Summary of Contents |
|
ix | |
Contents |
|
xi | |
Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
1 Introduction to Cybercrime |
|
|
1 | (12) |
|
|
2 | (1) |
|
|
3 | (2) |
|
Public Perception of Internet Crime |
|
|
5 | (1) |
|
Transnational Cybercrimes |
|
|
6 | (3) |
|
|
9 | (1) |
|
|
10 | (3) |
|
|
13 | (18) |
|
|
14 | (1) |
|
Defining Child Pornography |
|
|
14 | (2) |
|
Child Pornography-Related Charges |
|
|
16 | (2) |
|
Categorizing Child Pornography |
|
|
18 | (1) |
|
The Prevalence and Usage of Child Pornography |
|
|
19 | (2) |
|
Psychological Perspective |
|
|
21 | (2) |
|
|
23 | (1) |
|
Combatting Child Pornography |
|
|
24 | (7) |
|
|
31 | (12) |
|
|
33 | (3) |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Combatting Online Prostitution |
|
|
37 | (2) |
|
|
39 | (4) |
|
|
43 | (18) |
|
|
44 | (5) |
|
|
44 | (3) |
|
Predictive Behaviors of Victimization |
|
|
47 | (1) |
|
|
48 | (1) |
|
Characteristics of Offenders |
|
|
49 | (1) |
|
Psychological Characteristics and Motivations of Offenders |
|
|
50 | (2) |
|
Grooming and Communication |
|
|
52 | (1) |
|
Is the Internet to Blame? |
|
|
53 | (1) |
|
Law Enforcement Efforts to Curb Sexual Victimization Online |
|
|
54 | (7) |
|
|
55 | (6) |
|
5 Nonconsensual Pornography |
|
|
61 | (8) |
|
Effects of Nonsexual Pornography |
|
|
64 | (1) |
|
Criminal Justice Reactions to Nonconsensual Pornography |
|
|
64 | (5) |
|
|
69 | (16) |
|
|
72 | (2) |
|
Utilizing Criminological Theory to Explain Digital Piracy |
|
|
74 | (2) |
|
Legislative Protections of Intellectual Property |
|
|
76 | (2) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (7) |
|
|
85 | (14) |
|
Methods of Identity Theft |
|
|
87 | (4) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
Indicators of Identity Theft |
|
|
90 | (1) |
|
Anti-Identity Theft Legislation |
|
|
91 | (1) |
|
|
92 | (7) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Fraudulent Classified Ads and Auction Sales |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Counterfeit Check Schemes |
|
|
96 | (1) |
|
|
97 | (2) |
|
8 Cyberbullying and Cyberstalking |
|
|
99 | (18) |
|
Characteristics of Victims and Offenders |
|
|
101 | (2) |
|
Prevention of Cyberbullying |
|
|
103 | (1) |
|
The Basics of Cyberstalking |
|
|
103 | (1) |
|
Victimization and Offending via Cyberstalking |
|
|
104 | (2) |
|
|
106 | (4) |
|
Addressing Free Speech Issues |
|
|
110 | (2) |
|
|
112 | (5) |
|
|
117 | (24) |
|
|
119 | (1) |
|
Demographics of the Hacker Community |
|
|
119 | (1) |
|
Organization and Subculture of Hackers |
|
|
120 | (4) |
|
Appreciation of Technology |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (3) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Excitement and Entertainment |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
Exploring Hacker Activity |
|
|
127 | (3) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
136 | (5) |
|
|
141 | (10) |
|
Technology and Terrorism in the Physical World |
|
|
144 | (4) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
The Internet and Counterterrorism |
|
|
148 | (3) |
Internet Resources |
|
151 | (2) |
Index |
|
153 | |