Cybercrime, Louise I. Gerdes, Book Editor
Resource Information
The instance Cybercrime, Louise I. Gerdes, Book Editor represents a material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.
The Resource
Cybercrime, Louise I. Gerdes, Book Editor
Resource Information
The instance Cybercrime, Louise I. Gerdes, Book Editor represents a material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.
- Label
- Cybercrime, Louise I. Gerdes, Book Editor
- Statement of responsibility
- Louise I. Gerdes, Book Editor
- Bibliography note
- Includes bibliographical references (pages 220-223) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- The threat of cyberterrorism is exaggerated
- Maura Conway
- Music piracy poses a serious threat to the US economy
- Stephen E. Siwek
- The economic impact of music piracy is exaggerated
- Eric Bangeman
- Ch. 1 Is cybercrime a serious problem?:
- Identity theft is a serious problem
- Sid Kirchheimer
- The impact of identity theft for most victims is minimal
- Lynn Langton,
- Michael Planty
- Cyberterrorism poses a serious threat to national security
- John R. Rossi
- Eric Tucker, and
- Thomas Watkins
- Domestic abusers use technology to stalk and threaten their victims
- Dalia Colòn
- Ch. 2 How do cybercriminals use online media to commit crimes? :
- Fighting back online predators
- Kim Hone-McMahan
- The number of predators that exploit children online is exaggerated
- Steve Rendall
- Cybercriminals use personal information on social networking websites to commit crimes
- Consumer Reports
- Flash mobs, no longer just dance parties and pillow fights, pose growing criminal threat: cops
- Charles Arthur
- Some activist hackers oppose corporate control of the Internet
- Tim Hwang
- Great firewall: Chinese censors of Internet face "Hacktivists" in U.S.
- Geoffrey Fowler
- Ch. 3 Is Internet activism a cybercrime? :
- Activist websites that reveal sensitive documents threaten diplomatic negotiations
- John Feffer
- Activist websites that reveal sensitive documents are a useful form of journalism
- David Carr
- Some activists hack the Internet to promote political beliefs
- Peter Ludlow
- Some activist hackers have become too corrupt to be effective
- Proposed laws to protect children from Internet pornographers are unconstitutional
- Laura W. Murphy,
- Christopher Calabrese,
- Jesselyn McCurdy
- Brake the Internet pirates: how to slow down intellectual property theft in the digital era
- Wall Street Journal
- The Stop Online Piracy Act will not prevent online piracy
- Julian Sanchez
- Internet service providers should be held liable for cybercrime
- Noah Shachtman
- Ch. 4 What laws will best prevent cybercrime? :
- Making Internet service providers liable will not reduce cybercrime
- Mike Masnick
- A strict national standard is necessary to encourage companies to disclose data breaches
- Andrew Crocker
- Industry self-regulation, not government intervention, is the best way to protect consumers from data attacks
- William H. Saito
- Laws to protect children from Internet pornographers are necessary
- Lamar Smith,
- Debbie Wasserman Schultz
- Control code
- ocn783171211
- Dimensions
- 25 cm.
- Extent
- 243 pages
- Isbn
- 9780737763126
- Lccn
- 2012027207
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Record ID
- u97704
- Stock number
- 1353737
- System control number
-
- (Sirsi) o783171211
- (OCoLC)783171211
Context
Context of Cybercrime, Louise I. Gerdes, Book EditorInstantiates
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/resource/XPNc14SyzK8/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/resource/XPNc14SyzK8/">Cybercrime, Louise I. Gerdes, Book Editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Cybercrime, Louise I. Gerdes, Book Editor
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/resource/XPNc14SyzK8/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/resource/XPNc14SyzK8/">Cybercrime, Louise I. Gerdes, Book Editor</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>