From Book News, Inc.
Reviews some of the major crimes of acquisition involving digital technology as the instrument of theft, and crimes involving information as the object of theft. The Australian authors identify the vulnerability of electronic payment systems, extortion threats to damage information systems, misappropriation of telephone and internet services, misconduct in securities markets, and deceptive advertising practices. The last part discusses some forms of misappropriation whose legal status is contested or evolving, such as commercial acquisition of personal information and activities related to digital piracy.Copyright © 2004 Book News, Inc., Portland, OR
Book Description
The fundamental principle of criminology is that crime follows opportunity, and opportunities for theft abound in the digital age. This study names, describes and analyzes the range of electronic and digital theft, and constitutes the first major survey of the field. The authors cover a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorized use of personal information. The book poses and attempts to answer some pressing questions concerning national sovereignty and enforceability of laws.
Electronic Theft: Unlawful Acquisition in Cyberspace FROM THE PUBLISHER
"The convergence of communications and computing has begun to transform Western industrial societies. Increasing connectivity is accompanied by unprecedented opportunities for crimes of acquisition. Electronic Theft names, describes and analyses the range of electronic and digital theft, and constitutes the first major survey of the field." The authors cover a broad list of electronic misdemeanours, including extortion, defrauding governments, telephone fraud, securities fraud, deceptive advertising and other business practices, industrial espionage, intellectual property crimes, and the misappropriation and unauthorised use of personal information. They have been able to capture impressively large amounts of data internationally from both scholarly and professional sources. The book poses and attempts to answer some pressing questions to do with natural sovereignty, intellectual property and enforceability of laws.
SYNOPSIS
Reviews some of the major crimes of acquisition involving digital technology as the instrument of theft, and crimes involving information as the object of theft. The Australian authors identify the vulnerability of electronic payment systems, extortion threats to damage information systems, misappropriation of telephone and internet services, misconduct in securities markets, and deceptive advertising practices. The last part discusses some forms of misappropriation whose legal status is contested or evolving, such as commercial acquisition of personal information and activities related to digital piracy.
Annotation c. Book News, Inc., Portland, OR (booknews.com)