Chapter 14 resources for the Cyberlaw book
By John Bandler
This page has resources specific for this chapter.
Looking to navigate to another place?
- Cyberlaw Book Resources (main resources page)
- Cyberlaw main book page
- Udemy course on cyberlaw
- Previous chapter
- Next chapter
Chapter 14: Cybercrime and Identity Theft: Stealing from Others Using Digital Spaces and Creating a Black Market for Data
In this chapter I define cybercrime and discuss the basics, its relation to identity theft, the cybercrime and identity theft economy, why theft is no longer local, introduce payments and virtual currency and the Western Express case, discuss my Three Priority Threats, and of course the connection to law and cyberlaw.
Chapter references, resources, and additional reading
- Chapter 14 resources, https://johnbandler.com/cyberlawbook-resources-ch14/
- Foundations within the book
- Chapter 13, How we Got to Cyberlaw
- Part 2, Chapters 4-12, Introducing Law, Crime, etc.
- Cybercrime, https://johnbandler.com/cybercrime/
- Video: What is Cybercrime (in eleven minutes), https://youtu.be/Rhx5lIgXq7Y
- Identity Theft, https://johnbandler.com/identity-theft/
- The Three Priority Cybercrime Threats, https://johnbandler.com/priority-cybercrime-threats/
- Data breach, https://johnbandler.com/data-breach/
- Ransomware, https://johnbandler.com/ransomware/
- Email based funds transfer frauds, https://johnbandler.com/email-based-funds-transfer-frauds/
- Part 4 Criminal Cyberlaw, especially
- Chapter 19, Western Express
- Chapter 20, Substantive cybercrime laws
- Chapter 22, Virtual currency
- Prior books:
- Cybersecurity for the Home and Office (2017), Chapter 2, The Black Market for Your Data: The Cybercrime Economy
- Cybercrime Investigations (2020), Chapter 2, What is Cybercrime and Why is it Committed
Chapter questions
- List the three priority cybercrime threats
- How is cybercrime similar to “traditional” crime, and how is it different?
- What is most cybercrime really for? Why do they do it?
- How is identify theft harder to investigate compared to traditional theft?
- Why do identity theft and cybercrime go together?
- What was the first main virtual currency and what year?
- What came first, Egold or Bitcoin, and in what years?
Links and information
- The book: Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler
- Cyberlaw Book Resources (main resources page)
- Cyberlaw book FAQ
- Cyberlaw main book page


- Amazon - John's Author page
- Udemy online course on cyberlaw
(other online courses too) - Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch14, copyright John Bandler, all rights reserved.
Originally posted 11/13/2024. Updated 12/16/2025.
