Internet anonymity practices in computer crime

Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global co...

Full description

Bibliographic Details
Main Authors: Armstrong, Helen, Forde, Paddy
Format: Journal Article
Published: Emerald Group Publishing Limited 2003
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/44013
_version_ 1848756876382044160
author Armstrong, Helen
Forde, Paddy
author_facet Armstrong, Helen
Forde, Paddy
author_sort Armstrong, Helen
building Curtin Institutional Repository
collection Online Access
description Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined.
first_indexed 2025-11-14T09:19:10Z
format Journal Article
id curtin-20.500.11937-44013
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T09:19:10Z
publishDate 2003
publisher Emerald Group Publishing Limited
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-440132019-02-19T05:35:06Z Internet anonymity practices in computer crime Armstrong, Helen Forde, Paddy Law enforcement - Computer crime Internet Criminals Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined. 2003 Journal Article http://hdl.handle.net/20.500.11937/44013 10.1108/09685220310500117 Emerald Group Publishing Limited restricted
spellingShingle Law enforcement -
Computer crime
Internet
Criminals
Armstrong, Helen
Forde, Paddy
Internet anonymity practices in computer crime
title Internet anonymity practices in computer crime
title_full Internet anonymity practices in computer crime
title_fullStr Internet anonymity practices in computer crime
title_full_unstemmed Internet anonymity practices in computer crime
title_short Internet anonymity practices in computer crime
title_sort internet anonymity practices in computer crime
topic Law enforcement -
Computer crime
Internet
Criminals
url http://hdl.handle.net/20.500.11937/44013