Skip navigation Download free eBooks and textbooks

Choose a category

Policing Cyber Crime

Policing Cyber Crime
4.4 (15 reviews) Read reviews
ISBN: 978-87-7681-679-7
1 edition
Pages : 159
Price: Free

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.

You can also read this in Premium


Computer crime is an overwhelming problem worldwide.

300+ Business books exclusively in our Premium eReader

  • No adverts
  • Advanced features
  • Personal library
More about Premium

Buy this eBook

Buy now

Subscribe to all 800+ eBooks

Start free trial 30 day FREE trial

About the book

  1. Description
  2. Preface
  3. Content
  4. About the Author
  5. Embed
  6. Reviews


Computer crime is an overwhelming problem worldwide. It has brought an array of new crime activities and actors and, consequently, a series of new challenges in the fight against this new threat (Picard, 2009). Policing computer crime is a knowledge-intensive challenge because of the innovative aspect of many kinds of computer crime.

In this textbook you will learn more about Policing Cyber Crime. In this book a definition and examples of cyber crime will be given. Further you can read about crime protection and crime investigations.


The risk of computer crime has become a global issue affecting almost all countries. Salifu (2008) argues that the Internet is a "double-edged sword" providing many opportunities for individuals and organizations to develop and prosper, but at the same time has brought with it new opportunities to commit crime. For example, Nigeria-related financial crime is extensive and 122 out of 138 countries at an Interpol meeting complained about Nigerian involvement in financial fraud in their countries. The most notorious type attempted daily on office workers all over the world, is the so-called advance fee fraud. The sender will seek to involve the recipient in a scheme to earn millions of dollars if the recipient pays an advance fee (Ampratwum, 2009).

Cyberspace presents a challenging new frontier for criminology, police science, law enforcement and policing. Virtual reality and computer-mediated communications challenge the traditional discourse of criminology and police work, introducing new forms of deviance, crime, and social control. Since the 1990s, academics and practitioners have observed how cyberspace has emerged as a new field of criminal activity. Cyberspace is changing the nature and scope of offending and victimization. A new discipline named cyber criminology is emerging. Jaishankar (2007) defines cyber criminology as the study of causation of crimes that occur in the cyberspace and its impact in the physical space.



1. Cyber Crime Defined

1.1 Computer Crime Technology
1.2 Computer Crime on the Internet
1.4 White-Collar Computer Crime
1.5 Crime Offender or Victim

2. Cyber Crime Cases

2.1 Fake Websites
2.2 Money Laundering
2.3 Bank Fraud
2.4 Advance Fee Fraud
2.5 Malicious Agents
2.6 Stock Robot Manipulation
2.7 Identity Theft
2.8 Digital Piracy
2.9 Intellectual Property Crime
2.10 Internet Gambling

3. Child Grooming Case

3.1 Online Offenders
3.2 Internet Characteristics
3.3 Internet Relationships
3.4 Grooming Legislation
3.5 European Policy
3.6 Seventeen Internet Characteristics
3.7 Virtual Offender Communities

4. Crime Protection

4.1 Criminal Profiling
4.2 White-Collar Criminals
4.3 Deterrence Theory
4.4 Neutralization Theory
4.5 Regulation and Response
4.6 Criminal Justice Response
4.7 Regulation
4.8 Financial Regulation
4.9 Cyber Security
4.10 Shari’ah Perspective
4.11 Protecting Information Resources
4.12 The Case of Chinese Securities Commission 65

5. Corporate Reputation

5.1 Reputation Defined
5.2 Resource-Based Theory
5.3 Determinants of Corporate Reputation
5.4 Effects of Corporate Reputation
5.5 Theories of Corporate Reputation
5.6 Measurement of Corporate Reputation
5.7 Rebuilding Corporate Reputation
5.8 Social Responsibility
5.9 Corporate Governance Ratings

6. Knowledge Management

6.1 Knowledge Organization
6.2 Business Intelligence
6.3 Stages of Growth
6.4 Knowledge Resources
6.5 Core Competence
6.6 Entrepreneurship Capabilities
6.7 A Case of Dynamic Capabilities
6.8 Knowledge Driven Innovation

7. Intelligence Strategy

7.1 Strategy Characteristics
7.2 Information Sources
7.3 Knowledge Categories

8. Crime Investigations

8.1 Value Shop Configuration
8.2 Investigation Issues
8.3 Senior Investigating Officer
8.4 Electronic Evidence
8.5 How Detectives Work
8.6 Detective Thinking Styles
8.7 The Case of Økokrim in Norway


About the Author


Choose color
Implementation code. Copy into your own page
Embed Frame - Terms of Use

The embed frame is free to use for private persons, universities and schools. It is not allowed to be used by any company for commercial purposes unless it is for media coverage. You may not modify, build upon, or block any portion or functionality of the embed frame, including but not limited to links back to the website.

The Embed frame may not be used as part of a commercial business offering. The embed frame is intended for private people who want to share eBooks on their website or blog, professors or teaching professionals who want to make an eBook available directly on their page, and media, journalists or bloggers who wants to discuss a given eBook

If you are in doubt about whether you can implement the embed frame, you are welcome to contact Thomas Buus Madsen on and seek permission.


Junaid Ahmed ★★★★★

This book provide us with knowledge about the different types of cyber crimes and also give an idea on how to protect our network from these crimes... This is a great book.

Robert S. Miskell ★★★★★

Will increase the awareness and will enhance the knowledge of people on cyber crime and its related concepts and issues.