skip navigation


Abstract Database

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

To download this abstract, check the box next to the NCJ number then click the "Back To Search Results" link. Then, click the "Download" button on the Search Results page. Also see the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 207466 Find in a Library
Title: Fox and the Hunters: How IC Technologies Change the Crime Race
Journal: European Journal on Criminal Policy and Research  Volume:10  Issue:1  Dated:2004  Pages:3-26
Author(s): Ernesto U. Savona; Maria Mignone
Date Published: 2004
Page Count: 24
Type: Issue Overview
Format: Article
Language: English
Country: Netherlands
Annotation: This article examines how new information and communication technologies (ICT's) are changing criminal methods, dynamics, and trends, as well as the challenges faced by legislators, law enforcement agencies, and scientists in preventing and combating crime that uses new ICT's.
Abstract: The Internet provides instant global communication between and among individuals and institutions. Used criminally, this can facilitate stalking, money laundering, fraud, larceny, and various types of theft. Relatively new ICT's permit criminals anonymity, a broadening of the pool of potential victims, and an inexpensive and accessible tool for committing many types of crimes. This article discusses how new ICT's maybe the subject of a crime, the object of a crime, as tools for committing or planning crime, and as a "symbol" of crime (intimidation or deception). One section of this article discusses how particular types of criminals, i.e., organized crime groups and white-collar offenders, are using ICT to commit their crimes. In discussing the challenges faced by legislators in countering ICT-related crime, this article presents a table that displays legal provisions designed to target computer-related crime in the 15 European Union Member States. Regarding law enforcement efforts against ICT-related crime, the discussion notes ways in which law enforcement is itself using new ICT's to detect, identify, and investigate criminal activities. The scientific community is also involved in the fight against ICT-related crime, as it discovers and develops ways to increase ICT security and tailor technologies for law enforcement tasks. 1 table and 29 references
Main Term(s): Criminology
Index Term(s): Communication techniques; Computer privacy and security; Computer related crime; Criminal methods; Digital communications; Information processing; Information Security; Science and Technology; Technology transfer; Transnational Crime; Transnational Organized Crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.