Abstract
This article highlights the types of cybercrime, their functions, the psychological, physical, and economic harm they cause to individuals, their consequences, the economic and social context of public policy, digital criminals that infringe on societal rights and freedoms, as well as distinctions between fraud and extortion in criminal law, including their defining signs and elements.
References
Anderson, R. (2022). Security Engineering: A Guide to Building Dependable Distributed Systems (3rd ed.). Wiley.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company.
Furnell, S. (2021). Cybercrime: The Human Factor. CRC Press.
Holt, T. J., & Bossler, A. M. (2022). Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses. Routledge.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and Society (3rd ed.). SAGE Publications Ltd.
1.6. Wall, D. S. (2015). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.
Clough, J. (2015). Principles of Cybercrime (2nd ed.). Cambridge University Press.
Jaishankar, K. (Ed.). (2011). Cyber Criminology: Exploring Internet Crimes and Criminal Behavior. CRC Press.
Goodman, M. (2015). Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It. Doubleday.
Mitnick, K. D., & Simon, W. L. (2011). The Art of Deception: Controlling the Human Element of Security. Wiley.