Atnaujinkite slapukų nuostatas

Cyber Crime 3rd ed. [Minkštas viršelis]

  • Formatas: Paperback / softback, 176 pages, aukštis x plotis x storis: 254x178x10 mm, weight: 295 g
  • Serija: Aspen Criminal Justice
  • Išleidimo metai: 31-Jan-2022
  • Leidėjas: Aspen Publishing
  • ISBN-10: 1543839576
  • ISBN-13: 9781543839579
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 176 pages, aukštis x plotis x storis: 254x178x10 mm, weight: 295 g
  • Serija: Aspen Criminal Justice
  • Išleidimo metai: 31-Jan-2022
  • Leidėjas: Aspen Publishing
  • ISBN-10: 1543839576
  • ISBN-13: 9781543839579
Kitos knygos pagal šią temą:
"Undergraduate textbook for the cybercrime course"--

Cybercrime, Investigating the Shadows of the Internet

Cybercrime provides the reader with a thorough examination of the prominence of cybercrime in our society, as well as the criminal justice system experience with cybercrimes. Research from scholars in the academic field, as well as government studies, statutes, and other material are gathered and summarized. Key concepts, statistics, and legislative histories are discussed in every chapter. The book is meant to educate and enlighten a wide audience, from those who are completely unfamiliar with the topic as an entirety, to individuals who need more specific information on a particular type of cybercrime. This text should be a useful guide to students, academics, and practitioners alike.

New to the Third Edition:

  • In-depth discussions of the dark web
  • New coverage of child sexual abuse material (CSAM)
  • Discussions of fraud related to government aid during the coronavirus epidemic
  • Extensive updates to the issues of underage sexting and nonconsensual pornography
  • New case studies to encompass recent developments in the areas of:
    • child pornography and solicitation
    • the Internet and prostitution
    • revenge pornography
    • efforts to combat piracy
    • cyberbullying
    • ransomware, hacking, and governmental relations
    • terrorists’ use of social media
  • Updated statistics that reflect the latest data

Professors and students will benefit from:

  • Case studies in each chapter that connect new concepts to current events and illustrate the use of criminal theory in crime solving
  • Questions for discussion that encourage evaluative and analytical thinking
  • Discussion and analysis of the demographics and characteristics of the offenders and their victims
  • An informative review of the efforts of legislation, public policy, and law enforcement to prevent and prosecute cybercrime
  • Coverage of the most widespread and damaging types of cybercrime
    • intellectual property theft
    • online sexual victimization
    • identity theft
    • cyberfraud and financial crimes
    • harassment
Summary of Contents ix
Contents xi
Preface xv
Acknowledgments xvii
1 Introduction to Cybercrime
1(10)
Creation of the Internet and Cybercrime
2(3)
The Dark Web and Cybercrime
5(1)
Transnational Cybercrimes
5(2)
Overview of the Book
7(2)
Conclusion
9(2)
2 Child Pornography
11(18)
Introduction
12(1)
Defining Child Pornography
12(3)
Child Pornography-Related Charges
15(1)
Categorizing Child Pornography
16(1)
The Prevalence and Usage of Child Pornography
17(2)
Psychological Perspective
19(2)
Combating Child Pornography
21(8)
3 Prostitution
29(12)
Advertising Sex Online
32(2)
Rating Websites
33(1)
Evaluating the Customers
34(1)
Signaling
35(1)
Combatting Online Prostitution
35(2)
Human Trafficking
37(4)
4 Sexual Solicitation
41(18)
Examining the Research
43(2)
Incidence, Prevalence and Predictive Factors
43(1)
Effects of Victimization
44(1)
Characteristics of Offenders
45(1)
Psychological Characteristics and Motivations of Offenders
46(2)
Grooming and Communication
48(1)
Is the Internet to Blame?
49(1)
Law Enforcement Efforts to Curb Sexual Victimization Online
50(9)
Programs
51(8)
5 Nonconsensual Pornography
59(10)
Forms of Nonconsensual Pornography
62(1)
Effects of Nonconsensual Pornography
63(1)
Criminal Justice Reactions to Nonconsensual Pornography
64(5)
6 Financial Crimes
69(20)
Methods of Identity Theft
72(4)
Dumpster Diving
72(1)
Packet Sniffing
72(1)
Phishing, Pharmining, Smishing, and Vishing
72(1)
Retail Scams
73(1)
Shoulder Surfing
74(1)
Skimming
75(1)
Indicators of Identity Theft
75(1)
Anti-Identity Theft Legislation
76(1)
Internet Scams and Cons
77(5)
Transactional Laundering
77(1)
Product Counterfeiting
77(2)
Lottery/Sweepstakes Schemes
79(1)
Fraudulent Classified Ads and Auction Sales
80(1)
Ponzi Schemes
80(1)
Work-from-Home Scams
80(1)
Rental/Real Estate Scams
81(1)
Counterfeit Check Schemes
81(1)
Nigerian Letter or 419
82(1)
Digital Piracy
82(2)
Protecting Intellectual Property
84(5)
Copyright Act of 1976
84(1)
Copyright Felony Act
85(1)
Notable Legislation
85(4)
7 Cyberbullying and Cyberstalking
89(16)
Characteristics of Victims and Offenders
91(1)
Prevention of Cyberbullying
92(1)
The Basics of Cyberstalking
93(1)
Victimization and Offending via Cyberstalking
94(2)
Emergence of Legislation
96(1)
Addressing Free Speech Issues
97(2)
Looking into the Future
99(6)
8 Hacking and Mai ware
105(24)
Defining Hacking
107(1)
Demographics of the Hacker Community
108(1)
Organization and Subculture of Hackers
108(4)
Appreciation of Technology
110(1)
Knowledge
110(1)
Commitment
110(1)
Identity
111(1)
Law/Secrecy
111(1)
Motivations of Hackers
112(4)
Addiction
112(1)
Curiosity
112(1)
Excitement and Entertainment
113(1)
Money
113(1)
Power, Status, and Ego
113(1)
Ideologies
114(1)
Peer Recognition
115(1)
Revenge
115(1)
Neutralization
115(1)
Exploring Hacker Activity
116(2)
Cyber Warfare
118(1)
Usage of Malware
119(1)
Costs
120(2)
Identifying Victims
122(1)
Prosecuting Hackers
123(6)
9 Cyberterrorism
129(12)
Technology and Terrorism in the Physical World
132(4)
Recruitment
133(1)
Education
133(1)
Fundraising
134(1)
Security
135(1)
The Internet and Counterterrorism
136(5)
Internet Resources 141(2)
Index 143