Centro de Documentação da PJ
Monografia

CD276
CYBERCRIME, DIGITAL FORENSICS AND JURISDICTION
Cybercrime, digital forensics and jurisdiction [Documento electrónico] / Mohamed Chawki ..[et al.].- Cham : Springer, 2015.- 1 CD-ROM ; 12 cm. - (Studies in Computational Intelligence ; 593)
Ficheiro de 3,08 MB em formato PDF (151 p.).
ISBN 978-3-319-15150-2


CRIME INFORMÁTICO, INFORMÁTICA FORENSE, VÍRUS INFORMÁTICO, FRAUDE INFORMÁTICA, NIGÉRIA

Part I. Fundamentals of Cybercrime. 1 Cybercrime: Introduction, Motivation and Methods. 1.2 The Scale of the Problem and Reasons for the Growth of Cybercrime. 1.3 Profiling Cybercriminals. 1.4 Challenges for Criminal Justice and Law Enforcement. 1.5 The Future of Cybercrime. Part II. Computer System as Target. 2 Unauthorized Access Offences in Cyberworld. 2.1 Emerging Threats: Expected Targets and Forms. 2.2 Criminal Statues. 2.3 Other Offences Associated with Hacking. 3 Injection of Malicious Code in Application. 3.1 Introduction. 3.2 Types of Malicious Code. 3.3 Threats Posed by Viruses, Worms, and Trojan Horses. 3.4 Legislative Approaches. Part III. Computer System as Tool. 4 Attempts and Impact of Phishing in Cyberworld. 4.1 The Problem of Phishing. 4.2 Impact and Harm Generated by Phishing. 4.3 Mechanisms of Cyberspace Phishing. 4.4 Using Stolen Financial Information. 4.5 Customer Vigilance. 5 Sexual Harassment in Cyberworld. 5.1 Introduction. 5.2 Harassment in Cyberworld. 5.3 Cases and Prevalence of Sexual Harassment in Cyberspace. 5.4 Enforcement Problems. 5.5 Legal Regulation. 5.6 Non Legal Regulation. 5.7 Prevention of Sexual Harassment on the Internet. Part IV. Content-Related Offenses. 6 Online Obscenity and Child Sexual Abuse. 6.1 Introduction. 6.2 The Role of the Internet in Promoting Child Sexual Abuse. 6.3 Criminal Offenses Against Children. 6.4 Minimizing Risks. 6.5 Where Next?. Part V. Privacy, Security and Crime Control. 7 Anonymity, Privacy and Security Issues in Cyberworld. 7.1 Introduction. 7.2 Anonymity in Cyberspace. 7.3 Impact and Harm Generated by Anonymity. 7.4 Regulating Anonymity in Cyberspace. 7.5 The Case Law. 7.6 The Appropriate Balance. 8 Strategies and Statutes for Prevention of Cybercrime. 8.1 Introduction. 8.2 National and Regional Strategies: The European Approach. 8.3 The American Response. 8.4 Technical Approach. 8.5 The Future. 9. 419 Scam: An Evaluation of Cybercrime and Criminal Code in Nigeria. 9.1 The Meaning of 419 Scam. 9.2 The Operation of the Scheme. 9.3 The Nature and Extent of the Problem. 9.4 Evaluation of the Current Situation in Nigeria. 9.5 419 Scam Combating Efforts in Nigeria. 9.6 The Quest for Legislative Harmonisation. 9.7 Future Trends.