{"title":"网络犯罪书评-威胁的现实","authors":"Nicholas Chantler","doi":"10.5281/ZENODO.18798","DOIUrl":null,"url":null,"abstract":"If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text. This self-published book is very much a book for the operational practitioner. An easy to read text that provides a broad overview relating to Federal Agent Nigel Phair’s experience whilst working at the Australian High Tech Crime Centre in Canberra and as a member of the Australian Federal Police. Some comments may seem to appear rather glib, along with several assumptions, but don't be put off; the book has merit and Phair provides a good insight for the newcomer wishing to learn about the domain of cyber crime. The introduction, I presume in an effort to allay our fears, states \"The Internet is not of the Wild West, as was once portrayed in American Western movies. It is just another public place and Internet users need to use real-world sensibilities when operating in the online environment.\" Phew, thank goodness for that! But his statement is quickly followed by a darker one of impending doom; \"the communities trusting e-commerce activities, will slowly erode over time as personal users either become victims of online crime or know someone who has.\" He then briefly mentions ‘the profile of cyber crime criminals’ and how the hacking the counterculture has completely changed into wellorganized and hierarchical groups of criminal syndicates that have realized there is substantial money to be made by criminal activity online. A geographical overview of the cyber crime elements are presented as the only real risk from Eastern Europe, Asia and West Africa. This is just too brief. His Eastern European perspective focuses only on the Russian Mafia and one incident involving a Romanian National. Asia, primarily relates to issues in China, although Singapore and Korea do get a mention. West Africa, primarily focuses on Nigeria and Kenya; with the Nigerian activity relating to the infamous \"Nigerian letters.\" The rest of the book addresses the cyber crime activities under the broad headings of: o Unwanted Software; o Identity Crime; o Phishing;","PeriodicalId":46103,"journal":{"name":"International Journal of Cyber Criminology","volume":"1 1","pages":"249-251"},"PeriodicalIF":0.7000,"publicationDate":"2007-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Book Review of Cybercrime – The Reality of the Threat\",\"authors\":\"Nicholas Chantler\",\"doi\":\"10.5281/ZENODO.18798\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text. This self-published book is very much a book for the operational practitioner. An easy to read text that provides a broad overview relating to Federal Agent Nigel Phair’s experience whilst working at the Australian High Tech Crime Centre in Canberra and as a member of the Australian Federal Police. Some comments may seem to appear rather glib, along with several assumptions, but don't be put off; the book has merit and Phair provides a good insight for the newcomer wishing to learn about the domain of cyber crime. The introduction, I presume in an effort to allay our fears, states \\\"The Internet is not of the Wild West, as was once portrayed in American Western movies. It is just another public place and Internet users need to use real-world sensibilities when operating in the online environment.\\\" Phew, thank goodness for that! But his statement is quickly followed by a darker one of impending doom; \\\"the communities trusting e-commerce activities, will slowly erode over time as personal users either become victims of online crime or know someone who has.\\\" He then briefly mentions ‘the profile of cyber crime criminals’ and how the hacking the counterculture has completely changed into wellorganized and hierarchical groups of criminal syndicates that have realized there is substantial money to be made by criminal activity online. A geographical overview of the cyber crime elements are presented as the only real risk from Eastern Europe, Asia and West Africa. This is just too brief. His Eastern European perspective focuses only on the Russian Mafia and one incident involving a Romanian National. Asia, primarily relates to issues in China, although Singapore and Korea do get a mention. West Africa, primarily focuses on Nigeria and Kenya; with the Nigerian activity relating to the infamous \\\"Nigerian letters.\\\" The rest of the book addresses the cyber crime activities under the broad headings of: o Unwanted Software; o Identity Crime; o Phishing;\",\"PeriodicalId\":46103,\"journal\":{\"name\":\"International Journal of Cyber Criminology\",\"volume\":\"1 1\",\"pages\":\"249-251\"},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2007-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Cyber Criminology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5281/ZENODO.18798\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"CRIMINOLOGY & PENOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Cyber Criminology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5281/ZENODO.18798","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
Book Review of Cybercrime – The Reality of the Threat
If you're looking for introductory text on what cyber crime is, then this is the one! But don't expect and in-depth academic text. This self-published book is very much a book for the operational practitioner. An easy to read text that provides a broad overview relating to Federal Agent Nigel Phair’s experience whilst working at the Australian High Tech Crime Centre in Canberra and as a member of the Australian Federal Police. Some comments may seem to appear rather glib, along with several assumptions, but don't be put off; the book has merit and Phair provides a good insight for the newcomer wishing to learn about the domain of cyber crime. The introduction, I presume in an effort to allay our fears, states "The Internet is not of the Wild West, as was once portrayed in American Western movies. It is just another public place and Internet users need to use real-world sensibilities when operating in the online environment." Phew, thank goodness for that! But his statement is quickly followed by a darker one of impending doom; "the communities trusting e-commerce activities, will slowly erode over time as personal users either become victims of online crime or know someone who has." He then briefly mentions ‘the profile of cyber crime criminals’ and how the hacking the counterculture has completely changed into wellorganized and hierarchical groups of criminal syndicates that have realized there is substantial money to be made by criminal activity online. A geographical overview of the cyber crime elements are presented as the only real risk from Eastern Europe, Asia and West Africa. This is just too brief. His Eastern European perspective focuses only on the Russian Mafia and one incident involving a Romanian National. Asia, primarily relates to issues in China, although Singapore and Korea do get a mention. West Africa, primarily focuses on Nigeria and Kenya; with the Nigerian activity relating to the infamous "Nigerian letters." The rest of the book addresses the cyber crime activities under the broad headings of: o Unwanted Software; o Identity Crime; o Phishing;
期刊介绍:
International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy. IJCC is an unique Diamond open access, not for profit international journal, where the author(s) need not pay article processing charges / page charges and it is totally free for both the authors and the audience. IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, Developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety, Human Factor of Cyber Crime and Cyber Security and Policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes primarily from a social science perspective to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.