<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Crime in the digital age</title>
    <subTitle>controlling telecommunications and cyberspace illegalities</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Grabosky, Peter N.</namePart>
    <namePart type="date">1945-</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Smith, Russell G.</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">bibliography</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nju</placeTerm>
    </place>
    <place>
      <placeTerm type="text">New Brunswick, N.J</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Federation Press</placeTerm>
    </place>
    <publisher>Transaction</publisher>
    <publisher>Leichhardt, N.S.W., Australia</publisher>
    <dateIssued>1998</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>xi, 259 p. ; 24 cm.</extent>
  </physicalDescription>
  <abstract>With Crime in the Digital Age, Peter Grabosky and Russell  G. Smith offer advice on the criminal opportunities that  accompany the latest technological changes in  telecommunications.</abstract>
  <tableOfContents>1. Introduction -- 2. Illegal Interception of Telecommunications -- 3. Electronic Vandalism and Terrorism -- 4. Stealing Telecommunications Services -- 5. Telecommunications Piracy -- 6. Pornography and Other Offensive Content -- 7. Telemarketing Fraud -- 8. Electronic Funds Transfer Crime -- 9. Electronic Money Laundering -- 10. Telecommunications in Furtherance of Criminal  Conspiracies -- 11. Towards Security and Prosperity in Cyberspace.   </tableOfContents>
  <note type="statement of responsibility">P.N. Grabosky, Russell G. Smith, with the assistance of Paul Wright.</note>
  <note>Includes bibliographical references (p. 238-253) and index.</note>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
  </subject>
  <classification authority="ddc" edition="21">364.16/8</classification>
  <identifier type="isbn">0765804581 (paper)</identifier>
  <identifier type="isbn">1560003790 (cloth)</identifier>
  <identifier type="isbn">1862872694</identifier>
  <identifier type="lccn">97046818</identifier>
  <recordInfo>
    <recordCreationDate encoding="marc">971202</recordCreationDate>
    <recordChangeDate encoding="iso8601">20181127182802.0</recordChangeDate>
    <recordIdentifier>7038</recordIdentifier>
  </recordInfo>
</mods>
