Cybercrime and society / (Record no. 569222)

MARC details
000 -LEADER
fixed length control field 05105cam a22002777a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120914s2013 cau b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781446201947
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.168
Cutter YAR.C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Yar, Majid.
245 10 - TITLE STATEMENT
Title Cybercrime and society /
Statement of responsibility, etc Majid Yar.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Los Angeles :
Name of publisher, distributor, etc SAGE,
Date of publication, distribution, etc 2013.
300 ## - PHYSICAL DESCRIPTION
Extent x, 214 p. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Previous ed.: 2006.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. [178]-206) and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Reference Book
505 0# -
-- 1. Cybercrime and the internet : an introduction<br/>2. Hackers, crackers and viral coders<br/>3. Political hacking : from hacktivism to cyberterrorism<br/>4. Virtual 'pirates' : intellectual property theft online<br/>5. Cyber-frauds, scams and cons<br/>6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography<br/>8. the victimization of individuals online : cyberstalking and paedophilia<br/>9. Policing the internet<br/>10. Cybercrimes and cyberliberties : surveillance, privacy and crime control.<br/>Machine generated contents note: 1.Cybercrime and the Internet: An Introduction<br/>1.1.Perceptions of cybercrime<br/>1.2.Cybercrime: questions and answers<br/>1.3.A brief history and analysis of the Internet<br/>1.4.Defining and classifying cybercrime<br/>1.5.What's `new' about cybercrime?<br/>1.6.How many crimes? Assessing the scale of internet offences<br/>1.7.Challenges for criminology, criminal justice and policing<br/>1.8.Summary<br/>Study questions<br/>Further reading<br/>2.Hackers, Crackers and Viral Coders<br/>2.1.Hackers and hacking - contested definitions<br/>2.2.Representations of hackers and hacking: technological fears and fantasies<br/>2.3.What hackers actually do: a brief guide for the technologically bewildered<br/>2.4.Hacker myths and realities: wizards or button-pushers?<br/>2.5.`Why do they do it?' Motivation, psychology, gender and youth<br/>2.6.Hacking and the law: legislative innovations and responses<br/>2.7.Summary<br/>Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism<br/>3.1.Introduction<br/>3.2.Hacktivism and the politics of resistance in a globalized world<br/>3.3.The spectre of cyberterrorism<br/>3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks<br/>3.5.Rhetorics and myths of cyberterrorism<br/>3.6.Alternative conjunctions between terrorism and the Internet<br/>3.7.Summary<br/>4.Virtual `Pirates': Intellectual Property Theft Online<br/>4.1.Introduction<br/>4.2.Intellectual property, copyright and piracy: an overview<br/>4.3.Scope and scale of piracy activity<br/>4.4.Explaining the growth of internet piracy<br/>4.5.Who are the `pirates'?<br/>4.6.The development of anti-piracy initiatives<br/>4.7.Thinking critically about piracy statistics<br/>4.8.Thinking critically about intellectual property rights<br/>4.9.Summary<br/>5.Cyber-Frauds, Scams and Cons<br/>5.1.Introduction<br/>Contents note continued: 5.2.Scope and scale of online fraud<br/>5.3.Varieties of online fraud<br/>5.4.Online fraud: perpetrators' advantages and criminal justice's problems<br/>5.5.Strategies for policing and combating internet frauds<br/>5.6.Summary<br/>6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography<br/>6.1.Introduction<br/>6.2.Thinking about `hate speech'<br/>6.3.Hate speech online<br/>6.4.Legal, policing and political challenges in tackling online hate speech<br/>6.5.The growth and popularity of internet pornography<br/>6.6.Criminological issues relating to internet pornography<br/>6.7.Summary<br/>7.Child Pornography and Child Sex Abuse Imagery<br/>7.1.Introduction<br/>7.2.Child pornography and the Internet: images, victims and offenders<br/>7.3.Legislative and policing measures to combat online child pornography<br/>Contents note continued: 7.4.Legal and policing challenges in tackling child pornography<br/>7.5.The controversy over virtual child pornography<br/>7.6.Summary<br/>8.The Victimization of Individuals Online: Cyberstalking and Paedophilia<br/>8.1.Introduction<br/>8.2.The emergence of stalking as a crime problem<br/>8.3.Cyberstalking<br/>8.4.Online paedophilia<br/>8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics?<br/>8.6.Summary<br/>9.Policing the Internet<br/>9.1.Introduction<br/>9.2.Public policing and the cybercrime problem<br/>9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet<br/>9.4.Privatized `for-profit' cybercrime policing<br/>9.5.Explaining the pluralization and privatization of internet policing<br/>9.6.Critical issues about private policing of the Internet<br/>9.7.Summary<br/>Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control<br/>10.1.Introduction<br/>10.2.From surveillance to dataveillance: the rise of the electronic web<br/>10.3.The development of internet surveillance<br/>10.4.The dilemmas of surveillance as crime control: the case of encryption<br/>10.5.Summary
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 10217/DEL/15-16/03/03/2016
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Copy number Koha item type
    Dewey Decimal Classification     Symbiosis Law School, Noida Symbiosis Law School, Noida 11/03/2016 International Book House, New Delhi 24.99 364.168 YAR.C SLSN-B-9145 11/03/2016 1 Books