ipl-logo

Cyber Crime: Annotated Bibliography

548 Words3 Pages

ANNOTATED BIBLIOGRAPHY

Akhgar, B., Staniforth, A., & Bosco, F. (2014). Cyber crime and cyber terrorism investigator's handbook. Waltham, MA: Syngress.
This source offers insight into Cybercrime for those who are charged with protecting their Information Systems (IS) from being compromised by cybercriminals. The book consists of 18 chapters, and provides definitions for key terms in Cybercrime, discusses the tactics, techniques and procedures used by law enforcement agencies to combat cybercrime, offers step by step instruction on conducting forensics on the electronic evidence left behind by cybercriminals. In addition, it provided case studies to give the reader real-life examples and references to the different categories of cybercrime. …show more content…

It consists of 12 chapters that are broken up into four phases. Each phase deals with a theme in cybercriminality such as how to fight and respond to cybercrimes. It provides information on the impacts that cybercrime can have socially, economically, politically and militarily on a society. This is relevant to my source because it provides a broad overview about the different aspects of cybercrime, and it covers the who, what, when, where and why questions that I pondered prior to beginning my research …show more content…

It discusses the expertise levels from the most basic knowledge to the advanced knowledge. It explained that depending on the experience level of the hacker there are many reasons why they do what they do. The reasons being money, notoriety (popularity), destruction, moral agenda, and or at the command by a foreign government. It explained that there is psychologic aspect to cybercrime, and how some hackers use psychological tools to select their victims. This is relevant to my research because it allows me to view cybercrime from the mind of a cybercriminal.

Yar, M. (2006). Cybercrime and Society. London: SAGE Publications. Retrieved from http://ebookcentral.proquest.com.ezproxy1.apus.edu/lib/apus/detail.action?docID=420960
This book details the roles that Internet has had on cybercrime. It describes how technological advances have opened the cyberworld to criminals, and the vulnerabilities that cybercriminals take advantage of in their mission. It discussed the arguments concerning cybercrime and cyberfreedom, and how oftentimes to prevent cybercrime, there are instances were people’s use of the cyberworld is limited and/or there are rules put in place to control what is put out in the public domain. I chose this source because it provides the history behind cybercrime, and the types to include, child pornography and hate speech, and how the police combats those

Open Document