Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Digital robbery = ATM hacking and im...
~
Wang, Shun-Yung Kevin.
Linked to FindBook
Google Book
Amazon
博客來
Digital robbery = ATM hacking and implications /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Digital robbery/ by Shun-Yung Kevin Wang, Ming-Li Hsieh.
Reminder of title:
ATM hacking and implications /
Author:
Wang, Shun-Yung Kevin.
other author:
Hsieh, Ming-Li.
Published:
Cham :Springer International Publishing : : 2021.,
Description:
v, 53 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Automated tellers - Security measures. -
Online resource:
https://doi.org/10.1007/978-3-030-70706-4
ISBN:
9783030707064
Digital robbery = ATM hacking and implications /
Wang, Shun-Yung Kevin.
Digital robbery
ATM hacking and implications /[electronic resource] :by Shun-Yung Kevin Wang, Ming-Li Hsieh. - Cham :Springer International Publishing :2021. - v, 53 p. :ill., digital ;24 cm. - SpringerBriefs in cybersecurity,2193-973X. - SpringerBriefs in cybersecurity..
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "ATM Hacking." It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution - First Commercial Bank,. Then it programmed dozens of ATMs to "spit out" millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of "turf jealousies." The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.
ISBN: 9783030707064
Standard No.: 10.1007/978-3-030-70706-4doiSubjects--Topical Terms:
3493948
Automated tellers
--Security measures.
LC Class. No.: HV6773 / .W35 2021
Dewey Class. No.: 364.168
Digital robbery = ATM hacking and implications /
LDR
:02777nmm a2200325 a 4500
001
2239691
003
DE-He213
005
20210420083114.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030707064
$q
(electronic bk.)
020
$a
9783030707057
$q
(paper)
024
7
$a
10.1007/978-3-030-70706-4
$2
doi
035
$a
978-3-030-70706-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6773
$b
.W35 2021
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
364.168
$2
23
090
$a
HV6773
$b
.W246 2021
100
1
$a
Wang, Shun-Yung Kevin.
$3
3493947
245
1 0
$a
Digital robbery
$h
[electronic resource] :
$b
ATM hacking and implications /
$c
by Shun-Yung Kevin Wang, Ming-Li Hsieh.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
v, 53 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in cybersecurity,
$x
2193-973X
520
$a
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "ATM Hacking." It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution - First Commercial Bank,. Then it programmed dozens of ATMs to "spit out" millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of "turf jealousies." The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.
650
0
$a
Automated tellers
$x
Security measures.
$3
3493948
650
0
$a
Computer crimes.
$3
583792
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Cybercrime.
$3
2195714
650
2 4
$a
Computer Crime.
$3
3382518
650
2 4
$a
Crime Control and Security.
$3
3251653
700
1
$a
Hsieh, Ming-Li.
$3
3281283
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in cybersecurity.
$3
1569639
856
4 0
$u
https://doi.org/10.1007/978-3-030-70706-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9401576
電子資源
11.線上閱覽_V
電子書
EB HV6773 .W35 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login