Skip navigation Download free eBooks and textbooks

Choose a category

Policing Cyber Crime

Policing Cyber Crime
4.5 (19 reviews) Read reviews
ISBN: 978-87-7681-679-7
1 edition
Pages : 159
  • Price: 75.50 kr
  • Price: €8.99
  • Price: £8.99
  • Price: ₹150
  • Price: $8.99
  • Price: 75.50 kr
  • Price: 75.50 kr

Download for FREE in 4 easy steps...

We are terribly sorry, but in order to download our books or watch our videos, you will need a browser that allows JavaScript.
After entering your email address, a confirmation email will be sent to your inbox. Please approve this email to receive our weekly eBook update. We will not share your personal information with any third party.
Unlock your organization's learning potential
See Demo

Corporate eLibrary

Discover our employee learning solutions

This is a Premium eBook

Bookboon Premium - Gain access to over 800 eBooks - without ads

You can get free access for a month to this - and 800 other books with the Premium Subscription. You can also buy the book below

  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: €5.99 p/m
  • Start a 30-day free trial. After trial: £4.99 p/m
  • Start a 30-day free trial. After trial: ₹299 p/m
  • Start a 30-day free trial. After trial: $3.99 p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
  • Start a 30-day free trial. After trial: 39.99 kr p/m
Unlock your organization's learning potential
Click here!

Corporate eLibrary

Discover our employee learning solutions

About the book

  1. Reviews
  2. Description
  3. Preface
  4. Content


Ramfis Miguelena ★★★★★

Excelente libro. Es un referente para todos aquellos estudiantes que estudian seguridad informática.

Junaid Ahmed ★★★★★

This book provide us with knowledge about the different types of cyber crimes and also give an idea on how to protect our network from these crimes... This is a great book.

Robert S. Miskell ★★★★★

Will increase the awareness and will enhance the knowledge of people on cyber crime and its related concepts and issues.


Computer crime is an overwhelming problem worldwide. It has brought an array of new crime activities and actors and, consequently, a series of new challenges in the fight against this new threat (Picard, 2009). Policing computer crime is a knowledge-intensive challenge because of the innovative aspect of many kinds of computer crime.

In this textbook you will learn more about Policing Cyber Crime. In this book a definition and examples of cyber crime will be given. Further you can read about crime protection and crime investigations.


The risk of computer crime has become a global issue affecting almost all countries. Salifu (2008) argues that the Internet is a "double-edged sword" providing many opportunities for individuals and organizations to develop and prosper, but at the same time has brought with it new opportunities to commit crime. For example, Nigeria-related financial crime is extensive and 122 out of 138 countries at an Interpol meeting complained about Nigerian involvement in financial fraud in their countries. The most notorious type attempted daily on office workers all over the world, is the so-called advance fee fraud. The sender will seek to involve the recipient in a scheme to earn millions of dollars if the recipient pays an advance fee (Ampratwum, 2009).

Cyberspace presents a challenging new frontier for criminology, police science, law enforcement and policing. Virtual reality and computer-mediated communications challenge the traditional discourse of criminology and police work, introducing new forms of deviance, crime, and social control. Since the 1990s, academics and practitioners have observed how cyberspace has emerged as a new field of criminal activity. Cyberspace is changing the nature and scope of offending and victimization. A new discipline named cyber criminology is emerging. Jaishankar (2007) defines cyber criminology as the study of causation of crimes that occur in the cyberspace and its impact in the physical space.



1. Cyber Crime Defined

1.1 Computer Crime Technology
1.2 Computer Crime on the Internet
1.4 White-Collar Computer Crime
1.5 Crime Offender or Victim

2. Cyber Crime Cases

2.1 Fake Websites
2.2 Money Laundering
2.3 Bank Fraud
2.4 Advance Fee Fraud
2.5 Malicious Agents
2.6 Stock Robot Manipulation
2.7 Identity Theft
2.8 Digital Piracy
2.9 Intellectual Property Crime
2.10 Internet Gambling

3. Child Grooming Case

3.1 Online Offenders
3.2 Internet Characteristics
3.3 Internet Relationships
3.4 Grooming Legislation
3.5 European Policy
3.6 Seventeen Internet Characteristics
3.7 Virtual Offender Communities

4. Crime Protection

4.1 Criminal Profiling
4.2 White-Collar Criminals
4.3 Deterrence Theory
4.4 Neutralization Theory
4.5 Regulation and Response
4.6 Criminal Justice Response
4.7 Regulation
4.8 Financial Regulation
4.9 Cyber Security
4.10 Shari’ah Perspective
4.11 Protecting Information Resources
4.12 The Case of Chinese Securities Commission 65

5. Corporate Reputation

5.1 Reputation Defined
5.2 Resource-Based Theory
5.3 Determinants of Corporate Reputation
5.4 Effects of Corporate Reputation
5.5 Theories of Corporate Reputation
5.6 Measurement of Corporate Reputation
5.7 Rebuilding Corporate Reputation
5.8 Social Responsibility
5.9 Corporate Governance Ratings

6. Knowledge Management

6.1 Knowledge Organization
6.2 Business Intelligence
6.3 Stages of Growth
6.4 Knowledge Resources
6.5 Core Competence
6.6 Entrepreneurship Capabilities
6.7 A Case of Dynamic Capabilities
6.8 Knowledge Driven Innovation

7. Intelligence Strategy

7.1 Strategy Characteristics
7.2 Information Sources
7.3 Knowledge Categories

8. Crime Investigations

8.1 Value Shop Configuration
8.2 Investigation Issues
8.3 Senior Investigating Officer
8.4 Electronic Evidence
8.5 How Detectives Work
8.6 Detective Thinking Styles
8.7 The Case of Økokrim in Norway


This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.