Amazon cover image
Image from Amazon.com

Cybercrime and society / Majid Yar.

By: Material type: TextTextPublication details: Los Angeles : SAGE, 2013.Edition: 2nd edDescription: x, 214 p. ; 25 cmISBN:
  • 9781446201947
Subject(s): DDC classification:
  • 364.168 YAR.C
Contents:
1. Cybercrime and the internet : an introduction 2. Hackers, crackers and viral coders 3. Political hacking : from hacktivism to cyberterrorism 4. Virtual 'pirates' : intellectual property theft online 5. Cyber-frauds, scams and cons 6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography 8. the victimization of individuals online : cyberstalking and paedophilia 9. Policing the internet 10. Cybercrimes and cyberliberties : surveillance, privacy and crime control. Machine generated contents note: 1.Cybercrime and the Internet: An Introduction 1.1.Perceptions of cybercrime 1.2.Cybercrime: questions and answers 1.3.A brief history and analysis of the Internet 1.4.Defining and classifying cybercrime 1.5.What's `new' about cybercrime? 1.6.How many crimes? Assessing the scale of internet offences 1.7.Challenges for criminology, criminal justice and policing 1.8.Summary Study questions Further reading 2.Hackers, Crackers and Viral Coders 2.1.Hackers and hacking - contested definitions 2.2.Representations of hackers and hacking: technological fears and fantasies 2.3.What hackers actually do: a brief guide for the technologically bewildered 2.4.Hacker myths and realities: wizards or button-pushers? 2.5.`Why do they do it?' Motivation, psychology, gender and youth 2.6.Hacking and the law: legislative innovations and responses 2.7.Summary Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism 3.1.Introduction 3.2.Hacktivism and the politics of resistance in a globalized world 3.3.The spectre of cyberterrorism 3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks 3.5.Rhetorics and myths of cyberterrorism 3.6.Alternative conjunctions between terrorism and the Internet 3.7.Summary 4.Virtual `Pirates': Intellectual Property Theft Online 4.1.Introduction 4.2.Intellectual property, copyright and piracy: an overview 4.3.Scope and scale of piracy activity 4.4.Explaining the growth of internet piracy 4.5.Who are the `pirates'? 4.6.The development of anti-piracy initiatives 4.7.Thinking critically about piracy statistics 4.8.Thinking critically about intellectual property rights 4.9.Summary 5.Cyber-Frauds, Scams and Cons 5.1.Introduction Contents note continued: 5.2.Scope and scale of online fraud 5.3.Varieties of online fraud 5.4.Online fraud: perpetrators' advantages and criminal justice's problems 5.5.Strategies for policing and combating internet frauds 5.6.Summary 6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography 6.1.Introduction 6.2.Thinking about `hate speech' 6.3.Hate speech online 6.4.Legal, policing and political challenges in tackling online hate speech 6.5.The growth and popularity of internet pornography 6.6.Criminological issues relating to internet pornography 6.7.Summary 7.Child Pornography and Child Sex Abuse Imagery 7.1.Introduction 7.2.Child pornography and the Internet: images, victims and offenders 7.3.Legislative and policing measures to combat online child pornography Contents note continued: 7.4.Legal and policing challenges in tackling child pornography 7.5.The controversy over virtual child pornography 7.6.Summary 8.The Victimization of Individuals Online: Cyberstalking and Paedophilia 8.1.Introduction 8.2.The emergence of stalking as a crime problem 8.3.Cyberstalking 8.4.Online paedophilia 8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics? 8.6.Summary 9.Policing the Internet 9.1.Introduction 9.2.Public policing and the cybercrime problem 9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet 9.4.Privatized `for-profit' cybercrime policing 9.5.Explaining the pluralization and privatization of internet policing 9.6.Critical issues about private policing of the Internet 9.7.Summary Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control 10.1.Introduction 10.2.From surveillance to dataveillance: the rise of the electronic web 10.3.The development of internet surveillance 10.4.The dilemmas of surveillance as crime control: the case of encryption 10.5.Summary
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Symbiosis Law School, Noida 364.168 YAR.C (Browse shelf(Opens below)) 1 Available SLSN-B-9145

Previous ed.: 2006.

Includes bibliographical references (p. [178]-206) and index.

1. Cybercrime and the internet : an introduction
2. Hackers, crackers and viral coders
3. Political hacking : from hacktivism to cyberterrorism
4. Virtual 'pirates' : intellectual property theft online
5. Cyber-frauds, scams and cons
6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography
8. the victimization of individuals online : cyberstalking and paedophilia
9. Policing the internet
10. Cybercrimes and cyberliberties : surveillance, privacy and crime control.
Machine generated contents note: 1.Cybercrime and the Internet: An Introduction
1.1.Perceptions of cybercrime
1.2.Cybercrime: questions and answers
1.3.A brief history and analysis of the Internet
1.4.Defining and classifying cybercrime
1.5.What's `new' about cybercrime?
1.6.How many crimes? Assessing the scale of internet offences
1.7.Challenges for criminology, criminal justice and policing
1.8.Summary
Study questions
Further reading
2.Hackers, Crackers and Viral Coders
2.1.Hackers and hacking - contested definitions
2.2.Representations of hackers and hacking: technological fears and fantasies
2.3.What hackers actually do: a brief guide for the technologically bewildered
2.4.Hacker myths and realities: wizards or button-pushers?
2.5.`Why do they do it?' Motivation, psychology, gender and youth
2.6.Hacking and the law: legislative innovations and responses
2.7.Summary
Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism
3.1.Introduction
3.2.Hacktivism and the politics of resistance in a globalized world
3.3.The spectre of cyberterrorism
3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks
3.5.Rhetorics and myths of cyberterrorism
3.6.Alternative conjunctions between terrorism and the Internet
3.7.Summary
4.Virtual `Pirates': Intellectual Property Theft Online
4.1.Introduction
4.2.Intellectual property, copyright and piracy: an overview
4.3.Scope and scale of piracy activity
4.4.Explaining the growth of internet piracy
4.5.Who are the `pirates'?
4.6.The development of anti-piracy initiatives
4.7.Thinking critically about piracy statistics
4.8.Thinking critically about intellectual property rights
4.9.Summary
5.Cyber-Frauds, Scams and Cons
5.1.Introduction
Contents note continued: 5.2.Scope and scale of online fraud
5.3.Varieties of online fraud
5.4.Online fraud: perpetrators' advantages and criminal justice's problems
5.5.Strategies for policing and combating internet frauds
5.6.Summary
6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography
6.1.Introduction
6.2.Thinking about `hate speech'
6.3.Hate speech online
6.4.Legal, policing and political challenges in tackling online hate speech
6.5.The growth and popularity of internet pornography
6.6.Criminological issues relating to internet pornography
6.7.Summary
7.Child Pornography and Child Sex Abuse Imagery
7.1.Introduction
7.2.Child pornography and the Internet: images, victims and offenders
7.3.Legislative and policing measures to combat online child pornography
Contents note continued: 7.4.Legal and policing challenges in tackling child pornography
7.5.The controversy over virtual child pornography
7.6.Summary
8.The Victimization of Individuals Online: Cyberstalking and Paedophilia
8.1.Introduction
8.2.The emergence of stalking as a crime problem
8.3.Cyberstalking
8.4.Online paedophilia
8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics?
8.6.Summary
9.Policing the Internet
9.1.Introduction
9.2.Public policing and the cybercrime problem
9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet
9.4.Privatized `for-profit' cybercrime policing
9.5.Explaining the pluralization and privatization of internet policing
9.6.Critical issues about private policing of the Internet
9.7.Summary
Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control
10.1.Introduction
10.2.From surveillance to dataveillance: the rise of the electronic web
10.3.The development of internet surveillance
10.4.The dilemmas of surveillance as crime control: the case of encryption
10.5.Summary

There are no comments on this title.

to post a comment.