TY - BOOK AU - Yar,Majid TI - Cybercrime and society SN - 9781446201947 U1 - 364.168 PY - 2013/// CY - Los Angeles PB - SAGE KW - Computer crimes KW - Computer security N1 - Previous ed.: 2006; Includes bibliographical references (p. [178]-206) and index; 1. Cybercrime and the internet : an introduction 2. Hackers, crackers and viral coders 3. Political hacking : from hacktivism to cyberterrorism 4. Virtual 'pirates' : intellectual property theft online 5. Cyber-frauds, scams and cons 6. Illegal, harmful and offensive content online : from hate speech to 'the dangers' of pornography 8. the victimization of individuals online : cyberstalking and paedophilia 9. Policing the internet 10. Cybercrimes and cyberliberties : surveillance, privacy and crime control. Machine generated contents note: 1.Cybercrime and the Internet: An Introduction 1.1.Perceptions of cybercrime 1.2.Cybercrime: questions and answers 1.3.A brief history and analysis of the Internet 1.4.Defining and classifying cybercrime 1.5.What's `new' about cybercrime? 1.6.How many crimes? Assessing the scale of internet offences 1.7.Challenges for criminology, criminal justice and policing 1.8.Summary Study questions Further reading 2.Hackers, Crackers and Viral Coders 2.1.Hackers and hacking - contested definitions 2.2.Representations of hackers and hacking: technological fears and fantasies 2.3.What hackers actually do: a brief guide for the technologically bewildered 2.4.Hacker myths and realities: wizards or button-pushers? 2.5.`Why do they do it?' Motivation, psychology, gender and youth 2.6.Hacking and the law: legislative innovations and responses 2.7.Summary Contents note continued: 3.Political Hacking: From Hacktivism to Cyberterrorism 3.1.Introduction 3.2.Hacktivism and the politics of resistance in a globalized world 3.3.The spectre of cyberterrorism 3.4.Why cyberterror? Terrorist advantages of utilizing internet attacks 3.5.Rhetorics and myths of cyberterrorism 3.6.Alternative conjunctions between terrorism and the Internet 3.7.Summary 4.Virtual `Pirates': Intellectual Property Theft Online 4.1.Introduction 4.2.Intellectual property, copyright and piracy: an overview 4.3.Scope and scale of piracy activity 4.4.Explaining the growth of internet piracy 4.5.Who are the `pirates'? 4.6.The development of anti-piracy initiatives 4.7.Thinking critically about piracy statistics 4.8.Thinking critically about intellectual property rights 4.9.Summary 5.Cyber-Frauds, Scams and Cons 5.1.Introduction Contents note continued: 5.2.Scope and scale of online fraud 5.3.Varieties of online fraud 5.4.Online fraud: perpetrators' advantages and criminal justice's problems 5.5.Strategies for policing and combating internet frauds 5.6.Summary 6.Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography 6.1.Introduction 6.2.Thinking about `hate speech' 6.3.Hate speech online 6.4.Legal, policing and political challenges in tackling online hate speech 6.5.The growth and popularity of internet pornography 6.6.Criminological issues relating to internet pornography 6.7.Summary 7.Child Pornography and Child Sex Abuse Imagery 7.1.Introduction 7.2.Child pornography and the Internet: images, victims and offenders 7.3.Legislative and policing measures to combat online child pornography Contents note continued: 7.4.Legal and policing challenges in tackling child pornography 7.5.The controversy over virtual child pornography 7.6.Summary 8.The Victimization of Individuals Online: Cyberstalking and Paedophilia 8.1.Introduction 8.2.The emergence of stalking as a crime problem 8.3.Cyberstalking 8.4.Online paedophilia 8.5.Thinking critically about online victimization: stalking and paedophilia as moral panics? 8.6.Summary 9.Policing the Internet 9.1.Introduction 9.2.Public policing and the cybercrime problem 9.3.Pluralized policing: the involvement of quasi-state and non-state actors in policing the Internet 9.4.Privatized `for-profit' cybercrime policing 9.5.Explaining the pluralization and privatization of internet policing 9.6.Critical issues about private policing of the Internet 9.7.Summary Contents note continued: 10.Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control 10.1.Introduction 10.2.From surveillance to dataveillance: the rise of the electronic web 10.3.The development of internet surveillance 10.4.The dilemmas of surveillance as crime control: the case of encryption 10.5.Summary ER -