Summary of Contents |
|
ix | |
Contents |
|
xi | |
Preface |
|
xv | |
Acknowledgments |
|
xvii | |
|
1 Introduction to Cybercrime |
|
|
1 | (10) |
|
Creation of the Internet and Cybercrime |
|
|
2 | (3) |
|
The Dark Web and Cybercrime |
|
|
5 | (1) |
|
Transnational Cybercrimes |
|
|
5 | (2) |
|
|
7 | (2) |
|
|
9 | (2) |
|
|
11 | (18) |
|
|
12 | (1) |
|
Defining Child Pornography |
|
|
12 | (3) |
|
Child Pornography-Related Charges |
|
|
15 | (1) |
|
Categorizing Child Pornography |
|
|
16 | (1) |
|
The Prevalence and Usage of Child Pornography |
|
|
17 | (2) |
|
Psychological Perspective |
|
|
19 | (2) |
|
Combating Child Pornography |
|
|
21 | (8) |
|
|
29 | (12) |
|
|
32 | (2) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
Combatting Online Prostitution |
|
|
35 | (2) |
|
|
37 | (4) |
|
|
41 | (18) |
|
|
43 | (2) |
|
Incidence, Prevalence and Predictive Factors |
|
|
43 | (1) |
|
|
44 | (1) |
|
Characteristics of Offenders |
|
|
45 | (1) |
|
Psychological Characteristics and Motivations of Offenders |
|
|
46 | (2) |
|
Grooming and Communication |
|
|
48 | (1) |
|
Is the Internet to Blame? |
|
|
49 | (1) |
|
Law Enforcement Efforts to Curb Sexual Victimization Online |
|
|
50 | (9) |
|
|
51 | (8) |
|
5 Nonconsensual Pornography |
|
|
59 | (10) |
|
Forms of Nonconsensual Pornography |
|
|
62 | (1) |
|
Effects of Nonconsensual Pornography |
|
|
63 | (1) |
|
Criminal Justice Reactions to Nonconsensual Pornography |
|
|
64 | (5) |
|
|
69 | (20) |
|
Methods of Identity Theft |
|
|
72 | (4) |
|
|
72 | (1) |
|
|
72 | (1) |
|
Phishing, Pharmining, Smishing, and Vishing |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Indicators of Identity Theft |
|
|
75 | (1) |
|
Anti-Identity Theft Legislation |
|
|
76 | (1) |
|
|
77 | (5) |
|
|
77 | (1) |
|
|
77 | (2) |
|
Lottery/Sweepstakes Schemes |
|
|
79 | (1) |
|
Fraudulent Classified Ads and Auction Sales |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Counterfeit Check Schemes |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
Protecting Intellectual Property |
|
|
84 | (5) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (4) |
|
7 Cyberbullying and Cyberstalking |
|
|
89 | (16) |
|
Characteristics of Victims and Offenders |
|
|
91 | (1) |
|
Prevention of Cyberbullying |
|
|
92 | (1) |
|
The Basics of Cyberstalking |
|
|
93 | (1) |
|
Victimization and Offending via Cyberstalking |
|
|
94 | (2) |
|
|
96 | (1) |
|
Addressing Free Speech Issues |
|
|
97 | (2) |
|
|
99 | (6) |
|
|
105 | (24) |
|
|
107 | (1) |
|
Demographics of the Hacker Community |
|
|
108 | (1) |
|
Organization and Subculture of Hackers |
|
|
108 | (4) |
|
Appreciation of Technology |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (4) |
|
|
112 | (1) |
|
|
112 | (1) |
|
Excitement and Entertainment |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
Exploring Hacker Activity |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
123 | (6) |
|
|
129 | (12) |
|
Technology and Terrorism in the Physical World |
|
|
132 | (4) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
The Internet and Counterterrorism |
|
|
136 | (5) |
Internet Resources |
|
141 | (2) |
Index |
|
143 | |