Internet anonymity practices in computer crime
MetadataShow full item record
Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined.
The definitive version is available from the Emerald Group Publishing Limited
The link to this article is:
Showing items related by title, author, creator and subject.
Divergence in a System of Complementarity? The Incorporation of dolus eventualis in the interpretation of criminal intent for serious crimes of international concern: A comparison of the International Criminal Court and the national legal system of CanadaStamp, Helen (2017)The creation of the first, permanent International Criminal Court by multilateral treaty was destined to be problematic. The specificity demanded by elements of criminal law does not sit easily with the compromise required ...
Dewan, Ashraf; Haider, R.; Amin, R. (2013)The objective of this chapter is to analyse the spatiotemporal patterns of crime in the Dhaka Metropolitan Area (DMA). Crime data for the period of August 2011 to July 2012 were acquired from Dhaka Metropolitan Police ...
Think Crime!: using evidence, theory and crime prevention through environmental design (CPTED) for planning safer citiesCozens, Paul (2014)Think Crime! is aimed at both beginners and expert crime prevention professionals. Along with its practical nature, the book is also structured as a text book for a 12-week course on CPTED. This course would be appropriate ...