Internet anonymity practices in computer crime
Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global co...
| Main Authors: | , |
|---|---|
| Format: | Journal Article |
| Published: |
Emerald Group Publishing Limited
2003
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/44013 |
| _version_ | 1848756876382044160 |
|---|---|
| author | Armstrong, Helen Forde, Paddy |
| author_facet | Armstrong, Helen Forde, Paddy |
| author_sort | Armstrong, Helen |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined. |
| first_indexed | 2025-11-14T09:19:10Z |
| format | Journal Article |
| id | curtin-20.500.11937-44013 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T09:19:10Z |
| publishDate | 2003 |
| publisher | Emerald Group Publishing Limited |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-440132019-02-19T05:35:06Z Internet anonymity practices in computer crime Armstrong, Helen Forde, Paddy Law enforcement - Computer crime Internet Criminals Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet. Criminals utilise software tools and valuable knowledge from the Internet as well as embracing the Internet's global communications system to participate in virtual communities of disguised people. The Internet provides the facilities for people with criminal intent to associate and exchange intelligence with reduced risk to their personal identification. Using the example of paedophile and hacker Internet practice, this paper proposes an association between criminal Internet activity and Internet anonymity. It discusses the propensity to use anonymity techniques when perpetrating cyber crime. Consequently, a new balance between privacy, freedom of speech and law enforcement must be determined. 2003 Journal Article http://hdl.handle.net/20.500.11937/44013 10.1108/09685220310500117 Emerald Group Publishing Limited restricted |
| spellingShingle | Law enforcement - Computer crime Internet Criminals Armstrong, Helen Forde, Paddy Internet anonymity practices in computer crime |
| title | Internet anonymity practices in computer crime |
| title_full | Internet anonymity practices in computer crime |
| title_fullStr | Internet anonymity practices in computer crime |
| title_full_unstemmed | Internet anonymity practices in computer crime |
| title_short | Internet anonymity practices in computer crime |
| title_sort | internet anonymity practices in computer crime |
| topic | Law enforcement - Computer crime Internet Criminals |
| url | http://hdl.handle.net/20.500.11937/44013 |