Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

By in Federal Jurisdiction on March 4, 2013

List Price: $ 44.95


Last checked best price : $ 35.86
Kindly click the buy button to get latest prices
Thank you for visiting AttorneyNext. Support us by buying products through our links.

Cybercrime: Criminal Threats from Cyberspace is intended to explain two things: what cybercrime is and why the average citizen should care about it. To accomplish that task, the book offers an overview of cybercrime and an in-depth discussion of the legal and policy issues surrounding it.

Enhancing her narrative with real-life stories, author Susan W. Brenner traces the rise of cybercrime from mainframe computer hacking in the 1950s to the organized, professional, and often transnational cybercrime that has become the norm in the 21st century. She explains the many different types of computer-facilitated crime, including identity theft, stalking, extortion, and the use of viruses and worms to damage computers, and outlines and analyzes the challenges cybercrime poses for law enforcement officers at the national and international levels. Finally, she considers the inherent tension between improving law enforcement’s ability to pursue cybercriminals and protecting the privacy of U.S. citizens.

One thought on “Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

  1. 1
    2 of 2 people found the following review helpful
    5.0 out of 5 stars
    Magnificent, June 13, 2011
    By 
    Eric Huber
    (REAL NAME)
      

    Amazon Verified Purchase(What’s this?)

    I decided to take a chance on this book. I was in the mood to learn more about cybercrime and ran across this one while looking for my next book to read. The description provided by Amazon was pretty sparse, but the price was reasonable enough so I took a chance. That gamble certainly paid off because this is a very impressive book.

    What you aren’t going to get is a detailed technical exploration of the various kinds of cybercrime that are prevalent in the world today. It’s not that kind of book and that clearly was not the objective of the author. What you will find is a clearly written review of world of international cybercrime from a legal standpoint. While I would have preferred a more detailed exploration of some of the specific cybercrimes discussed in the book, it still does a reasonable job of providing the reader with a good understanding of the subject matter. Where this book really shines is how it introduces readers to the legal concepts and challenges associated with international cybercrime. The author isn’t afraid to talk about complicated legal concepts, but she does so in such an approachable manner that the average reader will find it easy to follow along and understand.

    This book is everything you would expect and hope for from a book that was written by a law professor who is passionate and knowledgeable about the world of cybercrime. The people who would benefit the most by reading it are students who want to not only understand the current state of cybercrime activity today, but also want to walk away with a solid understanding of the associated legal concepts. That’s also why I also recommend this book to experienced security practitioners. Professor Brenner spends a considerable amount of time educating the reader not only about the specific legal concepts relevant to the cybercriminal world, but she also provides a fine overview of traditional aspects of criminal law and criminal procedure.

    This book is ultimately a book on cybercrime from the perspective of a legal person rather than a technical person. Because of that, what we end up with is a four star book on cybercrime that easily becomes a five star book once you factor in the magnificent legal content. This is a book that I will be happily recommending to anyone who wants to better understand the legal aspects of the cybercrime world.

    Help other customers find the most helpful reviews 

    Was this review helpful to you? Yes
    No

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>