Cyber Criminology: Exploring Internet Crimes and Criminal Behavior / edited by K. Jaishankar.

Material type: TextTextPublication details: Boca Raton, Fla. ; London : CRC Press, 2015. Description: xxxv, 425 p. : illustrations ; 24 cmISBN: 9781439829493 DDC classification: 343.9409
Contents:
Section I: Deviance and Criminal Subculture in CyberspaceCafe Culture and Heresy of Yahooboyism in Nigeria; A. I. AdeniranInternet Gambling; H. N. Pontell, G. Geis, and G. C. BrownSection II: Perpetrators; Perspectives and Offender Use of the InternetIdentity Construction Among Hackers; O. Turgeman-GoldschmidtVirtual Sex Offenders: A Clinical Perspective; K. YoungSelf-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism; K. C. Seigfried-Spellar, R. W. Lovely, and M. K. RogersOnline Social Networking and Pedophilia: An Experimental Research "Sting"; R. Broadhurst and K. JayawardenaAdult-Child Sex Advocacy Websites as Learning Environments for Crime; R. D'Ovidio, T. Mitman, I. J. El-Burki, and W. ShumarThe Internet as a Terrorist's Tool: A Social Learning Perspective; T. Freiburger and J. S. CraneSection III: Digital PiracyValue and Choice: Examining Their Roles in Digital Piracy; G. E. HigginsSuing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users; M. BachmannCriminological Predictors of Digital Piracy: A Path Analysis; W. D. GunterChange of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data; G. E. Higgins, S. E. Wolfe, and C. D. MarcumDigital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers; R. MooreSection IV: Cyber VictimizationCyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization; K.-S. ChoiAdolescent Online Victimization and Constructs of Routine Activities Theory; C. D. MarcumCyber Stalking: Typology, Etiology, and Victims; M. L. PittaroOnline Social Networking and Women Victims; D. Halder and K. JaishankarMalware Victimization: A Routine Activities Framework; A. M. Bossler and T. J. HoltSection V: Legal and Policy Issues of Cyber CrimesFatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism? A. M. MaghairehCyber Bullying: Legal Obligations and Educational Policy Vacuum; S. Shariff and D. L. HoffHuman Rights Infringement in the Digital Age; R. G. SmithConclusion; K. JaishankarIndex
Summary: Cybercrime is a newly emerging discipline that analyzes the changing nature and scope of victimization through the use of the internet. This volume covers such topics as cyberbullying, terrorist use of the internet, gambling, fraud, money laundering, cyberstalking, online sex solicitation, music and IP pirating, and human rights issues.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
BOOK BOOK BAC
PJ Library
343.9409 JAI (Browse shelf (Opens below)) Available 3101158
Total holds: 0

Section I: Deviance and Criminal Subculture in CyberspaceCafe Culture and Heresy of Yahooboyism in Nigeria; A. I. AdeniranInternet Gambling; H. N. Pontell, G. Geis, and G. C. BrownSection II: Perpetrators; Perspectives and Offender Use of the InternetIdentity Construction Among Hackers; O. Turgeman-GoldschmidtVirtual Sex Offenders: A Clinical Perspective; K. YoungSelf-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism; K. C. Seigfried-Spellar, R. W. Lovely, and M. K. RogersOnline Social Networking and Pedophilia: An Experimental Research "Sting"; R. Broadhurst and K. JayawardenaAdult-Child Sex Advocacy Websites as Learning Environments for Crime; R. D'Ovidio, T. Mitman, I. J. El-Burki, and W. ShumarThe Internet as a Terrorist's Tool: A Social Learning Perspective; T. Freiburger and J. S. CraneSection III: Digital PiracyValue and Choice: Examining Their Roles in Digital Piracy; G. E. HigginsSuing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users; M. BachmannCriminological Predictors of Digital Piracy: A Path Analysis; W. D. GunterChange of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data; G. E. Higgins, S. E. Wolfe, and C. D. MarcumDigital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers; R. MooreSection IV: Cyber VictimizationCyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization; K.-S. ChoiAdolescent Online Victimization and Constructs of Routine Activities Theory; C. D. MarcumCyber Stalking: Typology, Etiology, and Victims; M. L. PittaroOnline Social Networking and Women Victims; D. Halder and K. JaishankarMalware Victimization: A Routine Activities Framework; A. M. Bossler and T. J. HoltSection V: Legal and Policy Issues of Cyber CrimesFatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism? A. M. MaghairehCyber Bullying: Legal Obligations and Educational Policy Vacuum; S. Shariff and D. L. HoffHuman Rights Infringement in the Digital Age; R. G. SmithConclusion; K. JaishankarIndex

Cybercrime is a newly emerging discipline that analyzes the changing nature and scope of victimization through the use of the internet. This volume covers such topics as cyberbullying, terrorist use of the internet, gambling, fraud, money laundering, cyberstalking, online sex solicitation, music and IP pirating, and human rights issues.

There are no comments on this title.

to post a comment.