語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital Robbery = ATM Hacking and Im...
~
Hsieh, Ming-Li.
Digital Robbery = ATM Hacking and Implications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Digital Robbery/ by Shun-Yung Kevin Wang, Ming-Li Hsieh.
其他題名:
ATM Hacking and Implications /
作者:
Wang, Shun-Yung Kevin.
其他作者:
Hsieh, Ming-Li.
面頁冊數:
V, 53 p. 4 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Crime Control and Security. -
電子資源:
https://doi.org/10.1007/978-3-030-70706-4
ISBN:
9783030707064
Digital Robbery = ATM Hacking and Implications /
Wang, Shun-Yung Kevin.
Digital Robbery
ATM Hacking and Implications /[electronic resource] :by Shun-Yung Kevin Wang, Ming-Li Hsieh. - 1st ed. 2021. - V, 53 p. 4 illus.online resource. - SpringerBriefs in Cybersecurity,2193-973X. - SpringerBriefs in Cybersecurity,.
The insecure nature of cyberspace -- Why rob banks? That’s where the money is......even online! -- The ATM hacking case -- Implications of FCB Case.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution – First Commercial Bank,. Then it programmed dozens of ATMs to “spit out” millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of “turf jealousies.” The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.
ISBN: 9783030707064
Standard No.: 10.1007/978-3-030-70706-4doiSubjects--Topical Terms:
1172058
Crime Control and Security.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Digital Robbery = ATM Hacking and Implications /
LDR
:03258nam a22003975i 4500
001
1051919
003
DE-He213
005
20210623084252.0
007
cr nn 008mamaa
008
220103s2021 gw | s |||| 0|eng d
020
$a
9783030707064
$9
978-3-030-70706-4
024
7
$a
10.1007/978-3-030-70706-4
$2
doi
035
$a
978-3-030-70706-4
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Wang, Shun-Yung Kevin.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1356539
245
1 0
$a
Digital Robbery
$h
[electronic resource] :
$b
ATM Hacking and Implications /
$c
by Shun-Yung Kevin Wang, Ming-Li Hsieh.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
V, 53 p. 4 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
505
0
$a
The insecure nature of cyberspace -- Why rob banks? That’s where the money is......even online! -- The ATM hacking case -- Implications of FCB Case.
520
$a
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution – First Commercial Bank,. Then it programmed dozens of ATMs to “spit out” millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of “turf jealousies.” The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.
650
2 4
$a
Crime Control and Security.
$3
1172058
650
2 4
$a
Computer Crime.
$3
1226852
650
2 4
$a
Cybercrime.
$3
1109747
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
0
$a
Public safety.
$3
1060443
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computer networks
$x
Security measures.
$3
555385
700
1
$a
Hsieh, Ming-Li.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1356540
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030707057
776
0 8
$i
Printed edition:
$z
9783030707071
830
0
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
$3
1254278
856
4 0
$u
https://doi.org/10.1007/978-3-030-70706-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入