International Journal of Cyber Criminology

Articles from Vol. 7, No. 1, January-June

Book Review of WikiLeaks: News in the Networked Era
WikiLeaks: News in the Networked Era. Charlie Beckett with James Ball, (February 13, 2012). Cambridge, UK. Polity Press. 198 pages. ISBN-13 978-0-7456-5975-6 (pbk)."The press was protected so that it could bare the secrets of government and inform the...
Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector
IntroductionCyber crime is emerging as a challenge for national and economic security. Many industries, institutions and public and private sector organizations (particularly those within the critical infrastructure) are at significant risk. Comparatively...
Cyber Crime in Singapore: An Analysis of Regulation Based on Lessig's Four Modalities of Constraint1
IntroductionThe usage of the Internet has proliferated and affected the lives of many people (Keyser, 2003), especially so in Singapore, which boasts a high Internet penetration rate, with 160.2% of its population having broadband access (Infocomm Development...
Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No (30) of 2010
IntroductionCyber-crimes represent a real challenge to all criminal justice systems all over the world including Jordan. In Jordan, there is a real rise in the number of cyber-crimes; the record of the Jordanian Statistics of Public Security shows more...
High Volume Cyber Crime and the Organization of the Police: The Results of Two Empirical Studies in the Netherlands
IntroductionTo be able to function in a good and orderly way, society needs some degree of order and continuity, and therefore safety. Safety and security has long been merely a question of protection against dangers from the physical world. Late last...
Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads between Countries
IntroductionCopyright protects the expression of ideas by conferring certain exclusive rights on the creator for a period of time. Copyright is infringed and piracy occurs when a person exercises one of those exclusive rights without the copyright holder's...
The Effect of De-Individuation of the Internet Troller on Criminal Procedure Implementation: An Interview with a Hater
IntroductionInternet trolling is proving a problem for many people and organisations that make up networked societies. The term itself is proving controversial, as 'trolling' once reflected the posting of provocative messages, whereas it has now been...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.