000285233 000__ 02854pam\a22003014a\45\0 000285233 001__ 285233 000285233 005__ 20210513105202.0 000285233 008__ 040615s2004\\\\cau\\\\\\b\\\\001\0\eng\\ 000285233 010__ $$a 2004013960 000285233 020__ $$a1851096833 (alk. paper) 000285233 035__ $$a(OCoLC)ocm55682154 000285233 035__ $$a285233 000285233 040__ $$aDLC$$cDLC$$dYDX 000285233 042__ $$apcc 000285233 049__ $$aISEA 000285233 05000 $$aHV6773$$b.S3547 2004 000285233 08200 $$a364.16/8$$222 000285233 1001_ $$aSchell, Bernadette H.$$q(Bernadette Hlubik),$$d1952- 000285233 24510 $$aCybercrime :$$ba reference handbook /$$cBernadette H. Schell and Clemens Martin. 000285233 260__ $$aSanta Barbara, Calif. :$$bABC-CLIO,$$cc2004. 000285233 300__ $$axiv, 247 p. ;$$c24 cm. 000285233 440_0 $$aContemporary world issues 000285233 504__ $$aIncludes bibliographical references (p. 209-222) and index. 000285233 5050_ $$aA history and categories of cybercrime -- Basic cybercrime terms -- Birth of the White Hats -- The origin of the Black Hat label in the United States and Britain -- Y2K : fears emerge about cyberterrorism -- Post-Y2K incidents exacerbating cyberterrorist fears -- Countering cyberterrorists : the U.S. Homeland Security Act of 2002 -- Incidents exacerbating cyberterrorism anxieties -- The importance of social engineering to cybercriminals -- Categories of cybercrime : harm to property and/or to persons -- Criminal liability and the coincidence of four elements -- The increasing complexity of property cybercrime -- Cybercrimes against persons -- The nonoffenses of cybervigilantism and hacktivism -- Issues, controversies, and solutions -- Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions -- Methods used to commit cybercrime, cases, and countermeasures -- Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act -- Controversial "non-cases" of cracking -- Overview of system vulnerabilities and related controversies -- How chief operating officers worldwide are feeling about their systems' vulnerabilities and why -- A case study : outlining the "real" threat of a possible coordinated terror attack -- Using honeypots to better know "the enemy", and controversies surrounding them -- More question of interest : operating systems software--are some more vulnerable to cracking exploits than others? -- Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime -- Chronology -- Biographical sketches -- Cybercrime legal cases -- A summary of recent U.S. anti-terror and anti-cybercrime legislation -- General observations about recent trends in cybercrime -- Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030. 000285233 650_0 $$aComputer crimes. 000285233 650_0 $$aCyberterrorism. 000285233 7001_ $$aMartin, Clemens. 000285233 85200 $$bgen$$hHV6773$$i.S3547$$i2004 000285233 909CO $$ooai:library.usi.edu:285233$$pGLOBAL_SET 000285233 980__ $$aBIB 000285233 980__ $$aBOOK 000285233 994__ $$aC0$$bISE