°ÄÃÅÁùºÏ²ÊÀúÊ·¼Ç¼

Libraries

°ÄÃÅÁùºÏ²ÊÀúÊ·¼Ç¼ Logo

Cybercrime

A Guide to Finding Government Information


Web version of this guide includes links to web resources.


Search Tips:

Mix and match these terms in searching the library catalog, WestCat , or use them to search journal articles and law reviews via the library's Databases page. You can also use them to search government information sites listed on our Starting Points page - click the tab and pay particular attention to the Top Six.

  • cybercrime
  • computer crimes
  • computer hacker(s/ing)
  • internet/data security
  • cyberterrorism
  • cyber/computer security
  • cyberstalking
  • cybercriminals
  • internet fraud
  • phishing
  • identity theft
  • data protection
  • electronic commerce

Related Topics:
  • cyberbullying
  • cyberwarfare
  • cyberespionage
  • cryptography
  • privacy

An important source for many research topics is Congress. Congressional committees and subcommittees hold hearings on a wide variety of controversial and timely subjects. Simply add the word "hearing?" to a search string in WestCat .

Search Engines

and
Use these search engines to search for government information by typing "site:gov" in the search box preceding your search terms:

  • site:gov "computer crime"
  • site:mil cybercrime

Agencies/Committees
Federal

(Department of Justice)





State

Federal Government Information

This page from the FTC offers guides for securing your computer, protecting kids and avoiding online scams.
http://onguardonline.gov/

This survey of businesses' computer security incidents from 2005 shows the extent to which (using statistics) businesses are targeted for cyber attacks and what types of attacks are most prevalent.
http://bjs.ojp.usdoj.gov/index.cfm?ty=dcdetail&iid=260

This hearing discusses outdated technologies used in the U.S. payment car system and compares them to new technologies being used around the world to prevent data breaches and stolen credit card numbers getting into the hands of criminals and terrorists. 2010
http://purl.access.gpo.gov/GPO/LPS120908
Y 4.H 75:111-14

This hearing discusses Chinese cyber-attacks against the U.S. and U.S. companies and the causes of our vulnerability.
http://purl.fdlp.gov/GPO/gpo9687
Y 4.F 76/1:112-14

This report details threats to data breaches at agencies and U.S. companies and what can be done to protect intellectual property and sensitive data.
http://www.gao.gov/assets/600/592008.pdf

This short guide from the SEC shows consumers how to detect fraudulent emails and what they can do to protect themselves.
http://purl.access.gpo.gov/GPO/LPS112479

A collaborative effort between the Federal Bureau of Investigation and the National White Collar Crime Center, this website offers a convenient mechanism to report internet-related crime and prevention tips. The IC3 offers valuable internet fraud statistics and an annual report by state is available.

Illinois Government Information

Illinois Attorney General web site offering publications and information on identity theft and internet crime, among others.

The ICAC Task Force Program was created to help State and local law enforcement agencies enhance their investigative response to offenders who use the Internet, online communication systems, or other computer technology to sexually exploit children. The Illinois Attorney General is a

Legal Information
Law of Computer Technology: Rights, Licenses, Liabilities

This 4-volume set is a close examination of computer law, including fraud and computer-related torts; computer crime; and privacy, data protection, and access to information.
LEGL REF KF 390 .5 .C6 N55 2009


http://wiu.edu/libraries/govpubs/guides/cybercrime.php

Subject Guides