Cybercrime, digital forensics and jurisdiction [electronic resource] / Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi.
2015
HV6773
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Cybercrime, digital forensics and jurisdiction [electronic resource] / Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi.
ISBN
9783319151502 electronic book
3319151509 electronic book
9783319151496
3319151509 electronic book
9783319151496
Published
Cham : Springer, 2015.
Language
English
Description
1 online resource (xviii, 145 pages).
Item Number
10.1007/978-3-319-15150-2 doi
Call Number
HV6773
Dewey Decimal Classification
364.16/8
Summary
The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics℗ℓ and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 5, 2015).
Added Author
Series
Studies in computational intelligence ; volume 593.
Available in Other Form
Print version: 9783319151496
Linked Resources
Record Appears in
Table of Contents
Part I Fundamentals of Cybercrime
Part II Computer System as Target
Part III Computer System as Tool
Part IV Content ? Related Offenses
Part V Privacy, Security and Crime Control.
Part II Computer System as Target
Part III Computer System as Tool
Part IV Content ? Related Offenses
Part V Privacy, Security and Crime Control.