3
1.
evolution of cybercrime
3
2.
challenges of cybercrime
5
3.
Defining cybercrime
9
4.
Cyberterrorism
12
5.
scale of the problem
15
6.
Online/offline consistency
17
7.
Virtual crimes?
18
8.
global problem: the Convention on Cybercrime
23
pt. II
Computer as target
29
2.
Computer as target
31
1.
Introduction
31
2.
prevalence of cybercrime
45
3.
legislative environment
47
3.
Access offences
56
1.
Introduction
56
2.
meaning of `computer'
59
3.
`Access'
68
4.
`Unauthorised'
80
5.
Fault element
104
6.
Additional elements
107
4.
Modification or impairment of data
112
1.
Introduction
112
2.
Legislative provisions
113
3.
Conduct causing modification or impairment
117
4.
Modification or impairment
123
5.
Misuse of devices
133
1.
Introduction
133
2.
Australia
136
3.
Canada
138
4.
United Kingdom
141
5.
United States
144
6.
Interception of data
149
1.
changing nature of telecommunications
149
2.
legislative framework
150
3.
meaning of `telecommunication'
158
4.
What is a communication? (content vs. metadata)
167
5.
`Interception' (live vs. stored communications)
183
pt. III
Fraud and related offences
207
7.
Fraud
209
1.
Fraud online
209
2.
scale of the problem
228
3.
Legal responses
232
4.
Identity theft
238
8.
Criminal copyright infringement
255
1.
Copyright infringement is (not) theft
255
2.
Legislative provisions
261
9.
`Spam'
272
1.
Electronic junk mail
272
2.
Regulating spam
275
3.
Anti-spam legislation
279
pt. IV
Content-related offences
287
10.
Child pornography
289
1.
Child abuse online
289
2.
criminalisation of child pornography
294
3.
Defining child pornography
297
4.
Producing child pornography
325
5.
Offering or making available
330
6.
Distributing or transmitting
335
7.
Procuring child pornography
338
8.
Possession of child pornography
344
9.
Defences
368
pt. V
Offences against the person
375
11.
`Grooming'
377
1.
Sexual predators online
377
2.
Legislative responses
385
3.
Transmitting indecent or obscene material to minors
389
4.
Grooming
394
5.
Inducing or procuring
402
6.
Travelling with intent
413
12.
Harassment
417
1.
Harassment in cyberspace
417
2.
scale of the problem
420
3.
Legislative responses
423
4.
Forms of harassment
433
13.
Voyeurism
454
1.
Digital voyeurs
454
2.
Criminalising voyeurism
455
3.
Legislative responses
459
pt. VI
Jurisdiction
473
14.
Jurisdiction
475
1.
Crime in cyberspace
475
2.
Prescriptive jurisdiction
475
3.
Adjudicative jurisdiction
481
4.
Enforcement jurisdiction
486
Bibliography
489
Index
513