Store

Test Bank for Cybercrime and Digital Forensics 2nd Edition by Thomas J. Holt Adam

By: Thomas J. Holt Adam M. Bossler Kathryn C. Seigfried-Spellar
ISBN-10: 1138238732
/ ISBN-13: 9781315296951

Resource Type Information

Edition: 2nd Edition
Authors: Thomas J. Holt Adam M. Bossler Kathryn C. Seigfried-Spellar
Secure Stripe Payment Logo.png

$40.00 $35.00

Instant Download to your account.

Description

1 TECHNOLOGY AND CYBERCRIME

    • Introduction
    • Technology as a landscape for crime
    • A typology of cybercrime
    • This text

2 LAW ENFORCEMENT, PRIVACY, AND SECURITY IN DEALING WITH CYBERCRIME

    • Introduction
    • Local police and sheriffs’ offices
    • State agencies
    • Federal law enforcement
    • Civil investigation and application of digital evidence
    • Extralegal agencies and non-governmental organizations
    • International enforcement challenges
    • The tension between security and privacy
    • Summary

3 COMPUTER HACKERS AND HACKING

    • Introduction
    • Defining computer hacking
    • Victims of hacking
    • The human aspects of the hacker subculture
    • Hacking history
    • The modern hacker subculture
    • Legal frameworks to prosecute hacking
    • Enforcing and investigating hacker activity
    • Summary

4 MALWARE AND AUTOMATED COMPUTER ATTACKS

    • Introduction
    • The basics of malware
    • Viruses, trojans, and worms
    • The global impact of malware
    • Hackers and malware writers
    • The market for malicious software
    • Legal challenges in dealing with malware
    • Coordination and management in addressing malware
    • Summary

5 DIGITAL PIRACY AND INTELLECTUAL PROPERTY THEFT

    • Introduction
    • What is intellectual property?
    • The evolution of piracy over time
    • The subculture of piracy
    • The evolution of legislation to deal with piracy
    • The law enforcement and industry response
    • Summary

6 ECONOMIC CRIMES AND ONLINE FRAUD

    • Introduction
    • Fraud and computer-mediated communications
    • Identity theft
    • Email-based scams
    • Romance scams
    • The problem of carding and stolen data markets
    • Identity theft and fraud laws
    • Summary

7 PORNOGRAPHY, PROSTITUTION, AND SEX CRIMES

    • Introduction
    • The spectrum of sexuality online
    • Pornography in the digital age
    • Prostitution and sex work
    • Dealing with obscenity and pornography online
    • Self-regulation by the pornography industry
    • Summary

8 CHILD PORNOGRAPHY AND SEXUAL EXPLOITATION

    • Introduction
    • Defining and differentiating child porn from obscene content
    • The role of technology in child pornography and exploitation
    • Explorations of the pedophile subculture online
    • The legal status of child pornography around the globe
    • Summary

9 CYBERBULLYING, ONLINE HARASSMENT, AND CYBERSTALKING

    • Online threats, bullying, and harassment
    • Defining cyberbullying
    • Predictors of bullying online and offline
    • Summary

10 ONLINE EXTREMISM, CYBERTERROR, AND CYBERWARFARE

    • Introduction
    • Defining terror, hacktivism, and cyberterror
    • The role of nation-state vs. non-nation-state attacks
    • The use of the Internet in the indoctrination and recruitment of extremist groups
    • Electronic attacks by extremist groups
    • Cyberwar and the nation-state
    • Legislating extremism and cyberterror
    • Investigating and securing cyberspace from the threat of terror and war
    • Cyberwar and response
    • Summary

11 CYBERCRIME AND CRIMINOLOGICAL THEORIES

    • Introduction
    • Subcultural theories
    • Social learning theory and cybercrime
    • General theory of crime
    • Agnew’s general strain theory
    • Techniques of neutralization
    • Deterrence theory
    • Theories of cybercrime victimization
    • Need for new cyberspace theories?
    • Summary

12 EVOLUTION OF DIGITAL FORENSICS

    • Introduction
    • From computer forensics to digital forensics
    • Stages of digital forensic investigation
    • The role of digital evidence
    • Types of hardware, peripherals, and electronic evidence
    • Evidence integrity
    • Summary

13 ACQUISITION AND EXAMINATION OF FORENSIC EVIDENCE

    • Introduction
    • Data preservation
    • Digital forensic imaging tools
    • Uncovering digital evidence
    • Data analysis
    • Data reduction and filtering
    • Reporting of findings
    • Summary

14 LEGAL CHALLENGES IN DIGITAL FORENSIC INVESTIGATIONS

    • Introduction
    • Constitutional issues in digital investigations
    • Federal Rules of Evidence 702
    • Summary

15 THE FUTURE OF CYBERCRIME, TERROR, AND POLICY

    • Introduction
    • Considering the future of cybercrime
    • How technicways will shift with new technologies
    • Social movements, technology, and social change
    • Need for new cyber criminological theories?
    • Shifting enforcement strategies in the age of the Internet
    • Considering the future of forensics
    • The challenge to policy makers globally
    • Summary

Glossary

Index


Additional Information


Ebook Title:

Authors:

Edition:

2nd-edition

Related Test Books

Reviews

Your #1 Online Study Guide Resource

* We don’t share your personal info with anyone. Check out our Privacy Policy for more information