Electronic Theft


Book Description

When this book was first published in 2001, the convergence of communications and computing had begun to transform Western industrial societies. Increasing connectivity was accompanied by unprecedented opportunities for crimes of acquisition. The fundamental principle of criminology is that crime follows opportunity, and opportunities for theft abound in the digital age. Electronic Theft named, described and analysed the range of electronic and digital theft, and constituted the first major survey of the field. The authors covered a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorised use of personal information. They were able to capture impressively large amounts of data internationally from both scholarly and professional sources. The book posed and attempted to answer some of the pressing questions to do with national sovereignty and enforceability of laws in 2001.




Phishing and Countermeasures


Book Description

Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.







Life After Theft


Book Description

Aprilynne Pike, #1 New York Times bestselling author of the Wings series, shines in this stand-alone novel that offers a humorous twist on ghosts and is perfect for fans of Ally Carter, Rachel Hawkins, and Kiersten White. Kimberlee Schaffer may be drop-dead gorgeous . . . but she also dropped dead last year. Now she needs Jeff's help with her unfinished business, and she's not taking no for an answer. When she was alive, Kimberlee wasn't just a mean girl; she was also a complete kleptomaniac. So if Jeff wants to avoid being haunted until graduation, he'll have to help her return all of the stolen items. But Jeff soon discovers that it's much easier to steal something than it is to bring it back. Paying for your mistakes takes on a whole new meaning in this hauntingly clever twist on The Scarlet Pimpernel.




Theft Is Property!


Book Description

Drawing on Indigenous peoples' struggles against settler colonialism, Theft Is Property! reconstructs the concept of dispossession as a means of explaining how shifting configurations of law, property, race, and rights have functioned as modes of governance, both historically and in the present. Through close analysis of arguments by Indigenous scholars and activists from the nineteenth century to the present, Robert Nichols argues that dispossession has come to name a unique recursive process whereby systematic theft is the mechanism by which property relations are generated. In so doing, Nichols also brings long-standing debates in anarchist, Black radical, feminist, Marxist, and postcolonial thought into direct conversation with the frequently overlooked intellectual contributions of Indigenous peoples.




Online Identity Theft


Book Description

This book defines identity theft, studies how it is perpetrated, outlines what is being done to combat it, and recommends specific ways to address it in a global manner.




Cyber Criminals on Trial


Book Description

As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.




Wage Theft in America


Book Description

In what has been described as ''the crime wave no one talks about,'' billions of dollars worth of wages are stolen from millions of workers in the United States every year - a grand theft that exceeds every other larceny category on record annually. Between two and three million workers are paid less than the legal minimum wage. More than three million are misclassified by their employers as independent contractors when they are really employees, allowing employers to shirk their share of payroll taxes and illegally deny workers overtime pay. Even the Economic Policy Foundation, a business-funded think tank, estimated that companies annually steal $19 billion in unpaid overtime. Nationally recognized labor activist Kim Bobo's Wage Theft in America is an incisive handbook for activists, organizers, workers, and concerned citizens on how to prevent the flagrant exploitation of America's working people. Bobo offers a sweeping analysis of the crisis, citing hard-hitting statistics and heartbreaking first-person accounts of exploitation at the hands of employers. She then offers concrete solutions, with special attention to what a new presidential administration can do to address one of the gravest issues facing workers in the twenty-first century.




Identity Theft Handbook


Book Description

Not a week goes by when identity theft isn t mentioned in the media or that a Congressional outcry isn t heard about this unrelenting crime. The first authoritative book on identity theft, Identity Theft Handbook is written by a career professional who has spent over 25 years investigating and preventing identity theft in both the public and private sectors. Its rich real-world content includes interviews with government and private sector thought leaders. As well, the costs of identity theft, future trends, and prevention guidance is discussed. For investigators, auditors, and managers.




Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse


Book Description

"The Cyber Attack Survival Manual is the rare security awareness book that is both highly informative and interesting. And this is one of the finest security awareness books of the last few years." – Ben Rothke, Tapad Engineering Let two accomplished cyber security experts, Nick Selby and Heather Vescent, guide you through the dangers, traps and pitfalls of online life. Learn how cyber criminals operate and how you can defend yourself and your family from online security threats. From Facebook, to Twitter, to online banking we are all increasingly exposed online with thousands of criminals ready to bounce on the slightest weakness. This indispensable guide will teach you how to protect your identity and your most private financial and personal information.