{"title":"概念和术语","authors":"Tony Krone","doi":"10.4324/9781315063799-4","DOIUrl":null,"url":null,"abstract":"The rapidly expanding capabilities of information and communications technologies (ICT) have created new crimes and new ways to commit old crimes. Criminal threats include: computer intrusions, distributed denial of service attacks, malware (the insertion of malicious software code into a computer), stealing ICT services, online child pornography and the misuse of email. This brief examines some of the terminology and sets out a definitional framework for measuring and analysing high tech crime. Labels defined include computer crime, computer related crime, cybercrime and high tech crime. The brief notes the fundamental distinction between offences relating to ICT as the object of offending and those relating to ICT as a tool for offending, and considers implications for data collection and analysis.","PeriodicalId":128048,"journal":{"name":"Key Concepts in Literary Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Concepts and Terms\",\"authors\":\"Tony Krone\",\"doi\":\"10.4324/9781315063799-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapidly expanding capabilities of information and communications technologies (ICT) have created new crimes and new ways to commit old crimes. Criminal threats include: computer intrusions, distributed denial of service attacks, malware (the insertion of malicious software code into a computer), stealing ICT services, online child pornography and the misuse of email. This brief examines some of the terminology and sets out a definitional framework for measuring and analysing high tech crime. Labels defined include computer crime, computer related crime, cybercrime and high tech crime. The brief notes the fundamental distinction between offences relating to ICT as the object of offending and those relating to ICT as a tool for offending, and considers implications for data collection and analysis.\",\"PeriodicalId\":128048,\"journal\":{\"name\":\"Key Concepts in Literary Theory\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Key Concepts in Literary Theory\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4324/9781315063799-4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Key Concepts in Literary Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781315063799-4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The rapidly expanding capabilities of information and communications technologies (ICT) have created new crimes and new ways to commit old crimes. Criminal threats include: computer intrusions, distributed denial of service attacks, malware (the insertion of malicious software code into a computer), stealing ICT services, online child pornography and the misuse of email. This brief examines some of the terminology and sets out a definitional framework for measuring and analysing high tech crime. Labels defined include computer crime, computer related crime, cybercrime and high tech crime. The brief notes the fundamental distinction between offences relating to ICT as the object of offending and those relating to ICT as a tool for offending, and considers implications for data collection and analysis.