Internet anonymity practices in computer crime

Author:

Armstrong H.L.,Forde P.J.

Abstract

Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet’s global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined.

Publisher

Emerald

Subject

Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems

Reference21 articles.

1. Boni, W. and Kovacich, G.L. (2000), Netspionage: The Global Threat to Information, Butterworth Heinemann, Boston, MA.

2. Casey, E. (2000), Digital Evidence and Computer Crime, Academic Press, New York, NY.

3. COE (2001), Convention on Cybercrime, Council of Europe, European Treaty Series, No. 185, 23 November, available at: http://conventions.coe.int/Treaty/EN/CadreListeTraites.htm (accessed 14 December 2001).

4. CCP (2001), Conclusions of the Study on Effective Measures to Prevent and Vontrol High‐technology and Computer‐related Crime, Report of the Secretary‐General, Commission on Crime Prevention and Criminal Justice, United Nations Economic and Social Council, 30 March, available at: www.odccp.org/adhoc/crime/10_ commission/4e.pdt (accessed 14 December 2001).

5. Chantler, A.N. (1995), “Risk: the profile of a computer hacker”, PhD thesis, Curtin University, Perth.

Cited by 34 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Digital Violence Against Women: Is There a Real Need for Special Criminalization?;International Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique;2024-07-24

2. Empirical Evidence of Fake News Awareness Levels Among Students;IFIP Advances in Information and Communication Technology;2024

3. Are we braver in cyberspace? Social media anonymity enhances moral courage;Computers in Human Behavior;2023-11

4. Internet Crimes Against Minors and Legal Framework in India;Indian Journal of Public Administration;2022-05-16

5. Psychopathic personality disorder and cybercriminality: an outline of the issue;Current Issues in Personality Psychology;2022-03-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3