Internet anonymity practices in computer crime
dc.contributor.author | Armstrong, Helen | |
dc.contributor.author | Forde, Paddy | |
dc.date.accessioned | 2017-01-30T15:11:32Z | |
dc.date.available | 2017-01-30T15:11:32Z | |
dc.date.created | 2008-11-12T23:36:45Z | |
dc.date.issued | 2003 | |
dc.identifier.citation | Armstrong, Helen and Forde, Paddy. 2003. Internet anonymity practices in computer crime. Information Management and Computer Security 11 (5): 209-215. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/44013 | |
dc.identifier.doi | 10.1108/09685220310500117 | |
dc.description.abstract |
Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined. | |
dc.publisher | Emerald Group Publishing Limited | |
dc.subject | Law enforcement - | |
dc.subject | Computer crime | |
dc.subject | Internet | |
dc.subject | Criminals | |
dc.title | Internet anonymity practices in computer crime | |
dc.type | Journal Article | |
dcterms.source.volume | 11 | |
dcterms.source.number | 5 | |
dcterms.source.startPage | 209 | |
dcterms.source.endPage | 215 | |
dcterms.source.title | Information Management and Computer Security | |
curtin.note |
The definitive version is available from the Emerald Group Publishing Limited | |
curtin.note |
The link to this article is: | |
curtin.note |
| |
curtin.identifier | EPR-3079 | |
curtin.accessStatus | Fulltext not available | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |