Abstract
Over the last two decades, businesses, consumers, and governments around the globe have moved into cyberspace and cloud environment in order to conduct their businesses. Many people spend a significant part of their daily life in cyberspace, creating and enjoying new types of social relationships which were not possible or financially affordable 20 years ago. However, criminals have identified rewards from online frauds therefore, the risks and threats have increased too.Securing the cyber space will be an enabler and will result in better use of the digital environment. Therefore, securing it requires a joint effort by all stakeholders which includes the law enforcement agencies, governments, the technology industries, and the individuals in the society.
Original language | English |
---|---|
Title of host publication | Cyber Crime and Cyber Terrorism Investigator's Handbook |
Publisher | Elsevier Inc. |
Pages | 149-164 |
Number of pages | 16 |
ISBN (Print) | 9780128008119 |
DOIs | |
Publication status | E-pub ahead of print - 25 Jul 2014 |
Publication series
Name | Cyber Crime and Cyber Terrorism Investigator's Handbook |
---|
Keywords
- Classifications
- Criminology
- Cyber-harassment
- Cybercrime
- Identity theft
- Internet auction fraud
- Phishing
- Profiling
Fingerprint Dive into the research topics of 'Cybercrime classification and characteristics'. Together they form a unique fingerprint.
Profiles
-
Amin Hosseinian Far
- University of Northampton, Business Systems & Operations - Senior Lecturer in Business Systems & Operations
- Centre for Sustainable Business Practices
Person: Academic