000 | 05274cam a22003257a 4500 | ||
---|---|---|---|
999 |
_c5874 _d5874 |
||
001 | 17462854 | ||
003 | OSt | ||
005 | 20210825105640.0 | ||
008 | 120914s2013 cau b 001 0 eng d | ||
010 | _a 2012949458 | ||
020 | _a9781446201930 (hbk.) | ||
020 | _a1446201937 (hbk.) | ||
020 | _a1446201945 (pbk.) | ||
020 | _a9781446201947 (pbk.) | ||
040 |
_aBUL _beng _cBUL _dBUL _erda |
||
082 | 0 | 4 |
_a364.168 _223 _bYAR |
100 | 1 | _aYar, Majid. | |
245 | 1 | 0 |
_aCybercrime and society / _cMajid Yar. |
250 | _a2nd ed. | ||
260 |
_aLos Angeles : _bSAGE, _c2013. |
||
300 |
_ax, 214 p. ; _c25 cm. |
||
500 | _aContents 1. Cybercrime and the Internet: An Introduction Perceptions of Cybercrime Cybercrime: Questions and Answers A Brief History and Analysis of the Internet Defining and Classifying Cybercrime What's 'New' About Cybercrime? How Many Crimes? Assessing the Scale of Internet Offences Challenges for Criminology, Criminal Justice and Policing Summary Study questions Further reading 2. Hackers, Crackers and Viral Coders Hackers and Hacking - Contested Definitions Representations of Hackers and Hacking: Technological Fears and Fantasies What Hackers Actually Do: A Brief Guide for the Technologically Bewildered Hacker Myths and Realities: Wizards or Button-Pushers? 'Why Do They Do It?' Motivation, Psychology, Gender and Youth Hacking and the Law: Legislative Innovations and Responses Summary Study Questions Further Reading 3. Political Hacking: From Hacktivism to Cyberterrorism Introduction Hacktivism and the Politics of Resistance in a Globalised World The Spectre of Cyberterrorism Why Cyber-Terror? Terrorist Advantages of Utilising Internet Attacks Rhetorics and Myths of Cyberterrorism Alternate Conjunctions Between Terrorism and the Internet Summary Study Questions Further Reading 4. Virtual 'Pirates': Intellectual Property Theft Online Introduction Intellectual Property, Copyright and 'Piracy': An Overview Scope and Scale of Piracy Activity Explaining the Growth of Internet Piracy Who Are the 'Pirates'? The Development of Anti-Piracy Initiatives Thinking Critically About Piracy Statistics Thinking Critically About Intellectual Property Rights Summary Study Questions Further Reading 5. Cyber-Frauds, Scams and Cons Introduction Scope and Scale of Online Fraud Varieties of Online Fraud Online Fraud: Perpetrators' Advantages and Criminal Justice's Problems Strategies For Policing and Combating Internet Frauds Summary Study Questions Further Reading 6. Illegal, Harmful and Offensive Content Online: From Hate Speech to 'the Dangers' of Pornography Introduction Thinking About 'Hate Speech' Hate Speech Online Legal, Policing and Political Challenges in Tackling Online Hate Speech The Growth and Popularity of Internet Pornography Criminological Issues Relating to Internet Pornography Summary Study questions Further reading 7. Child Pornography and Child Sex Abuse Imagery Introduction Child Pornography and the Internet: Images, Victims and Offenders Legislative and Policing Measures to Combat Online Child Pornography Legal and Policing Challenges in Tackling Child Pornography The Controversy Over Virtual Child Pornography Summary Study questions Further Reading 8. The Victimization of Individuals Online: Cyberstalking and Paedophilia Introduction The Emergence of Stalking as a Crime Problem Cyberstalking Online Paedophilia Thinking Critically About Online Victimization: Stalking and Paedophilia as Moral Panics? Summary Study Questions Further Reading 9. Policing the Internet Introduction Public Policing and the Cybercrime Problem Pluralised Policing: The Involvement of Quasi-State and Non-State Actors in Policing the Internet Privatised 'For-Profit' Cybercrime Policing Explaining the Pluralisation and Privatisation of Internet Policing Critical Issues About Private Policing of the Internet Summary Study Questions Further Reading 10. Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control Introduction From Surveillance to Dataveillance: The Rise of the Electronic Web The Development of Internet Surveillance The Dilemmas of Surveillance as Crime Control: The Case of Encryption Summary Study questions Further reading | ||
504 | _aIncludes bibliographical references (p. [178]-206) and index. | ||
505 | 0 | _aCybercrime and the Internet: an introduction -- Hackers, crackers and viral coders -- Political hacking: from hacktivism to cyberterrorism -- Virtual 'pirates': intellectual property theft online -- Cyber-frauds, scams and cons -- Illegal, harmful and offensive content online: from hate speech to 'the dangers' of pornography -- Child pornography and child sex abuse imagery -- The victimization of individuals online: cyberstalking and paedophilia -- Policing the internet -- Cybercrimes and cyberliberties: surveillance, privacy and crime control. | |
650 | 0 | _aComputer crimes. | |
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBO _e2nd edition _h364.168 _i1 _kYAR _m364.168 YAR |