LEADER 04297nam 2200637 a 450 001 9910782819103321 005 20230617042603.0 010 $a1-134-00014-6 010 $a1-135-11077-8 010 $a1-134-00007-3 010 $a1-281-33195-3 010 $a9786611331955 010 $a1-84392-487-0 035 $a(CKB)1000000000724311 035 $a(EBL)483190 035 $a(OCoLC)609855654 035 $a(SSID)ssj0000310734 035 $a(PQKBManifestationID)11205873 035 $a(PQKBTitleCode)TC0000310734 035 $a(PQKBWorkID)10290212 035 $a(PQKB)10573387 035 $a(MiAaPQ)EBC483190 035 $a(Au-PeEL)EBL483190 035 $a(CaPaEBR)ebr10305976 035 $a(CaONFJC)MIL133195 035 $a(EXLCZ)991000000000724311 100 $a20040315d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSuperhighway robbery$b[electronic resource] $epreventing e-commerce crime /$fGraeme R. Newman and Ronald V. Clarke 210 $aCullompton $cWillan$d2003 215 $a1 online resource (241 p.) 225 1 $aCrime Science Series 300 $aDescription based upon print version of record. 311 $a1-84392-018-2 320 $aIncludes bibliographical references and index. 327 $aForeword / Gloria Laycock -- Preface -- Chap. 1. Situational crime prevention in the information society -- Chap. 2. The e-commerce environment -- Chap. 3. E-commerce as the target of crime -- Chap. 4. Information as a hot product -- Chap. 5. Risk analysis of online shopping -- Chap. 6. Reducing opportunities for e-commerce crime -- Chap. 7. Policing e-commerce -- Chap. 8. Situational prevention and the 'society of control'. 330 $aThis book analyzes the expanding crime opportunities created by the Internet and e-commerce, and it explains how concepts of crime prevention developed in other contexts can be effectively applied in this new environment. The authors note that the Internet and associated e-commerce constitute a lawless "wild frontier" where users of the Internet can anonymously exploit and victimize other users without a high risk of being detected, arrested, prosecuted, and punished. For acquisitive criminals who seek to gain money by stealing it from others, e-commerce through the Internet enables them to "hack" their way into bank records and transfer funds for their own enrichment. Computer programs that are readily available for download on the Web can be used to scan the Web for individual computers that are vulnerable to attack. By using the Internet addresses of other users or using another person's or organization's computers or computing environment, criminals can hide their trails and escape detection. After identifying the multiple opportunities for crime in the world of e-commerce, the book describes specific steps that can be taken to prevent e-commerce crime at particular points of vulnerability. The authors explain how two aspects of situational crime prevention can prevent Internet crime. This involves both a targeting of individual vulnerabilities and a broad approach that requires partnerships in producing changes and modifications that can reduce or eliminate criminal opportunities. The authors apply the 16 techniques of situational crime prevention to the points of vulnerability of the e-commerce system. The points of vulnerability are identified and preventive measures are proposed. In discussing the broad approach of institutionalized and systemic efforts to police e-commerce, the book focuses on ways to increase the risks of detection and sanctions for crime without undue intrusions on the freedom and privacy of legitimate Internet and e-commerce users. 410 0$aCrime science series (Willan Publishing) 606 $aInternet fraud$xPrevention 606 $aComputer crimes$xPrevention 615 0$aInternet fraud$xPrevention. 615 0$aComputer crimes$xPrevention. 676 $a364.168 700 $aNewman$b Graeme R$0224580 701 $aClarke$b R. V. G$0905800 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782819103321 996 $aSuperhighway robbery$93746677 997 $aUNINA