cybercrime.edited.docx - POLICING CRIME 1 Policing Cybercrime and cyber terror(A book review Name Institution POLICING CRIME 2 Policing Cybercrime and

cybercrime.edited.docx - POLICING CRIME 1 Policing...

This preview shows page 1 - 4 out of 9 pages.

POLICING CRIME 1 Policing Cybercrime and cyber terror (A book review) Name Institution
POLICING CRIME 2 Policing Cybercrime and Cyber Terror (A book review) This book , Policing Cybercrime and Cyber Terror , is written by three authors: Thomas J.Holt, George W.Burruss, and Adam M.Bossler. Thomas J. Holt is a professor and Director in the school of criminal justice at Michigan state university. His research majorly focuses on computer crimes. Several journals have published his work, Deviant Behavior, Crime and Delinquency, Youth and Society, and Journal of Criminal Justice. He got his doctorate from the University of Missouri- St.Louis. He is a co-author of Cybercrime and Digital forensics(2015) and Theory and prevention of Technology-Enabled offenses (2016), both published by Routledge. George W. Burruss is a professor in the criminology department at the University of South Florida. His significant research focuses on cybercrime, criminal justice, and how the law enforcement agencies respond to cybercrimes. He has a doctorate from the University of Missouri St.Louis in criminology and criminal justice. He has also worked before in the office of the attorney general as a criminal fraud investigator. Adam M. Bossler is a professor of criminal justice and criminology, and he got his doctorate from the University of Missouri St.Loius. The major topics that he teaches are criminal behavior, Cybercrime, and policing. He is also a co-author of three books, which are Cybercrime and digital forensic, theory and prevention of Technology-Enabled offenses, and policing cybercrime and cyber terror. These three authors have vast experience in cybercrime and cyberterror, and they try to make readers understand what cybercrime and cyber terror is. Cybercrime is defined as using a computer to perform illegal duties such as; violating privacy, child pornography, stealing identities, and committing fraud. Most cybercrimes aim at governments, individuals, and corporations; even though the attacks are not directed to the
POLICING CRIME 3 physical body, they interfere with the virtual body, which has information that defines institutions and people on the internet. Occasionally, the majority of cyber-attacks are usually done by criminal organizations, with most of the incidences being unable to record an enterprise risk scale of several businesses that went through major setbacks. In the year 2017, there was a change in dynamics with the incidents of Notpetya and Wannacry. The attacks on these two had a great effect on organizations, which are in approximately 150 countries,this attacks led to most businesses being interrupted, and losses that were worth around USD 300 million were experienced, resulting in loss of customer data by several companies. Cyber terror is the act of using the internet to threaten a government or an individual for political or personal gains through intimidations.Cyber terrorists who are highly skilled in hacking can lead to huge

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture