You are here

Disable VAT on Taiwan

Unfortunately, as of 1 January 2020 SAGE Ltd is no longer able to support sales of electronically supplied services to Taiwan customers that are not Taiwan VAT registered. We apologise for any inconvenience. For more information or to place a print-only order, please contact uk.customerservices@sagepub.co.uk.

Cyberspace, Cybersecurity, and Cybercrime
Share
Share

Cyberspace, Cybersecurity, and Cybercrime



September 2017 | 296 pages | SAGE Publications, Inc

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

 

Instructors! Sign in at study.sagepub.com/kremling for PowerPoint slides, test banks, and more!


 

 
Preface
 
Acknowledgments
 
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace

 
The Purpose of the Internet

 
Vulnerabilities of the Internet

 
What Distinguishes Cyberspace, the Internet, and the World Wide Web?

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity

 
Definitions

 
Definition of Cybersecurity

 
Cybersecurity Policies

 
Overview of Cyberspace Intrusions

 
Securing Your Wi-Fi in a Wireless World

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
Appendix 2A

 
 
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime

 
Computers as a Target

 
Viruses, Worms, and Trojan Horses

 
Preventing Malware Intrusions

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes

 
Fraud and Financial Crimes

 
Cyberbullying

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity

 
What Motivates Hackers?

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare

 
Nation-State Threats by Region

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 7 • Cyberterrorism
Cyberterrorism Defined

 
The Role of the Media

 
Evolution of the Threat

 
Technology Use by Extremists

 
Targets of Cyberterrorism

 
Risk Management

 
Damage Potential

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web

 
The Deep Web and Darknets

 
Accessibility

 
Products Available

 
Payment: Cryptocurrency

 
Law Enforcement Response

 
Operation Onymous

 
Anonymous and “Vigilante Justice”

 
Terrorist Presence on the Deep and Dark Web

 
Legal Issues

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Court Cases

 
 
Chapter 9 • Cybersecurity Operations
Theoretical Operations

 
Learning Theory

 
Differential Association Theory

 
Subculture Theory

 
DEF CON Convention

 
Law Enforcement Operations

 
Target Hardening

 
Honeypots, Nets, and Tokens

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies

 
International Cybersecurity Policies

 
Legal Issues

 
Issues With Enforcement/Jurisdiction

 
Summary

 
Key Term

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 11 • What the Future Holds
Data Is the New Oil

 
Emerging Threats

 
Vulnerable Targets

 
Potential/Emerging Perpetrators

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Appendix: Cybersecurity-Related Organizations
 
Glossary
 
Notes
 
Index
 
About the Authors

Supplements

Instructor Resource Site

Password-protected Instructor Resources include the following:

  • A Microsoft® Word® test bank is available containing multiple choice, true/false, short answer and essay questions for each chapter. The test bank provides you with a diverse range of pre-written options as well as the opportunity for editing any question and/or inserting your own personalized questions to effectively assess students’ progress and understanding.
  • Editable, chapter-specific Microsoft® PowerPoint® slides offer you complete flexibility in easily creating a multimedia presentation for your course. Highlight essential content, features, and artwork from the book.
Student Study Site

The open-access Student Study Site includes the following:

  • Mobile-friendly eFlashcards reinforce understanding of key terms and concepts that have been outlined in the chapters.
  • Mobile-friendly web quizzes allow for independent assessment of progress made in learning course material.

Covers a breadth of topics to give students a foundation to other specific studies and courses later in our program.
This book as several typographical errors in both the print and the online materials, but is still a good resource. I look forward to the next edition where these might be resolved.

Adam Klemann
Science and Mathematics Dept, Malone University
September 11, 2020
Key features
KEY FEATURES:
  • Compelling case studies engage students with real-world examples of important concepts to increase comprehension and critical thinking skills.
  • Legal Issue boxes encourage exploration of the legal implications surrounding issues in cybersecurity and cybercrime, such as privacy and espionage.
  • Think About It critical-thinking exercises present scenarios that challenge students to apply the concepts they have learned and to consider what they would do in each situation.
  • Learning objectives, internet resources, discussion questions, and key term definitions support student learning by clearly identifying the goals of each chapter, testing student comprehension of the material, and providing opportunities for further learning. 

Sage College Publishing

You can purchase or sample this product on our Sage College Publishing site:

Go To College Site