Cyberspace, Cybersecurity, and Cybercrime

Author:   Janine Kremling ,  Amanda M. Sharp Parker
Publisher:   SAGE Publications Inc
ISBN:  

9781506347257


Pages:   296
Publication Date:   18 December 2017
Format:   Paperback
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Our Price $198.00 Quantity:  
Add to Cart

Share |

Cyberspace, Cybersecurity, and Cybercrime


Add your own review!

Overview

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it.

Full Product Details

Author:   Janine Kremling ,  Amanda M. Sharp Parker
Publisher:   SAGE Publications Inc
Imprint:   SAGE Publications Inc
Dimensions:   Width: 17.70cm , Height: 1.00cm , Length: 25.40cm
Weight:   0.560kg
ISBN:  

9781506347257


ISBN 10:   1506347258
Pages:   296
Publication Date:   18 December 2017
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Active
Availability:   To order   Availability explained
Stock availability from the supplier is unknown. We will order it for you and ship this item to you once it is received by us.

Table of Contents

Preface Acknowledgments Chapter 1 • Cyberspace, the Internet, and the World Wide Web The Beginning of the Internet and Cyberspace The Purpose of the Internet Vulnerabilities of the Internet What Distinguishes Cyberspace, the Internet, and the World Wide Web? Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 2 • What Is Cybersecurity? Origins and Nature of Cybersecurity Definitions Definition of Cybersecurity Cybersecurity Policies Overview of Cyberspace Intrusions Securing Your Wi-Fi in a Wireless World Summary Key Terms Discussion Questions Internet Resources Further Reading Appendix 2A Chapter 3 • Threat Factors—Computers as Targets The Evolution of Cybercrime Computers as a Target Viruses, Worms, and Trojan Horses Preventing Malware Intrusions Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime Cybercrimes Fraud and Financial Crimes Cyberbullying Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States Threats to Cybersecurity What Motivates Hackers? Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 6 • National Security: Cyberwarfare and Cyberespionage Cyberwarfare Nation-State Threats by Region Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 7 • Cyberterrorism Cyberterrorism Defined The Role of the Media Evolution of the Threat Technology Use by Extremists Targets of Cyberterrorism Risk Management Damage Potential Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 8 • An Evolving Threat: The Deep Web The Surface Web The Deep Web and Darknets Accessibility Products Available Payment: Cryptocurrency Law Enforcement Response Operation Onymous Anonymous and “Vigilante Justice” Terrorist Presence on the Deep and Dark Web Legal Issues Summary Key Terms Discussion Questions Internet Resources Court Cases Chapter 9 • Cybersecurity Operations Theoretical Operations Learning Theory Differential Association Theory Subculture Theory DEF CON Convention Law Enforcement Operations Target Hardening Honeypots, Nets, and Tokens Summary Key Terms Discussion Questions Internet Resources Further Reading Chapter 10 • Cybersecurity Policies and Legal Issues National Cybersecurity Policies International Cybersecurity Policies Legal Issues Issues With Enforcement/Jurisdiction Summary Key Term Discussion Questions Internet Resources Further Reading Chapter 11 • What the Future Holds Data Is the New Oil Emerging Threats Vulnerable Targets Potential/Emerging Perpetrators Summary Key Terms Discussion Questions Internet Resources Further Reading Appendix: Cybersecurity-Related Organizations Glossary Notes Index About the Authors

Reviews

Author Information

Janine Kremling, Ph.D., has been a professor at California State University, San Bernardino, since 2008. She received Ph.D. in criminology from the University of South Florida. Dr. Kremling teaches a wide variety of classes. She has also published five books, including Cyberspace, Cybersecurity, and Cybercrime; Homeland Security; Drugs, Crime, and Justice; and Estimating Drug Use. Dr. Kremling has been studying issues pertaining to policing, especially criminal procedure and how it impacts policing. In addition, she has also extensively studied drug use and abuse and police responses. Amanda Parker is an Assistant Professor of Homeland Security and Coordinator of the Homeland Security program at Campbell University in Buies Creek, North Carolina. She obtained her Ph.D. in Criminology from the University of South Florida. Dr. Parker has been studying cyberthreats and transnational terrorism threats since 2005. She has presented nationally and internationally (England, Spain, Poland, Northern Ireland, and Wales) on many aspects of cybercrime and cybersecurity, including cyberterrorism. She resides in Dunn, North Carolina with her daughter Tatiana (8) and her son Jax (6).  

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List