Atnaujinkite slapukų nuostatas

Cyber Crime 2nd ed. [Minkštas viršelis]

  • Formatas: Paperback / softback, 180 pages, aukštis x plotis x storis: 251x175x13 mm, weight: 295 g
  • Serija: Aspen Criminal Justice
  • Išleidimo metai: 01-Feb-2019
  • Leidėjas: Aspen Publishing
  • ISBN-10: 1543800238
  • ISBN-13: 9781543800234
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 180 pages, aukštis x plotis x storis: 251x175x13 mm, weight: 295 g
  • Serija: Aspen Criminal Justice
  • Išleidimo metai: 01-Feb-2019
  • Leidėjas: Aspen Publishing
  • ISBN-10: 1543800238
  • ISBN-13: 9781543800234
Kitos knygos pagal šią temą:

Cyber Crime, Second Edition by Catherine D. Marcum, provides the reader with a thorough examination of the prominence of cybercrime in our society, as well as the criminal justice system experience with cybercrimes. Research from scholars in the academic field, as well as government studies, statutes, and other material are gathered and summarized. Key concepts, statistics, and legislative histories are discussed in every chapter. The book is meant to educate and enlighten a wide audience, from those who are completely unfamiliar with the topic as an entirety, to individuals who need more specific information on a particular type of cybercrime. This text should be a useful guide to students, academics, and practitioners alike.


New to the Second Edition:

  • A new chapter explores the many forms of nonconsensual pornography—doxxing, downblousing, upskirting, revenge porn, sextortion—and its negative effects on victims and society.
  • New features—Key Words, Questions to Consider While Reading, and end-of-chapter Discussion Question—help students focus on key concepts.
  • Discussions of the latest issues—the Convention on Cybercrime, R.B. Cialdini’s research into grooming, neutralization (or rationalization) of behaviors, transaction laundering, and cyber dating—keep students current with recent developments.
  • Updates include the latest statistics from the National Center for Missing and Exploited Children, case studies with recent developments and rulings (Playpen, Tor), and expanded coverage of online prostitution and Internet safety for minors.

Professors and students will benefit from:

  • Case studies in each chapter that connect new concepts to current events and illustrate the use of criminal theory in crime solving
  • Questions for discussion that encourage evaluative and analytical thinking
  • A range of theories and perspectives that shed light on the complexity of Internet-based crime
  • Discussion and analysis of the demographics and characteristics of the offenders and their victims
  • An informative review of the efforts of legislation, public policy, and law enforcement to prevent and prosecute cyber crime
  • Coverage of the most widespread and damaging types of cyber crime
    • intellectual property theft
    • online sexual victimization
    • identity theft
    • cyber fraud and financial crimes
    • harassment
Summary of Contents ix
Contents xi
Preface xv
Acknowledgments xvii
1 Introduction to Cybercrime
1(12)
Creation of the Internet
2(1)
Emergence of Cybercrime
3(2)
Public Perception of Internet Crime
5(1)
Transnational Cybercrimes
6(3)
Overview of the Book
9(1)
Conclusion
10(3)
2 Child Pornography
13(18)
Introduction
14(1)
Defining Child Pornography
14(2)
Child Pornography-Related Charges
16(2)
Categorizing Child Pornography
18(1)
The Prevalence and Usage of Child Pornography
19(2)
Psychological Perspective
21(2)
Sexting
23(1)
Combatting Child Pornography
24(7)
3 Prostitution
31(12)
Advertising Sex Online
33(3)
Rating Websites
34(2)
Evaluating the Customers
36(1)
Signaling
37(1)
Combatting Online Prostitution
37(2)
Human Trafficking
39(4)
4 Sexual Solicitation
43(18)
Examining the Research
44(5)
Incidence and Prevalence
44(3)
Predictive Behaviors of Victimization
47(1)
Effects of Victimization
48(1)
Characteristics of Offenders
49(1)
Psychological Characteristics and Motivations of Offenders
50(2)
Grooming and Communication
52(1)
Is the Internet to Blame?
53(1)
Law Enforcement Efforts to Curb Sexual Victimization Online
54(7)
Programs
55(6)
5 Nonconsensual Pornography
61(8)
Effects of Nonsexual Pornography
64(1)
Criminal Justice Reactions to Nonconsensual Pornography
64(5)
6 Digital Piracy
69(16)
Economic Costs of Piracy
72(2)
Utilizing Criminological Theory to Explain Digital Piracy
74(2)
Legislative Protections of Intellectual Property
76(2)
Copyright Act of 1976
76(1)
Copyright Felony Act
77(1)
Current Legislation
78(1)
Policy Implications
78(7)
7 Scams and Cons
85(14)
Methods of Identity Theft
87(4)
Dumpster Diving
87(1)
Packet Sniffing
88(1)
Phishing and Smishing
88(1)
Retail Scams
89(1)
Shoulder Surfing
89(1)
Skimming
90(1)
Indicators of Identity Theft
90(1)
Anti-Identity Theft Legislation
91(1)
Other Internet Scams
92(7)
Transactional Laundering
92(1)
Product Counterfeiting
93(1)
Lottery Schemes
94(1)
Fraudulent Classified Ads and Auction Sales
94(1)
Ponzi Schemes
95(1)
Work-from-Home Scams
95(1)
Rental/Real Estate Scams
96(1)
Counterfeit Check Schemes
96(1)
Nigerian Letter or 419
97(2)
8 Cyberbullying and Cyberstalking
99(18)
Characteristics of Victims and Offenders
101(2)
Prevention of Cyberbullying
103(1)
The Basics of Cyberstalking
103(1)
Victimization and Offending via Cyberstalking
104(2)
Emergence of Legislation
106(4)
Addressing Free Speech Issues
110(2)
Looking into the Future
112(5)
9 Hacking and Malware
117(24)
Defining Hacking
119(1)
Demographics of the Hacker Community
119(1)
Organization and Subculture of Hackers
120(4)
Appreciation of Technology
122(1)
Knowledge
122(1)
Commitment
122(1)
Identity
123(1)
Law/Secrecy
123(1)
Motivations of Hackers
124(3)
Addiction
124(1)
Curiosity
124(1)
Excitement and Entertainment
125(1)
Money
125(1)
Power, Status, and Ego
125(1)
Ideologies
126(1)
Peer Recognition
126(1)
Revenge
127(1)
Neutralization
127(1)
Exploring Hacker Activity
127(3)
Cyber Warfare
130(1)
Usage of Malware
131(1)
Prevalence
132(1)
Costs
133(1)
Identifying Victims
134(2)
Prosecuting Hackers
136(5)
10 Cyberterrorism
141(10)
Technology and Terrorism in the Physical World
144(4)
Recruitment
145(1)
Education
145(1)
Fundraising
146(1)
Security
147(1)
The Internet and Counterterrorism
148(3)
Internet Resources 151(2)
Index 153