Skip navigation Download von kostenlosen eBooks für Studium und Beruf

Choose a category

Policing Cyber Crime

Policing Cyber Crime
4,6 (23 Bewertungen) Bewertung lesen
ISBN: 978-87-7681-679-7
1. Auflage
Seiten : 159
  • Preis: 75,50 kr
  • Preis: €8,99
  • Preis: £8,99
  • Preis: ₹150
  • Preis: $8,99
  • Preis: 75,50 kr
  • Preis: 75,50 kr

KOSTENLOS downloaden in 4 einfachen Schritten...

Um unsere Bücher herunterzuladen oder Videos anzusehen, benötigen Sie einen Browser, der JavaScript zulässt.
Sind Sie daran interessiert, Neuigkeiten zu unseren KOSTENLOSEN eBooks und relevanten Bookboon-Updates zu erhalten?
Nachdem Sie Ihre Email angegeben haben, schicken wir Ihnen eine Bestätigungsmail. Durch Klicken auf den dort angezeigten Link erhalten Sie unseren Newsletter. Wir geben Ihre Daten nicht an eine Dritte weiter.
Entdecken Sie das Lernpotenzial Ihrer Organisation
Demo anschauen


Unsere Business Lösung für Weiterbildung

Das ist ein Premium eBook

Bookboon Premium - Erhalten Sie Zugang zu über 800 eBooks - ohne Werbeanzeigen

Erhalten Sie kostenlosen Zugang für einen Monat - und 800 andere Bücher mit dem Premium Abo. Sie können das Buch auch einzeln kaufen

  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
  • Kostenloses 30-Tage Probeabo. Dann €5,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann £4,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann ₹299 p. M.
  • Kostenloses 30-Tage Probeabo. Dann $3,99 p. M.
  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
  • Kostenloses 30-Tage Probeabo. Dann 39,99 kr p. M.
Entdecken Sie das Lernpotenzial Ihrer Organisation
Hier klicken!


Unsere Business Lösung für Weiterbildung

Über das Buch

  1. Bewertungen
  2. Beschreibung
  3. Einleitung
  4. Inhalt


Ramfis Miguelena ★★★★★

Excelente libro. Es un referente para todos aquellos estudiantes que estudian seguridad informática.

Junaid Ahmed ★★★★★

This book provide us with knowledge about the different types of cyber crimes and also give an idea on how to protect our network from these crimes... This is a great book.

Robert S. Miskell ★★★★★

Will increase the awareness and will enhance the knowledge of people on cyber crime and its related concepts and issues.


Computer crime is an overwhelming problem worldwide. It has brought an array of new crime activities and actors and, consequently, a series of new challenges in the fight against this new threat (Picard, 2009). Policing computer crime is a knowledge-intensive challenge because of the innovative aspect of many kinds of computer crime.

In this textbook you will learn more about Policing Cyber Crime. In this book a definition and examples of cyber crime will be given. Further you can read about crime protection and crime investigations.


The risk of computer crime has become a global issue affecting almost all countries. Salifu (2008) argues that the Internet is a "double-edged sword" providing many opportunities for individuals and organizations to develop and prosper, but at the same time has brought with it new opportunities to commit crime. For example, Nigeria-related financial crime is extensive and 122 out of 138 countries at an Interpol meeting complained about Nigerian involvement in financial fraud in their countries. The most notorious type attempted daily on office workers all over the world, is the so-called advance fee fraud. The sender will seek to involve the recipient in a scheme to earn millions of dollars if the recipient pays an advance fee (Ampratwum, 2009).

Cyberspace presents a challenging new frontier for criminology, police science, law enforcement and policing. Virtual reality and computer-mediated communications challenge the traditional discourse of criminology and police work, introducing new forms of deviance, crime, and social control. Since the 1990s, academics and practitioners have observed how cyberspace has emerged as a new field of criminal activity. Cyberspace is changing the nature and scope of offending and victimization. A new discipline named cyber criminology is emerging. Jaishankar (2007) defines cyber criminology as the study of causation of crimes that occur in the cyberspace and its impact in the physical space.



1. Cyber Crime Defined

1.1 Computer Crime Technology
1.2 Computer Crime on the Internet
1.4 White-Collar Computer Crime
1.5 Crime Offender or Victim

2. Cyber Crime Cases

2.1 Fake Websites
2.2 Money Laundering
2.3 Bank Fraud
2.4 Advance Fee Fraud
2.5 Malicious Agents
2.6 Stock Robot Manipulation
2.7 Identity Theft
2.8 Digital Piracy
2.9 Intellectual Property Crime
2.10 Internet Gambling

3. Child Grooming Case

3.1 Online Offenders
3.2 Internet Characteristics
3.3 Internet Relationships
3.4 Grooming Legislation
3.5 European Policy
3.6 Seventeen Internet Characteristics
3.7 Virtual Offender Communities

4. Crime Protection

4.1 Criminal Profiling
4.2 White-Collar Criminals
4.3 Deterrence Theory
4.4 Neutralization Theory
4.5 Regulation and Response
4.6 Criminal Justice Response
4.7 Regulation
4.8 Financial Regulation
4.9 Cyber Security
4.10 Shari’ah Perspective
4.11 Protecting Information Resources
4.12 The Case of Chinese Securities Commission 65

5. Corporate Reputation

5.1 Reputation Defined
5.2 Resource-Based Theory
5.3 Determinants of Corporate Reputation
5.4 Effects of Corporate Reputation
5.5 Theories of Corporate Reputation
5.6 Measurement of Corporate Reputation
5.7 Rebuilding Corporate Reputation
5.8 Social Responsibility
5.9 Corporate Governance Ratings

6. Knowledge Management

6.1 Knowledge Organization
6.2 Business Intelligence
6.3 Stages of Growth
6.4 Knowledge Resources
6.5 Core Competence
6.6 Entrepreneurship Capabilities
6.7 A Case of Dynamic Capabilities
6.8 Knowledge Driven Innovation

7. Intelligence Strategy

7.1 Strategy Characteristics
7.2 Information Sources
7.3 Knowledge Categories

8. Crime Investigations

8.1 Value Shop Configuration
8.2 Investigation Issues
8.3 Senior Investigating Officer
8.4 Electronic Evidence
8.5 How Detectives Work
8.6 Detective Thinking Styles
8.7 The Case of Økokrim in Norway


This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.