The Human Factor of Cybercrime
| dc.contributor.editor | Leukfeldt, Rutger | |
| dc.contributor.editor | Holt, Thomas J. | |
| dc.date.accessioned | 2021-02-10T12:58:18Z | |
| dc.date.issued | 2019 | |
| dc.date.submitted | 2019-12-09 13:48:21 | |
| dc.date.submitted | 2020-04-01T09:23:25Z | |
| dc.identifier | 1006531 | |
| dc.identifier | OCN: 1135846432 | |
| dc.identifier | http://library.oapen.org/handle/20.500.12657/23615 | |
| dc.identifier.uri | https://directory.doabooks.org/handle/20.500.12854/26516 | |
| dc.description.abstract | Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. | |
| dc.language | English | |
| dc.rights | open access | |
| dc.subject.classification | thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology | en_US |
| dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects | en_US |
| dc.subject.classification | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYZ Human–computer interaction | en_US |
| dc.subject.other | cybercrime | |
| dc.subject.other | human factor | |
| dc.subject.other | thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV Crime and criminology | |
| dc.subject.other | thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects | |
| dc.subject.other | thema EDItEUR::U Computing and Information Technology::UY Computer science::UYZ Human–computer interaction | |
| dc.title | The Human Factor of Cybercrime | |
| dc.type | book | |
| oapen.relation.isPublishedBy | fa69b019-f4ee-4979-8d42-c6b6c476b5f0 | |
| oapen.relation.hasChapter | Chapter 13 The Roles of ‘Old’ and ‘New’ Media Tools and Technologies in the Facilitation of Violent Extremism and Terrorism | |
| oapen.relation.isbn | 9780429460593 | |
| oapen.imprint | Routledge | |
| oapen.pages | 432 | |
| oapen.review.comments | Taylor & Francis open access titles are reviewed as a minimum at proposal stage by at least two external peer reviewers and an internal editor (additional reviews may be sought and additional content reviewed as required). | |
| peerreview.review.type | Proposal | |
| peerreview.anonymity | Single-anonymised | |
| peerreview.reviewer.type | Internal editor | |
| peerreview.reviewer.type | External peer reviewer | |
| peerreview.review.stage | Pre-publication | |
| peerreview.open.review | No | |
| peerreview.publish.responsibility | Publisher | |
| peerreview.id | bc80075c-96cc-4740-a9f3-a234bc2598f1 | |
| peerreview.title | Proposal review |
Fichier(s) constituant ce document
| Fichiers | Taille | Format | Vue |
|---|---|---|---|
|
Il n'y a pas de fichiers associés à ce document. |
|||
Ce document figure dans la(les) collection(s) suivante(s)
Chapters in this book
-
(2019)This chapter describes and discusses the roles of media tools and technologies in the facilitation of violent extremism and terrorism. Rather than focusing on how media report on terrorism, we investigate how extremist and ...


