Libraries
Cybercrime
A Guide to Finding Government Information
Web version of this guide includes links to web resources.
Search Tips:
Mix and match these terms in searching the library catalog, WestCat , or use them to search journal articles and law reviews via the library's Databases page. You can also use them to search government information sites listed on our Starting Points page - click the tab and pay particular attention to the Top Six.
- cybercrime
- computer crimes
- computer hacker(s/ing)
- internet/data security
- cyberterrorism
- cyber/computer security
- cyberstalking
- cybercriminals
- internet fraud
- phishing
- identity theft
- data protection
- electronic commerce
Related Topics:
- cyberbullying
- cyberwarfare
- cyberespionage
- cryptography
- privacy
An important source for many research topics is Congress. Congressional committees and subcommittees hold hearings on a wide variety of controversial and timely subjects. Simply add the word "hearing?" to a search string in WestCat .
Search Engines
and
Use these search engines to search for government information by typing "site:gov" in the search box preceding your search terms:
- site:gov "computer crime"
- site:mil cybercrime
Agencies/Committees
Federal
(Department of Justice)
State
Federal Government Information
This page from the FTC offers guides for securing your computer, protecting kids and avoiding online scams.
http://onguardonline.gov/
This survey of businesses' computer security incidents from 2005 shows the extent to which (using statistics) businesses are targeted for cyber attacks and what types of attacks are most prevalent.
http://bjs.ojp.usdoj.gov/index.cfm?ty=dcdetail&iid=260
This hearing discusses outdated technologies used in the U.S. payment car system and compares them to new technologies being used around the world to prevent data breaches and stolen credit card numbers getting into the hands of criminals and terrorists. 2010
http://purl.access.gpo.gov/GPO/LPS120908
Y 4.H 75:111-14
This hearing discusses Chinese cyber-attacks against the U.S. and U.S. companies and the causes of our vulnerability.
http://purl.fdlp.gov/GPO/gpo9687
Y 4.F 76/1:112-14
This report details threats to data breaches at agencies and U.S. companies and what can be done to protect intellectual property and sensitive data.
http://www.gao.gov/assets/600/592008.pdf
This short guide from the SEC shows consumers how to detect fraudulent emails and what they can do to protect themselves.
http://purl.access.gpo.gov/GPO/LPS112479
A collaborative effort between the Federal Bureau of Investigation and the National White Collar Crime Center, this website offers a convenient mechanism to report internet-related crime and prevention tips. The IC3 offers valuable internet fraud statistics and an annual report by state is available.
Illinois Government Information
Illinois Attorney General web site offering publications and information on identity theft and internet crime, among others.
The ICAC Task Force Program was created to help State and local law enforcement agencies enhance their investigative response to offenders who use the Internet, online communication systems, or other computer technology to sexually exploit children. The Illinois Attorney General is a
Legal Information
Law of Computer Technology: Rights, Licenses, Liabilities
This 4-volume set is a close examination of computer law, including fraud and computer-related torts; computer crime; and privacy, data protection, and access to information.
LEGL REF KF 390 .5 .C6 N55 2009
http://wiu.edu/libraries/govpubs/guides/cybercrime.php
Subject Guides
- Abortion
- Adoption
- Advertising and the Law
- Affirmative Action
- Agriculture
- AIDS
- Alcohol and Related Problems on Campus
- Alternative Dispute Resolution
- Alternative Medicine
- Americans with Disabilities Act
- Animal Research and Humane Care
- Asset Forfeiture
- Aviation Safety
- Capital Punishment
- Censorship - Nonpolitical
- Censorship - Political
- Child Abuse
- Child Care
- Children and Television
- Citizenship & Immigration Services
- Cloning
- Cookbooks
- Cuban Missile Crisis
- Cybercrime
- DNA
- DNA Testing of Criminals
- Domestic Violence
- Drinking and Driving
- Drone Warfare
- Drug Legalization
- Drug Testing
- Earthquakes (Illinois)
- Eating Disorders
- Elder Abuse
- Electronic Surveillance
- Endangered Species and Wildlife Conservation
- Euthanasia
- Federalism
- Financial Crisis
- Flag Desecration
- Gangs
- Global Warming
- Gulf War Illness
- Gun Control
- Hate Crimes
- Hazardous Waste Disposal
- Health Care Reform
- Homelessness
- Home schooling
- Homosexuals in the Military
- Intellectual Property
- JFK Assassination
- Juvenile Justice
- Korean War
- Learning Disabilities
- Literacy
- Methamphetamine
- Occupational Health and Safety
- Operation Desert Shield/Storm
- Police Misconduct
- Pornography
- Prison Reform
- POW and MIAs
- Problems of Adolescence
- Product Liability
- Rape
- Reproductive Technology
- Same-Sex Marriage
- School Prayer
- School Violence
- Seat Belts
- Sexual Harrassment in Education
- Sexual Harrassment in the Workplace
- Sexual Orientation Discrimination
- Small Business
- Space Exploration
- Terrorism
- Tobacco
- Unmanned Aerial Vehicles
- Vietnam War
- Violence in Mass Media
- Welfare Reform
- Women in Business
- World War I
- World War II
Connect with us: