Atnaujinkite slapukų nuostatas

Social Networking as a Criminal Enterprise [Kietas viršelis]

Edited by (University of Louisville, Kentucky, USA), Edited by (Appalachian State University, USA)
  • Formatas: Hardback, 254 pages, aukštis x plotis: 234x156 mm, weight: 453 g
  • Išleidimo metai: 27-Jul-2017
  • Leidėjas: Routledge
  • ISBN-10: 1138417866
  • ISBN-13: 9781138417861
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 254 pages, aukštis x plotis: 234x156 mm, weight: 453 g
  • Išleidimo metai: 27-Jul-2017
  • Leidėjas: Routledge
  • ISBN-10: 1138417866
  • ISBN-13: 9781138417861
Kitos knygos pagal šią temą:
As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.With insight from field experts, this book examines:The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websitesForms of criminal behavior that can be performed utilizing social networking websitesCriminality via texting, identity theft, and hackingAdolescents as offenders and victims in cyberbullying and digital piracyOnline sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement‘s response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

This guide is designed as an introduction to the basic methods for identifying mammal bones and teeth. It is intended to highlight for beginners the main points on which identifications can be made on the bulk of bones and teeth from a small range of common Old World mammals.

Recenzijos

"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives." G. Ernest Govea, in Security Management

"for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals. L. L. Hansen, Western New England University "The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives." G. Ernest Govea, in Security Management

"for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals. L. L. Hansen, Western New England University

Understanding the Social Network. History of Social Networking. Creating Identity on Social Network Sites. Social Networks and Crime: Applying Criminological Theories. Types of Social Working Criminality. Texting and Social Networks. Identity Theft and Social Networks. Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media. Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach. Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites. Case Study: Advancing Research on Hackers Through Social Network Data. The Criminal Justice System and Social Networking. Further Examining Officer Perceptions and Support for Online Community Policing. Prosecution and Social Media. Corrections and Social Networking Websites. Index.
Catherine D. Marcum, George E. Higgins