MARC details
000 -LEADER |
fixed length control field |
05274cam a22003257a 4500 |
001 - CONTROL NUMBER |
control field |
17462854 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210825105640.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120914s2013 cau b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2012949458 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781446201930 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1446201937 (hbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1446201945 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781446201947 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Language of cataloging |
eng |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Description conventions |
rda |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
364.168 |
Edition number |
23 |
Item number |
YAR |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Yar, Majid. |
245 10 - TITLE STATEMENT |
Title |
Cybercrime and society / |
Statement of responsibility, etc. |
Majid Yar. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Los Angeles : |
Name of publisher, distributor, etc. |
SAGE, |
Date of publication, distribution, etc. |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
x, 214 p. ; |
Dimensions |
25 cm. |
500 ## - GENERAL NOTE |
General note |
Contents <br/><br/>1. Cybercrime and the Internet: An Introduction<br/>Perceptions of Cybercrime<br/>Cybercrime: Questions and Answers<br/>A Brief History and Analysis of the Internet<br/>Defining and Classifying Cybercrime<br/>What's 'New' About Cybercrime?<br/>How Many Crimes? Assessing the Scale of Internet Offences<br/>Challenges for Criminology, Criminal Justice and Policing<br/>Summary<br/>Study questions<br/>Further reading<br/><br/>2. Hackers, Crackers and Viral Coders<br/>Hackers and Hacking - Contested Definitions<br/>Representations of Hackers and Hacking: Technological Fears and Fantasies<br/>What Hackers Actually Do: A Brief Guide for the Technologically Bewildered<br/>Hacker Myths and Realities: Wizards or Button-Pushers?<br/>'Why Do They Do It?' Motivation, Psychology, Gender and Youth<br/>Hacking and the Law: Legislative Innovations and Responses<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>3. Political Hacking: From Hacktivism to Cyberterrorism<br/>Introduction<br/>Hacktivism and the Politics of Resistance in a Globalised World<br/>The Spectre of Cyberterrorism<br/>Why Cyber-Terror? Terrorist Advantages of Utilising Internet Attacks<br/>Rhetorics and Myths of Cyberterrorism<br/>Alternate Conjunctions Between Terrorism and the Internet<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>4. Virtual 'Pirates': Intellectual Property Theft Online<br/>Introduction<br/>Intellectual Property, Copyright and 'Piracy': An Overview<br/>Scope and Scale of Piracy Activity<br/>Explaining the Growth of Internet Piracy<br/>Who Are the 'Pirates'?<br/>The Development of Anti-Piracy Initiatives<br/>Thinking Critically About Piracy Statistics<br/>Thinking Critically About Intellectual Property Rights<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/>5. Cyber-Frauds, Scams and Cons<br/>Introduction<br/>Scope and Scale of Online Fraud<br/>Varieties of Online Fraud<br/>Online Fraud: Perpetrators' Advantages and Criminal Justice's Problems<br/>Strategies For Policing and Combating Internet Frauds<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>6. Illegal, Harmful and Offensive Content Online: From Hate Speech to 'the Dangers' of Pornography<br/>Introduction<br/>Thinking About 'Hate Speech'<br/>Hate Speech Online<br/>Legal, Policing and Political Challenges in Tackling Online Hate Speech<br/>The Growth and Popularity of Internet Pornography<br/>Criminological Issues Relating to Internet Pornography<br/>Summary<br/>Study questions<br/>Further reading<br/><br/><br/>7. Child Pornography and Child Sex Abuse Imagery<br/>Introduction<br/>Child Pornography and the Internet: Images, Victims and Offenders<br/>Legislative and Policing Measures to Combat Online Child Pornography<br/>Legal and Policing Challenges in Tackling Child Pornography<br/>The Controversy Over Virtual Child Pornography<br/>Summary<br/>Study questions<br/>Further Reading<br/><br/><br/>8. The Victimization of Individuals Online: Cyberstalking and Paedophilia<br/>Introduction<br/>The Emergence of Stalking as a Crime Problem<br/>Cyberstalking<br/>Online Paedophilia<br/>Thinking Critically About Online Victimization: Stalking and Paedophilia as Moral Panics?<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>9. Policing the Internet<br/>Introduction<br/>Public Policing and the Cybercrime Problem<br/>Pluralised Policing: The Involvement of Quasi-State and Non-State Actors in Policing the Internet<br/>Privatised 'For-Profit' Cybercrime Policing<br/>Explaining the Pluralisation and Privatisation of Internet Policing<br/>Critical Issues About Private Policing of the Internet<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>10. Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control<br/>Introduction<br/>From Surveillance to Dataveillance: The Rise of the Electronic Web<br/>The Development of Internet Surveillance<br/>The Dilemmas of Surveillance as Crime Control: The Case of Encryption<br/>Summary<br/>Study questions<br/>Further reading |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. [178]-206) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cybercrime and the Internet: an introduction -- Hackers, crackers and viral coders -- Political hacking: from hacktivism to cyberterrorism -- Virtual 'pirates': intellectual property theft online -- Cyber-frauds, scams and cons -- Illegal, harmful and offensive content online: from hate speech to 'the dangers' of pornography -- Child pornography and child sex abuse imagery -- The victimization of individuals online: cyberstalking and paedophilia -- Policing the internet -- Cybercrimes and cyberliberties: surveillance, privacy and crime control. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Open Access |
Edition |
2nd edition |
Classification part |
364.168 |
Item part |
1 |
Call number prefix |
YAR |
Call number suffix |
364.168 YAR |