In the book, J. Miller discusses the idea of criminology in the twenty-first century, since the arrival of computers in the 1970’s and with the further introduction of the web in the early 1990’s there was increased use of these technologies by criminals as a means of committing cybercrimes awhile masking their identity’s.
The source addresses how cybercrime can be split into three distinctive areas; Cybercrime Markets, allows its users to buy and sell products illegally through legitimate sources. Secondly, CyberFraud is performed by individuals who use deception to hoax unsuspecting victims into providing …show more content…
This book could be informative in my own research, providing an in-depth examination on how and why the crimes are performed, however, the source doesn’t provide information about cases which could be a limitation.
Brody, R., Mulig, E. and Kimball, V. (2007). Phishing, Pharming and Identity Theft. Academy of Accounting and Financial Studies Journal, 11(3).
This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold.
The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.
Several of the statistics in the article address the growth in CyberFraud and thus the article is a strong examination of the crime and quite useful in validating my own research and would specify the likelihood of an individual being targeted by this