Cybercrime legislation, cases and commentary

Gregor URBAS

Research output: Book/ReportBook

Abstract

This book also provides a detailed explication of the Council of Europe's Convention on Cybercrime, the leading international instrument available today for the control of cybercrime. The content is structured around four groupings of topics. First, following an exploration of how cybercrime is defined, come the topics of unauthorised access, modification and impairment. This trio includes 'hacking', 'hacktivism' and 'cyberterrorism' and introduces terminology such as 'malware', 'botnets' and 'DDoS attacks'. Second, the discussion turns to financially motivated crimes, such as online fraud and forgery, identity crimes and criminal copyright infringement. The use of 'spam' is discussed in this context. The third grouping includes those kinds of cybercrime that most directly affect vulnerable individuals, including child pornography and child grooming, as well as cyberstalking and other forms of online harassment. This discussion includes recently emerging topics such as 'sexting' and 'revenge porn'. Finally, aspects of investigation, prosecution and sentencing of cybercrime offenders are discussed, including the role played by intermediaries, such as Internet service providers (ISPs), in data retention and providing assistance to law enforcement. This book is an essential resource for practitioners and students. Features Tables have been used to summarise the main features of legislative provisions. Case extracts have been selected to illustrate the legal issues that arise, and to provide examples of how cybercrime laws operate in practice. Each chapter ends with Questions for consideration) that may be useful in tutorial or online discussions Related Titles Finlay ? Kirchengast, Criminal Law in Australia, 2014 George et al, Social Media and the Law, 2014.
Original languageEnglish
Place of PublicationChatswood, N.S.W
PublisherLexisNexis Butterworths
Number of pages332
ISBN (Print)9780409341683
Publication statusPublished - 2015

Fingerprint

grouping
legislation
offense
Council of Europe
pornography
Law
retaliation
criminal law
fraud
prosecution
social media
law enforcement
technical language
service provider
offender
assistance
Internet
resources
student

Cite this

URBAS, G. (2015). Cybercrime legislation, cases and commentary. Chatswood, N.S.W: LexisNexis Butterworths.
URBAS, Gregor. / Cybercrime legislation, cases and commentary. Chatswood, N.S.W : LexisNexis Butterworths, 2015. 332 p.
@book{7e7841e696b14788b02d407a85ecf5c6,
title = "Cybercrime legislation, cases and commentary",
abstract = "This book also provides a detailed explication of the Council of Europe's Convention on Cybercrime, the leading international instrument available today for the control of cybercrime. The content is structured around four groupings of topics. First, following an exploration of how cybercrime is defined, come the topics of unauthorised access, modification and impairment. This trio includes 'hacking', 'hacktivism' and 'cyberterrorism' and introduces terminology such as 'malware', 'botnets' and 'DDoS attacks'. Second, the discussion turns to financially motivated crimes, such as online fraud and forgery, identity crimes and criminal copyright infringement. The use of 'spam' is discussed in this context. The third grouping includes those kinds of cybercrime that most directly affect vulnerable individuals, including child pornography and child grooming, as well as cyberstalking and other forms of online harassment. This discussion includes recently emerging topics such as 'sexting' and 'revenge porn'. Finally, aspects of investigation, prosecution and sentencing of cybercrime offenders are discussed, including the role played by intermediaries, such as Internet service providers (ISPs), in data retention and providing assistance to law enforcement. This book is an essential resource for practitioners and students. Features Tables have been used to summarise the main features of legislative provisions. Case extracts have been selected to illustrate the legal issues that arise, and to provide examples of how cybercrime laws operate in practice. Each chapter ends with Questions for consideration) that may be useful in tutorial or online discussions Related Titles Finlay ? Kirchengast, Criminal Law in Australia, 2014 George et al, Social Media and the Law, 2014.",
author = "Gregor URBAS",
year = "2015",
language = "English",
isbn = "9780409341683",
publisher = "LexisNexis Butterworths",

}

URBAS, G 2015, Cybercrime legislation, cases and commentary. LexisNexis Butterworths, Chatswood, N.S.W.

Cybercrime legislation, cases and commentary. / URBAS, Gregor.

Chatswood, N.S.W : LexisNexis Butterworths, 2015. 332 p.

Research output: Book/ReportBook

TY - BOOK

T1 - Cybercrime legislation, cases and commentary

AU - URBAS, Gregor

PY - 2015

Y1 - 2015

N2 - This book also provides a detailed explication of the Council of Europe's Convention on Cybercrime, the leading international instrument available today for the control of cybercrime. The content is structured around four groupings of topics. First, following an exploration of how cybercrime is defined, come the topics of unauthorised access, modification and impairment. This trio includes 'hacking', 'hacktivism' and 'cyberterrorism' and introduces terminology such as 'malware', 'botnets' and 'DDoS attacks'. Second, the discussion turns to financially motivated crimes, such as online fraud and forgery, identity crimes and criminal copyright infringement. The use of 'spam' is discussed in this context. The third grouping includes those kinds of cybercrime that most directly affect vulnerable individuals, including child pornography and child grooming, as well as cyberstalking and other forms of online harassment. This discussion includes recently emerging topics such as 'sexting' and 'revenge porn'. Finally, aspects of investigation, prosecution and sentencing of cybercrime offenders are discussed, including the role played by intermediaries, such as Internet service providers (ISPs), in data retention and providing assistance to law enforcement. This book is an essential resource for practitioners and students. Features Tables have been used to summarise the main features of legislative provisions. Case extracts have been selected to illustrate the legal issues that arise, and to provide examples of how cybercrime laws operate in practice. Each chapter ends with Questions for consideration) that may be useful in tutorial or online discussions Related Titles Finlay ? Kirchengast, Criminal Law in Australia, 2014 George et al, Social Media and the Law, 2014.

AB - This book also provides a detailed explication of the Council of Europe's Convention on Cybercrime, the leading international instrument available today for the control of cybercrime. The content is structured around four groupings of topics. First, following an exploration of how cybercrime is defined, come the topics of unauthorised access, modification and impairment. This trio includes 'hacking', 'hacktivism' and 'cyberterrorism' and introduces terminology such as 'malware', 'botnets' and 'DDoS attacks'. Second, the discussion turns to financially motivated crimes, such as online fraud and forgery, identity crimes and criminal copyright infringement. The use of 'spam' is discussed in this context. The third grouping includes those kinds of cybercrime that most directly affect vulnerable individuals, including child pornography and child grooming, as well as cyberstalking and other forms of online harassment. This discussion includes recently emerging topics such as 'sexting' and 'revenge porn'. Finally, aspects of investigation, prosecution and sentencing of cybercrime offenders are discussed, including the role played by intermediaries, such as Internet service providers (ISPs), in data retention and providing assistance to law enforcement. This book is an essential resource for practitioners and students. Features Tables have been used to summarise the main features of legislative provisions. Case extracts have been selected to illustrate the legal issues that arise, and to provide examples of how cybercrime laws operate in practice. Each chapter ends with Questions for consideration) that may be useful in tutorial or online discussions Related Titles Finlay ? Kirchengast, Criminal Law in Australia, 2014 George et al, Social Media and the Law, 2014.

M3 - Book

SN - 9780409341683

BT - Cybercrime legislation, cases and commentary

PB - LexisNexis Butterworths

CY - Chatswood, N.S.W

ER -

URBAS G. Cybercrime legislation, cases and commentary. Chatswood, N.S.W: LexisNexis Butterworths, 2015. 332 p.