Cybercrime and society /
Yar, Majid.
Cybercrime and society / Majid Yar. - 2nd ed. - Los Angeles : SAGE, 2013. - x, 214 p. ; 25 cm.
Previous ed.: 2006.
Includes bibliographical references (p. [178]-206) and index.
1. Cybercrime and the internet : an introduction
2. Hackers, crackers and viral coders
3. Political hacking : from hacktivism to cyberterrorism
4. Virtual 'pirates' : intellectual property theft online
5. Cyber-frauds, scams and cons
6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography
8. the victimization of individuals online : cyberstalking and paedophilia
9. Policing the internet
10. Cybercrimes and cyberliberties : surveillance, privacy and crime control.
Machine generated contents note: 1.Cybercrime and the Internet: An Introduction
1.1.Perceptions of cybercrime
1.2.Cybercrime: questions and answers
1.3.A brief history and analysis of the Internet
1.4.Defining and classifying cybercrime
1.5.What's `new' about cybercrime?
1.6.How many crimes? Assessing the scale of internet offences
1.7.Challenges for criminology, criminal justice and policing
1.8.Summary
Study questions
Further reading
2.Hackers, Crackers and Viral Coders
2.1.Hackers and hacking - contested definitions
2.2.Representations of hackers and hacking: technological fears and fantasies
2.3.What hackers actually do: a brief guide for the technologically bewildered
2.4.Hacker myths and realities: wizards or button-pushers?
2.5.`Why do they do it?' Motivation, psychology, gender and youth
2.6.Hacking and the law: legislative innovations and responses
2.7.Summary
Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism
3.1.Introduction
3.2.Hacktivism and the politics of resistance in a globalized world
3.3.The spectre of cyberterrorism
3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks
3.5.Rhetorics and myths of cyberterrorism
3.6.Alternative conjunctions between terrorism and the Internet
3.7.Summary
4.Virtual `Pirates': Intellectual Property Theft Online
4.1.Introduction
4.2.Intellectual property, copyright and piracy: an overview
4.3.Scope and scale of piracy activity
4.4.Explaining the growth of internet piracy
4.5.Who are the `pirates'?
4.6.The development of anti-piracy initiatives
4.7.Thinking critically about piracy statistics
4.8.Thinking critically about intellectual property rights
4.9.Summary
5.Cyber-Frauds, Scams and Cons
5.1.Introduction
Contents note continued: 5.2.Scope and scale of online fraud
5.3.Varieties of online fraud
5.4.Online fraud: perpetrators' advantages and criminal justice's problems
5.5.Strategies for policing and combating internet frauds
5.6.Summary
6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography
6.1.Introduction
6.2.Thinking about `hate speech'
6.3.Hate speech online
6.4.Legal, policing and political challenges in tackling online hate speech
6.5.The growth and popularity of internet pornography
6.6.Criminological issues relating to internet pornography
6.7.Summary
7.Child Pornography and Child Sex Abuse Imagery
7.1.Introduction
7.2.Child pornography and the Internet: images, victims and offenders
7.3.Legislative and policing measures to combat online child pornography
Contents note continued: 7.4.Legal and policing challenges in tackling child pornography
7.5.The controversy over virtual child pornography
7.6.Summary
8.The Victimization of Individuals Online: Cyberstalking and Paedophilia
8.1.Introduction
8.2.The emergence of stalking as a crime problem
8.3.Cyberstalking
8.4.Online paedophilia
8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics?
8.6.Summary
9.Policing the Internet
9.1.Introduction
9.2.Public policing and the cybercrime problem
9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet
9.4.Privatized `for-profit' cybercrime policing
9.5.Explaining the pluralization and privatization of internet policing
9.6.Critical issues about private policing of the Internet
9.7.Summary
Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
10.1.Introduction
10.2.From surveillance to dataveillance: the rise of the electronic web
10.3.The development of internet surveillance
10.4.The dilemmas of surveillance as crime control: the case of encryption
10.5.Summary
9781446201947
Computer crimes.
Computer security.
364.168 / YAR.C
Cybercrime and society / Majid Yar. - 2nd ed. - Los Angeles : SAGE, 2013. - x, 214 p. ; 25 cm.
Previous ed.: 2006.
Includes bibliographical references (p. [178]-206) and index.
1. Cybercrime and the internet : an introduction
2. Hackers, crackers and viral coders
3. Political hacking : from hacktivism to cyberterrorism
4. Virtual 'pirates' : intellectual property theft online
5. Cyber-frauds, scams and cons
6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography
8. the victimization of individuals online : cyberstalking and paedophilia
9. Policing the internet
10. Cybercrimes and cyberliberties : surveillance, privacy and crime control.
Machine generated contents note: 1.Cybercrime and the Internet: An Introduction
1.1.Perceptions of cybercrime
1.2.Cybercrime: questions and answers
1.3.A brief history and analysis of the Internet
1.4.Defining and classifying cybercrime
1.5.What's `new' about cybercrime?
1.6.How many crimes? Assessing the scale of internet offences
1.7.Challenges for criminology, criminal justice and policing
1.8.Summary
Study questions
Further reading
2.Hackers, Crackers and Viral Coders
2.1.Hackers and hacking - contested definitions
2.2.Representations of hackers and hacking: technological fears and fantasies
2.3.What hackers actually do: a brief guide for the technologically bewildered
2.4.Hacker myths and realities: wizards or button-pushers?
2.5.`Why do they do it?' Motivation, psychology, gender and youth
2.6.Hacking and the law: legislative innovations and responses
2.7.Summary
Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism
3.1.Introduction
3.2.Hacktivism and the politics of resistance in a globalized world
3.3.The spectre of cyberterrorism
3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks
3.5.Rhetorics and myths of cyberterrorism
3.6.Alternative conjunctions between terrorism and the Internet
3.7.Summary
4.Virtual `Pirates': Intellectual Property Theft Online
4.1.Introduction
4.2.Intellectual property, copyright and piracy: an overview
4.3.Scope and scale of piracy activity
4.4.Explaining the growth of internet piracy
4.5.Who are the `pirates'?
4.6.The development of anti-piracy initiatives
4.7.Thinking critically about piracy statistics
4.8.Thinking critically about intellectual property rights
4.9.Summary
5.Cyber-Frauds, Scams and Cons
5.1.Introduction
Contents note continued: 5.2.Scope and scale of online fraud
5.3.Varieties of online fraud
5.4.Online fraud: perpetrators' advantages and criminal justice's problems
5.5.Strategies for policing and combating internet frauds
5.6.Summary
6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography
6.1.Introduction
6.2.Thinking about `hate speech'
6.3.Hate speech online
6.4.Legal, policing and political challenges in tackling online hate speech
6.5.The growth and popularity of internet pornography
6.6.Criminological issues relating to internet pornography
6.7.Summary
7.Child Pornography and Child Sex Abuse Imagery
7.1.Introduction
7.2.Child pornography and the Internet: images, victims and offenders
7.3.Legislative and policing measures to combat online child pornography
Contents note continued: 7.4.Legal and policing challenges in tackling child pornography
7.5.The controversy over virtual child pornography
7.6.Summary
8.The Victimization of Individuals Online: Cyberstalking and Paedophilia
8.1.Introduction
8.2.The emergence of stalking as a crime problem
8.3.Cyberstalking
8.4.Online paedophilia
8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics?
8.6.Summary
9.Policing the Internet
9.1.Introduction
9.2.Public policing and the cybercrime problem
9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet
9.4.Privatized `for-profit' cybercrime policing
9.5.Explaining the pluralization and privatization of internet policing
9.6.Critical issues about private policing of the Internet
9.7.Summary
Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
10.1.Introduction
10.2.From surveillance to dataveillance: the rise of the electronic web
10.3.The development of internet surveillance
10.4.The dilemmas of surveillance as crime control: the case of encryption
10.5.Summary
9781446201947
Computer crimes.
Computer security.
364.168 / YAR.C