Abstract
Advancements in modern technology have helped countries to develop and expand their communication networks, enabling faster and easier networking and information exchange. In less than two decades, the internet has grown from a curiosity to an essential element of modern life for millions. In addition to the socio-economic benefits, there is no doubt about computer technology and the internet that enhances the capabilities of human interaction. But somewhere the growth of global connectivity is inherent to cybercrime. TableĀ 1.1 illustrates some interesting facts about the usage of ICT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See NCTP http://www.nctp.org.
- 2.
Ibid.
- 3.
Ibid.
References
W. Blackstone, Commentaries on the Laws of England (University of Chicago Press, Chicago, 1979)
E. Casey, Digital Evidence and Computer Crime (Elsevier Academic Press, California, 2004)
R. Crutchfield, Crime: Readings (Pine Forge Press, California, 2000)
M. ElāGuindy, Cybercrime in the Middle East. ISSA J. 17 (June, 2008)
J. Fantino, Child pornography on the internet: new challenges require new ideas. Police Chief Mag. (2009), http://policechiefmagazine.org. Accessed 23 July 2011
D. Goodman, S. Brenner, The emerging consensus on criminal conduct in cyberspace. Int. J. Law Inf. Technol. 10(2), 3 (2002)
P. Hitchens, A Brief History of Crime (Atlantic Publishing, London, 2003)
D. Parker, Fighting Computer Crime: For Protecting Information (Wiley, New York, 1998)
D. Shinder, Scene of the Cybercrime (Walthman, Syngress, New York, 2002)
D. Shinder, Profiling & categorizing cybercriminals (2010), http://www.techrepublic.com. Accessed 10 July 2011
R. Smith, P. Grabosky, G. Urbas, Cyber Criminals on Trial (Cambridge University Press, Cambridge, 2004)
S. Smyth, Mind the gap: a new model for internet child pornography regulation in Canada (2007), http://www.sfu.ca. Accessed 11 July 2011
P. Sommer, in Evidence in internet pedophilia cases. NCS/ACPO Conference, July 2002, Bournemouth, http://www.pmsommer.com. Accessed 01 July 2011
Symantec, Symantec internet security threat report (2010), http://www.symantec.com. Accessed 8 July 2011
UNESCO, Les Dimensions Internationales du Droit du Cyberespace (Economica, Paris, 2000)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
Ā© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Cybercrime: Introduction, Motivation and Methods. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-15150-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15149-6
Online ISBN: 978-3-319-15150-2
eBook Packages: EngineeringEngineering (R0)