000725930 000__ 02958cam\a2200505Ii\4500 000725930 001__ 725930 000725930 005__ 20230306140704.0 000725930 006__ m\\\\\o\\d\\\\\\\\ 000725930 007__ cr\cn\nnnunnun 000725930 008__ 150305s2015\\\\sz\a\\\\ob\\\\000\0\eng\d 000725930 020__ $$a9783319151502$$qelectronic book 000725930 020__ $$a3319151509$$qelectronic book 000725930 020__ $$z9783319151496 000725930 0247_ $$a10.1007/978-3-319-15150-2$$2doi 000725930 035__ $$aSP(OCoLC)ocn904399910 000725930 035__ $$aSP(OCoLC)904399910 000725930 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dCOO$$dDKU$$dYDXCP$$dOCLCF 000725930 049__ $$aISEA 000725930 050_4 $$aHV6773 000725930 08204 $$a364.16/8$$223 000725930 24500 $$aCybercrime, digital forensics and jurisdiction$$h[electronic resource] /$$cMohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi. 000725930 264_1 $$aCham :$$bSpringer,$$c2015. 000725930 300__ $$a1 online resource (xviii, 145 pages). 000725930 336__ $$atext$$btxt$$2rdacontent 000725930 337__ $$acomputer$$bc$$2rdamedia 000725930 338__ $$aonline resource$$bcr$$2rdacarrier 000725930 4901_ $$aStudies in computational intelligence,$$x1860-949X ;$$vvolume 593 000725930 504__ $$aIncludes bibliographical references. 000725930 5050_ $$aPart I Fundamentals of Cybercrime -- Part II Computer System as Target -- Part III Computer System as Tool -- Part IV Content ? Related Offenses -- Part V Privacy, Security and Crime Control. 000725930 506__ $$aAccess limited to authorized users. 000725930 520__ $$aThe purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensicsâ„—â„“ and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope. 000725930 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 5, 2015). 000725930 650_0 $$aComputer crimes. 000725930 650_0 $$aComputer crimes$$xInvestigation. 000725930 650_0 $$aComputer crimes$$xLaw and legislation. 000725930 7001_ $$aChawki, Mohamed,$$d1976-$$eauthor. 000725930 7001_ $$aDarwish, Ashraf,$$eauthor. 000725930 7001_ $$aKhan, Mohammad Ayoub,$$d1980-$$eauthor. 000725930 7001_ $$aTyagi, Sapna,$$eauthor. 000725930 77608 $$iPrint version:$$z9783319151496 000725930 830_0 $$aStudies in computational intelligence ;$$vvolume 593. 000725930 852__ $$bebk 000725930 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-15150-2$$zOnline Access$$91397441.1 000725930 909CO $$ooai:library.usi.edu:725930$$pGLOBAL_SET 000725930 980__ $$aEBOOK 000725930 980__ $$aBIB 000725930 982__ $$aEbook 000725930 983__ $$aOnline 000725930 994__ $$a92$$bISE