Cybercrime and society / (Record no. 5874)

MARC details
000 -LEADER
fixed length control field 05274cam a22003257a 4500
001 - CONTROL NUMBER
control field 17462854
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210825105640.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120914s2013 cau b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012949458
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781446201930 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1446201937 (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1446201945 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781446201947 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Language of cataloging eng
Transcribing agency BUL
Modifying agency BUL
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Edition number 23
Item number YAR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Yar, Majid.
245 10 - TITLE STATEMENT
Title Cybercrime and society /
Statement of responsibility, etc. Majid Yar.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Los Angeles :
Name of publisher, distributor, etc. SAGE,
Date of publication, distribution, etc. 2013.
300 ## - PHYSICAL DESCRIPTION
Extent x, 214 p. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Contents <br/><br/>1. Cybercrime and the Internet: An Introduction<br/>Perceptions of Cybercrime<br/>Cybercrime: Questions and Answers<br/>A Brief History and Analysis of the Internet<br/>Defining and Classifying Cybercrime<br/>What's 'New' About Cybercrime?<br/>How Many Crimes? Assessing the Scale of Internet Offences<br/>Challenges for Criminology, Criminal Justice and Policing<br/>Summary<br/>Study questions<br/>Further reading<br/><br/>2. Hackers, Crackers and Viral Coders<br/>Hackers and Hacking - Contested Definitions<br/>Representations of Hackers and Hacking: Technological Fears and Fantasies<br/>What Hackers Actually Do: A Brief Guide for the Technologically Bewildered<br/>Hacker Myths and Realities: Wizards or Button-Pushers?<br/>'Why Do They Do It?' Motivation, Psychology, Gender and Youth<br/>Hacking and the Law: Legislative Innovations and Responses<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>3. Political Hacking: From Hacktivism to Cyberterrorism<br/>Introduction<br/>Hacktivism and the Politics of Resistance in a Globalised World<br/>The Spectre of Cyberterrorism<br/>Why Cyber-Terror? Terrorist Advantages of Utilising Internet Attacks<br/>Rhetorics and Myths of Cyberterrorism<br/>Alternate Conjunctions Between Terrorism and the Internet<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>4. Virtual 'Pirates': Intellectual Property Theft Online<br/>Introduction<br/>Intellectual Property, Copyright and 'Piracy': An Overview<br/>Scope and Scale of Piracy Activity<br/>Explaining the Growth of Internet Piracy<br/>Who Are the 'Pirates'?<br/>The Development of Anti-Piracy Initiatives<br/>Thinking Critically About Piracy Statistics<br/>Thinking Critically About Intellectual Property Rights<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/>5. Cyber-Frauds, Scams and Cons<br/>Introduction<br/>Scope and Scale of Online Fraud<br/>Varieties of Online Fraud<br/>Online Fraud: Perpetrators' Advantages and Criminal Justice's Problems<br/>Strategies For Policing and Combating Internet Frauds<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>6. Illegal, Harmful and Offensive Content Online: From Hate Speech to 'the Dangers' of Pornography<br/>Introduction<br/>Thinking About 'Hate Speech'<br/>Hate Speech Online<br/>Legal, Policing and Political Challenges in Tackling Online Hate Speech<br/>The Growth and Popularity of Internet Pornography<br/>Criminological Issues Relating to Internet Pornography<br/>Summary<br/>Study questions<br/>Further reading<br/><br/><br/>7. Child Pornography and Child Sex Abuse Imagery<br/>Introduction<br/>Child Pornography and the Internet: Images, Victims and Offenders<br/>Legislative and Policing Measures to Combat Online Child Pornography<br/>Legal and Policing Challenges in Tackling Child Pornography<br/>The Controversy Over Virtual Child Pornography<br/>Summary<br/>Study questions<br/>Further Reading<br/><br/><br/>8. The Victimization of Individuals Online: Cyberstalking and Paedophilia<br/>Introduction<br/>The Emergence of Stalking as a Crime Problem<br/>Cyberstalking<br/>Online Paedophilia<br/>Thinking Critically About Online Victimization: Stalking and Paedophilia as Moral Panics?<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>9. Policing the Internet<br/>Introduction<br/>Public Policing and the Cybercrime Problem<br/>Pluralised Policing: The Involvement of Quasi-State and Non-State Actors in Policing the Internet<br/>Privatised 'For-Profit' Cybercrime Policing<br/>Explaining the Pluralisation and Privatisation of Internet Policing<br/>Critical Issues About Private Policing of the Internet<br/>Summary<br/>Study Questions<br/>Further Reading<br/><br/><br/>10. Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control<br/>Introduction<br/>From Surveillance to Dataveillance: The Rise of the Electronic Web<br/>The Development of Internet Surveillance<br/>The Dilemmas of Surveillance as Crime Control: The Case of Encryption<br/>Summary<br/>Study questions<br/>Further reading
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. [178]-206) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cybercrime and the Internet: an introduction -- Hackers, crackers and viral coders -- Political hacking: from hacktivism to cyberterrorism -- Virtual 'pirates': intellectual property theft online -- Cyber-frauds, scams and cons -- Illegal, harmful and offensive content online: from hate speech to 'the dangers' of pornography -- Child pornography and child sex abuse imagery -- The victimization of individuals online: cyberstalking and paedophilia -- Policing the internet -- Cybercrimes and cyberliberties: surveillance, privacy and crime control.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Open Access
Edition 2nd edition
Classification part 364.168
Item part 1
Call number prefix YAR
Call number suffix 364.168 YAR
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 08/25/2021 Donation   364.168 YAR 1 0024087 08/25/2021 1 08/25/2021 Book Open Access