Cybercrime and society / (Record no. 569222)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05105cam a22002777a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120914s2013 cau b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781446201947 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 364.168 |
Cutter | YAR.C |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Yar, Majid. |
245 10 - TITLE STATEMENT | |
Title | Cybercrime and society / |
Statement of responsibility, etc | Majid Yar. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Los Angeles : |
Name of publisher, distributor, etc | SAGE, |
Date of publication, distribution, etc | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | x, 214 p. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | Previous ed.: 2006. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references (p. [178]-206) and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Item type | Reference Book |
505 0# - | |
-- | 1. Cybercrime and the internet : an introduction<br/>2. Hackers, crackers and viral coders<br/>3. Political hacking : from hacktivism to cyberterrorism<br/>4. Virtual 'pirates' : intellectual property theft online<br/>5. Cyber-frauds, scams and cons<br/>6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography<br/>8. the victimization of individuals online : cyberstalking and paedophilia<br/>9. Policing the internet<br/>10. Cybercrimes and cyberliberties : surveillance, privacy and crime control.<br/>Machine generated contents note: 1.Cybercrime and the Internet: An Introduction<br/>1.1.Perceptions of cybercrime<br/>1.2.Cybercrime: questions and answers<br/>1.3.A brief history and analysis of the Internet<br/>1.4.Defining and classifying cybercrime<br/>1.5.What's `new' about cybercrime?<br/>1.6.How many crimes? Assessing the scale of internet offences<br/>1.7.Challenges for criminology, criminal justice and policing<br/>1.8.Summary<br/>Study questions<br/>Further reading<br/>2.Hackers, Crackers and Viral Coders<br/>2.1.Hackers and hacking - contested definitions<br/>2.2.Representations of hackers and hacking: technological fears and fantasies<br/>2.3.What hackers actually do: a brief guide for the technologically bewildered<br/>2.4.Hacker myths and realities: wizards or button-pushers?<br/>2.5.`Why do they do it?' Motivation, psychology, gender and youth<br/>2.6.Hacking and the law: legislative innovations and responses<br/>2.7.Summary<br/>Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism<br/>3.1.Introduction<br/>3.2.Hacktivism and the politics of resistance in a globalized world<br/>3.3.The spectre of cyberterrorism<br/>3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks<br/>3.5.Rhetorics and myths of cyberterrorism<br/>3.6.Alternative conjunctions between terrorism and the Internet<br/>3.7.Summary<br/>4.Virtual `Pirates': Intellectual Property Theft Online<br/>4.1.Introduction<br/>4.2.Intellectual property, copyright and piracy: an overview<br/>4.3.Scope and scale of piracy activity<br/>4.4.Explaining the growth of internet piracy<br/>4.5.Who are the `pirates'?<br/>4.6.The development of anti-piracy initiatives<br/>4.7.Thinking critically about piracy statistics<br/>4.8.Thinking critically about intellectual property rights<br/>4.9.Summary<br/>5.Cyber-Frauds, Scams and Cons<br/>5.1.Introduction<br/>Contents note continued: 5.2.Scope and scale of online fraud<br/>5.3.Varieties of online fraud<br/>5.4.Online fraud: perpetrators' advantages and criminal justice's problems<br/>5.5.Strategies for policing and combating internet frauds<br/>5.6.Summary<br/>6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography<br/>6.1.Introduction<br/>6.2.Thinking about `hate speech'<br/>6.3.Hate speech online<br/>6.4.Legal, policing and political challenges in tackling online hate speech<br/>6.5.The growth and popularity of internet pornography<br/>6.6.Criminological issues relating to internet pornography<br/>6.7.Summary<br/>7.Child Pornography and Child Sex Abuse Imagery<br/>7.1.Introduction<br/>7.2.Child pornography and the Internet: images, victims and offenders<br/>7.3.Legislative and policing measures to combat online child pornography<br/>Contents note continued: 7.4.Legal and policing challenges in tackling child pornography<br/>7.5.The controversy over virtual child pornography<br/>7.6.Summary<br/>8.The Victimization of Individuals Online: Cyberstalking and Paedophilia<br/>8.1.Introduction<br/>8.2.The emergence of stalking as a crime problem<br/>8.3.Cyberstalking<br/>8.4.Online paedophilia<br/>8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics?<br/>8.6.Summary<br/>9.Policing the Internet<br/>9.1.Introduction<br/>9.2.Public policing and the cybercrime problem<br/>9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet<br/>9.4.Privatized `for-profit' cybercrime policing<br/>9.5.Explaining the pluralization and privatization of internet policing<br/>9.6.Critical issues about private policing of the Internet<br/>9.7.Summary<br/>Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control<br/>10.1.Introduction<br/>10.2.From surveillance to dataveillance: the rise of the electronic web<br/>10.3.The development of internet surveillance<br/>10.4.The dilemmas of surveillance as crime control: the case of encryption<br/>10.5.Summary |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
-- | 10217/DEL/15-16/03/03/2016 |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Barcode | Date last seen | Copy number | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Symbiosis Law School, Noida | Symbiosis Law School, Noida | 11/03/2016 | International Book House, New Delhi | 24.99 | 364.168 YAR.C | SLSN-B-9145 | 11/03/2016 | 1 | Books |