Libraries
Cybercrime
A Guide to Finding Government Information
Web version of this guide includes links to web resources.
Search Tips:
Mix and match these terms in searching the library catalog, WestCat , or use them to search journal articles and law reviews via the library's Databases page. You can also use them to search government information sites listed on our Starting Points page - click the tab and pay particular attention to the Top Six.
- cybercrime
- computer crimes
- computer hacker(s/ing)
- internet/data security
- cyberterrorism
- cyber/computer security
- cyberstalking
- cybercriminals
- internet fraud
- phishing
- identity theft
- data protection
- electronic commerce
Related Topics:
- cyberbullying
- cyberwarfare
- cyberespionage
- cryptography
- privacy
An important source for many research topics is Congress. Congressional committees and subcommittees hold hearings on a wide variety of controversial and timely subjects. Simply add the word "hearing?" to a search string in WestCat .
Search Engines
Google
and
StartPage
Use these search engines to search for government information by typing "site:gov" in the search box preceding your search terms:
- site:gov "computer crime"
- site:mil cybercrime
Agencies/Committees
Federal
Computer Crime & Intellectual Property Section (Department of Justice)
Department of Defense
Department of Homeland Security
FBI Cyber Division
National Security Agency
Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
Subcommittee on Counterterrorism and Intelligence
State
Federal Government Information
OnGuardOnline.gov
This page from the FTC offers guides for securing your computer, protecting kids and avoiding online scams.
http://onguardonline.gov/
National Computer Security Survey (NCSS)
This survey of businesses' computer security incidents from 2005 shows the extent to which (using statistics) businesses are targeted for cyber attacks and what types of attacks are most prevalent.
http://bjs.ojp.usdoj.gov/index.cfm?ty=dcdetail&iid=260
Do the Payment Card Industry Data Standards Reduce Cybercrime?
This hearing discusses outdated technologies used in the U.S. payment car system and compares them to new technologies being used around the world to prevent data breaches and stolen credit card numbers getting into the hands of criminals and terrorists. 2010
http://purl.access.gpo.gov/GPO/LPS120908
Y 4.H 75:111-14
Communist Chinese Cyber-Attacks, Cyber-Espionage, and Theft of American Technology
This hearing discusses Chinese cyber-attacks against the U.S. and U.S. companies and the causes of our vulnerability.
http://purl.fdlp.gov/GPO/gpo9687
Y 4.F 76/1:112-14
Cyber Threats Facilitate Ability to Commit Economic Espionage
This report details threats to data breaches at agencies and U.S. companies and what can be done to protect intellectual property and sensitive data.
http://www.gao.gov/assets/600/592008.pdf
"Phishing" Fraud: How to Avoid Getting Fried by Phony Phishermen
This short guide from the SEC shows consumers how to detect fraudulent emails and what they can do to protect themselves.
http://purl.access.gpo.gov/GPO/LPS112479
Internet Crime Complaint Center
A collaborative effort between the Federal Bureau of Investigation and the National White Collar Crime Center, this website offers a convenient mechanism to report internet-related crime and prevention tips. The IC3 Annual report offers valuable internet fraud statistics and an annual report by state is available.
Illinois Government Information
Protecting Consumers
Illinois Attorney General web site offering publications and information on identity theft and internet crime, among others.
Internet Crimes Against Children Task Force
The ICAC Task Force Program was created to help State and local law enforcement agencies enhance their investigative response to offenders who use the Internet, online communication systems, or other computer technology to sexually exploit children. The Illinois Attorney General is a regional Task Force contact
Legal Information
Law of Computer Technology: Rights, Licenses, Liabilities
This 4-volume set is a close examination of computer law, including fraud and computer-related torts; computer crime; and privacy, data protection, and access to information.
LEGL REF KF 390 .5 .C6 N55 2009
http://wiu.edu/libraries/govpubs/guides/cybercrime.php
Subject Guides
- FDLP LibGuides
- Abortion
- Adoption
- Advertising and the Law
- Affirmative Action
- Agriculture
- AIDS
- Alcohol and Related Problems on Campus
- Alternative Dispute Resolution
- Alternative Medicine
- Americans with Disabilities Act
- Animal Research and Humane Care
- Asset Forfeiture
- Aviation Safety
- Capital Punishment
- Censorship - Nonpolitical
- Censorship - Political
- Child Abuse
- Child Care
- Children and Television
- Citizenship & Immigration Services
- Cloning
- Confined Animal Feeding Operations
- Cookbooks
- Cuban Missile Crisis
- Cybercrime
- DNA
- DNA Testing of Criminals
- Domestic Violence
- Drinking and Driving
- Drone Warfare
- Drug Legalization
- Drug Testing
- Earthquakes (Illinois)
- Eating Disorders
- Elder Abuse
- Electronic Surveillance
- Endangered Species and Wildlife Conservation
- Euthanasia
- Federalism
- Financial Crisis
- Flag Desecration
- Gangs
- Global Warming
- Gulf War Illness
- Gun Control
- Hate Crimes
- Hazardous Waste Disposal
- Health Care Reform
- Homelessness
- Home schooling
- Homosexuals in the Military
- Intellectual Property
- JFK Assassination
- Juvenile Justice
- Korean War
- Learning Disabilities
- Literacy
- Methamphetamine
- Occupational Health and Safety
- Operation Desert Shield/Storm
- Police Misconduct
- Pornography
- Prison Reform
- POW and MIAs
- Problems of Adolescence
- Product Liability
- Rape
- Reproductive Technology
- Same-Sex Marriage
- School Prayer
- School Violence
- Seat Belts
- Sexual Harrassment in Education
- Sexual Harrassment in the Workplace
- Sexual Orientation Discrimination
- Small Business
- Space Exploration
- Terrorism
- Tobacco
- Unmanned Aerial Vehicles
- Vietnam War
- Violence in Mass Media
- Welfare Reform
- Women in Business
- World War I
- World War II
Connect with us: