In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals will be identified. In the last chapter the response by law enforcement officers to high technology crime will be discussed.
Identifer | oai:union.ndltd.org:unt.edu/info:ark/67531/metadc3185 |
Date | 08 1900 |
Creators | Erdonmez, Erhan |
Contributors | Loper, D. Kall, Fritsch, Eric J., Liederbach, John |
Publisher | University of North Texas |
Source Sets | University of North Texas |
Language | English |
Detected Language | English |
Type | Thesis or Dissertation |
Format | Text |
Rights | Use restricted to UNT Community, Copyright, Erdonmez, Erhan, Copyright is held by the author, unless otherwise noted. All rights reserved. |
Page generated in 0.0016 seconds