Digital Robbery ATM Hacking and Implications /

This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitica...

Full description

Main Authors: Wang, Shun-Yung Kevin. (Author, http://id.loc.gov/vocabulary/relators/aut), Hsieh, Ming-Li. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Series:SpringerBriefs in Cybersecurity,
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-70706-4
LEADER 04116nam a22005295i 4500
001 978-3-030-70706-4
003 DE-He213
005 20210623084252.0
007 cr nn 008mamaa
008 210420s2021 gw | s |||| 0|eng d
020 |a 9783030707064  |9 978-3-030-70706-4 
024 7 |a 10.1007/978-3-030-70706-4  |2 doi 
050 4 |a TK5105.59 
072 7 |a UTN  |2 bicssc 
072 7 |a COM043050  |2 bisacsh 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Wang, Shun-Yung Kevin.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Digital Robbery  |h [electronic resource] :  |b ATM Hacking and Implications /  |c by Shun-Yung Kevin Wang, Ming-Li Hsieh. 
250 |a 1st ed. 2021. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2021. 
300 |a V, 53 p. 4 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
505 0 |a The insecure nature of cyberspace -- Why rob banks? That’s where the money is......even online! -- The ATM hacking case -- Implications of FCB Case. 
520 |a This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named “ATM Hacking.” It discusses ATM Hacking from a more full scope of aspects, including technology, modus operandi, law enforcement, socio-economic and geopolitical context, and theory development. After unpacking a classic case of ATM Hacking and its modus operandi, implications for cybersecurity and prevention, intra- and inter-agency collaboration, and theory development are presented. This book also demonstrates the analysis of extensive qualitative data collected from a high-profile case in which European criminal group hacked into a London voice mail server belonging to a Taiwanese financial institution – First Commercial Bank,. Then it programmed dozens of ATMs to “spit out” millions of dollars of cash. The successful crackdown on this type of crime is rare, if not unique, while the number of similar crimes has increased enormously in recent years and the trend seem to continue unabatingly. Further, the implications go beyond a country or a continent. Intra- and inter-agency collaboration among players of law enforcement is essential to the case especially in the police context of “turf jealousies.” The authors seek to document the ways in which agencies collaborate, as well as the perceived benefits and challenges of cooperation. Whether the broader political and contextual climates in which these agencies operate, limit the extent to which they can cooperate. This book is useful as a reference for researchers and professionals working in the area of cybercrime and cybersecurity. University professors can also use this book as a case study for senior seminars or graduate courses. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes. 
650 0 |a Public safety. 
650 1 4 |a Mobile and Network Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050 
650 2 4 |a Cybercrime.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 
650 2 4 |a Computer Crime.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28070 
650 2 4 |a Crime Control and Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/1BE000 
700 1 |a Hsieh, Ming-Li.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783030707057 
776 0 8 |i Printed edition:  |z 9783030707071 
830 0 |a SpringerBriefs in Cybersecurity,  |x 2193-973X 
856 4 0 |u https://doi.org/10.1007/978-3-030-70706-4 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)