Chapter 14 resources for the Cyberlaw bookResources and Links for the book Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler

By John Bandler

This page has resources specific for this chapter.

Looking to navigate to another place?

Chapter 14: Cybercrime and Identity Theft: Stealing from Others Using Digital Spaces and Creating a Black Market for Data

In this chapter I define cybercrime and discuss the basics, its relation to identity theft, the cybercrime and identity theft economy, why theft is no longer local, introduce payments and virtual currency and the Western Express case, discuss my Three Priority Threats, and of course the connection to law and cyberlaw.

Chapter references, resources, and additional reading

Chapter questions

  • List the three priority cybercrime threats
  • How is cybercrime similar to “traditional” crime, and how is it different?
  • What is most cybercrime really for? Why do they do it?
  • How is identify theft harder to investigate compared to traditional theft?
  • Why do identity theft and cybercrime go together?
  • What was the first main virtual currency and what year?
  • What came first, Egold or Bitcoin, and in what years?

Links and information

This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch14, copyright John Bandler, all rights reserved.

Originally posted 11/13/2024.  Updated 12/16/2025.