Investigating digital crime

@inproceedings{Bryant2008InvestigatingDC,
  title={Investigating digital crime},
  author={Robin Bryant},
  year={2008}
}
Preface. List of Contributors (Robin Bryant). 1. The Challenge of Digital Crime (Robin Bryant). 2. The Legislative Context for Digital Crime (Tracey Stevens). 3. Investigating Digital Crime (Ian Kennedy). 4. Countering Cybercrime (Denis Edgar-Nevill and Paul Stephens). 5. Encryption (Dave O'Reilly and Paul Stephens). 6. IPR and Technological Protection Measures (Paul Stephens). 7. Plastic Card Crime (Robin Bryant and Paul Stephens). 8. Telecommunications Fraud (Joe Carthy, Tahar Kechadi and… 

Figures and Tables from this paper

Criminal Proceedings in Cyberspace: The Challenge of Digital Era
The author explains non-applicability of traditional criminal law and procedure in cyberspace. She advocates the introduction of biometric identification security systems, online reporting centres,
’Tis the season to (be jolly?) wise-up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas:1 a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud
This article critically examines the UK's legislative measures to tackle online fraud in light of the recommendations of the Fraud Review and the enactment of the UK Fraud Act (2006). In particular,
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
TLDR
This paper collects the researches of investigation procedure of cybercrime in the recent years, and compares these investigation procedures via the traditional investigative procedures compatibility, cybercrime behavior analysis, evidence forensic procedures, case analysis and verification, the methods of evidence collection and analysis, and the area of judicial jurisdiction.
Presence and the Victims of Crime in Online Virtual Worlds
Several crimes are reported to have occurred in online virtual worlds. If the victim of these offences experiences a strong sense of presence within the virtual world, it is possible that they may
E-safety education: Young people, surveillance and responsibility
This article presents the findings of an analysis of ‘e-safety’ education material currently made available to UK schools, and currently being delivered to children and young people between the ages
Digital Forensic Issues in Civil Proceedings
TLDR
The environment of civil cases does not have the structure of the law enforcement processes to serve as a framework from which to conduct digital forensic examinations, and there is often a lack of understanding of digital forensic capabilities and evidence.
Placing the suspect at a PC: A preliminary study involving fingerprints on keyboards and mice.
...
...

References

SHOWING 1-10 OF 34 REFERENCES
Why phishing works
TLDR
This paper provides the first empirical evidence about which malicious strategies are successful at deceiving general users by analyzing a large set of captured phishing attacks and developing a set of hypotheses about why these strategies might work.
Electronic monitoring in the workplace: if people don’t care, then what is the relevance?
TLDR
The paper will lead to a discussion of the reasons why individuals often do not seem to mind surveillance despite good evidence that it may be psychologically, morally, socially, and even economically harmful.
Is forensic computing a profession? Revisiting an old debate in a new field.
TLDR
This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline by asking whether there is merit in promoting the debate on the status of forensic computing as a profession above and beyond the arguments already rehearsed for computing in general.
Computer Forensics : Training and Education
This paper is an outgrowth of Erbacher’s panel presentation at the 2002 Computer Forensic Workshop held in Moscow, ID. The concept behind this paper is to provide a discussion of the needs within the
Cybercrime Investigation -Developing an International Training Programme for the Future
  • 2005
Cybercrime Investigation – Developing an International Training Programme for the Future. Bedford: NSLEC Centre for National High-Tech Crime Training
  • 2005
Love in the time of phone porn
  • 2007
...
...