000 03866nam a22005535i 4500
001 978-3-030-70706-4
003 DE-He213
005 20240423125353.0
007 cr nn 008mamaa
008 210420s2021 sz | s |||| 0|eng d
020 _a9783030707064
_9978-3-030-70706-4
024 7 _a10.1007/978-3-030-70706-4
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aWang, Shun-Yung Kevin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aDigital Robbery
_h[electronic resource] :
_bATM Hacking and Implications /
_cby Shun-Yung Kevin Wang, Ming-Li Hsieh.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aV, 53 p. 4 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Cybersecurity,
_x2193-9748
505 0 _aThe insecure nature of cyberspace -- Why rob banks? That’s where the money is......even online! -- The ATM hacking case -- Implications of FCB Case.
520 _aThis book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution – First Commercial Bank,. Then it programmed dozens of ATMs to “spit out” millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of “turf jealousies.” The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer crimes.
650 0 _aCriminology.
650 1 4 _aMobile and Network Security.
650 2 4 _aCybercrime.
650 2 4 _aComputer Crime.
650 2 4 _aCrime Control and Security.
700 1 _aHsieh, Ming-Li.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030707057
776 0 8 _iPrinted edition:
_z9783030707071
830 0 _aSpringerBriefs in Cybersecurity,
_x2193-9748
856 4 0 _uhttps://doi.org/10.1007/978-3-030-70706-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177198
_d177198