Handbook of Transnational Crime and Justice 2014
DOI: 10.4135/9781452281995.n8
|View full text |Cite
|
Sign up to set email alerts
|

Transnational Cybercrime and Fraud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…A decade after Gibson's definition of cyberspace, Rheingold (1994: 5) offers a more vivid definition of the concept as: "the conceptual space where words, human relationships, data, wealth and power are manifested by people using CMC [computer-mediated communications] technology". The cyberspace creates certain difficulties for law enforcement and prosecution agencies (Smith, 2014). This is because "systems that people rely upon, from banks to air defense radars, are accessible from cyberspace and can be quickly taken over or knocked out without first defeating a country's traditional defenses" (Clarke and Knake, 2010: 31).…”
Section: Conceives Cyberspace Asmentioning
confidence: 99%
See 1 more Smart Citation
“…A decade after Gibson's definition of cyberspace, Rheingold (1994: 5) offers a more vivid definition of the concept as: "the conceptual space where words, human relationships, data, wealth and power are manifested by people using CMC [computer-mediated communications] technology". The cyberspace creates certain difficulties for law enforcement and prosecution agencies (Smith, 2014). This is because "systems that people rely upon, from banks to air defense radars, are accessible from cyberspace and can be quickly taken over or knocked out without first defeating a country's traditional defenses" (Clarke and Knake, 2010: 31).…”
Section: Conceives Cyberspace Asmentioning
confidence: 99%
“…Smugglers and traffickers use the internet to organize their network and activities in an effective, efficient and less risky manner (Nicola, 2014). With the digitalization of critical personal information, identity theft is now prevalent (Mitra, 2010), and criminals can use personal information obtained from data leaked publicly or extracted from online databases or from users via social engineering to carry out different kinds of illicit activities (Smith, 2014). Criminal organizations around the world use the internet to communicate and network and do not necessarily have to meet physically (Nicaso and Lemothe, 2005).…”
Section: Crime and Disorder In The Cyberspace: An Overviewmentioning
confidence: 99%
“…"Serious crime" is defined as "conduct constituting an offence punishable by a maximum deprivation of liberty of at least four years or a more serious penalty" [31]. The modern fraud environment is not only increasingly transnational, it is also more organized (Smith, 2014), and the resources and expertise associated with many transnational identity crimes is of a degree normally associated with organised criminal groups (Ozaki, 2007, p. 12).…”
Section: Un Convention Against Transnational Organized Crimementioning
confidence: 99%