Spam-Based Scams
Spam has become ubiquitous in this modern age, and it is mostly considered a nuisance. Yet it can be much worse than just a nuisance, as some spam is outright fraudulent. Termed spam-based scams, fraudulent messages can take many different forms: from the
- PDF / 22,874,131 Bytes
- 1,467 Pages / 439.43 x 683.15 pts Page_size
- 47 Downloads / 169 Views
The Palgrave Handbook of International Cybercrime and Cyberdeviance
The Palgrave Handbook of International Cybercrime and Cyberdeviance
Thomas J. Holt • Adam M. Bossler Editors
The Palgrave Handbook of International Cybercrime and Cyberdeviance With 44 Figures and 68 Tables
Editors Thomas J. Holt College of Social Science, School of Criminal Justice Michigan State University East Lansing, MI, USA
Adam M. Bossler Department of Criminal Justice and Criminology Georgia Southern University Statesboro, GA, USA
ISBN 978-3-319-78439-7 ISBN 978-3-319-78440-3 (eBook) ISBN 978-3-319-78441-0 (print and electronic bundle) https://doi.org/10.1007/978-3-319-78440-3 © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Palgrave Macmillan imprint is published by the registered company Springer Nature Switzerland AG. The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction
Almost the entire world now depends on the Internet and computer systems to manage all facets of daily life, from mundane activities like email to management of critical water, power, and sewage systems. The global connectivity of the Internet and the proliferation of technology make it possible for these systems to be misused by deviants, criminals, nation-states, and extremist groups. It is imperative that we understand how to both design better infrastructure and secure these systems. Similarly, we must recognize the human actors who seek to harm them. Though the computer science and engineering research literature has grown in tandem with the Internet, social science research has responded slower to the way that humans interact with and abuse technology. In fact, the bulk of criminological research related to cybercrime has only emerged in the last two decades. These studies appear in a range of outlet