Syndetics cover image
Image from Syndetics

Cybercrime and society / Majid Yar.

By: Language: English Publisher: Los Angeles [u.a.] : Sage, 2013Edition: 2. edDescription: X, 214 SISBN:
  • 9781446201947
Subject(s): DDC classification:
  • 364.168 23
Other classification:
  • Oep
Holdings
Item type Current library Shelving location Call number Status Barcode
Book Biblioteket HKR Biblioteket 364 Yar Available 11156000174410
Total holds: 0

Enhanced descriptions from Syndetics:

Cybercrime is a complex and ever-changing phenomenon. This book offers a clear and engaging introduction to this fascinating subject by situating it in the wider context of social, political, cultural and economic change. Taking into account recent developments in social networking and mobile communications, this new edition tackles a range of themes spanning criminology, sociology, law, politics and cultural studies, including:

- computer hacking

- cyber-terrorism

- piracy and intellectual property theft

- financial fraud and identity theft

- hate speech

- internet pornography

- online stalking

- policing the internet

- surveillance and censorship

Complete with useful recommendations for further reading, incisive discussion questions and an updated glossary of key terms, Cybercrime and Society is an essential resource for all students and academics interested in cybercrime and the future of the Internet.

Imported from: 193.197.31.10:211/swblite (Do not remove)

Table of contents provided by Syndetics

  • About the Author (p. xi)
  • Preface to second edition (p. xii)
  • Acknowledgements (p. xiii)
  • 1 Cybercrime and the Internet: An Introduction (p. 1)
  • 1.1 Perceptions of cybercrime (p. 2)
  • 1.2 Cybercrime: questions and answers (p. 4)
  • 1.3 A brief history and analysis of the Internet (p. 6)
  • 1.4 Defining and classifying cybercrime (p. 9)
  • 1.5 What's 'new' about cybercrime? (p. 10)
  • 1.6 How many crimes? Assessing the scale of internet offences (p. 12)
  • 1.7 Challenges for criminology, criminal justice and policing (p. 15)
  • 1.8 Summary (p. 19)
  • Study questions (p. 19)
  • Further reading (p. 20)
  • 2 Hackers, Crackers and Viral Coders (p. 21)
  • 2.1 Hackers and hacking - contested definitions (p. 22)
  • 2.2 Representations of hackers and hacking: technological fears and fantasies (p. 24)
  • 2.3 What hackers actually do: a brief guide for the technologically bewildered (p. 27)
  • 2.4 Hacker myths and realities: wizards or button-pushers? (p. 32)
  • 2.5 'Why do they do it?' Motivation, psychology, gender and youth (p. 33)
  • 2.6 Hacking and the law: legislative innovations and responses (p. 39)
  • 2.7 Summary (p. 42)
  • Study questions (p. 43)
  • Further reading (p. 43)
  • 3 Political Hacking: From Hacktivism to Cyberterrorism (p. 44)
  • 3.1 Introduction (p. 45)
  • 3.2 Hacktivism and the politics of resistance in a globalized world (p. 46)
  • 3.3 The spectre of cyberterrorism (p. 50)
  • 3.4 Why cyberterror? Terrorist advantages of utilizing internet attacks (p. 53)
  • 3.5 Rhetorics and myths of cyberterrorism (p. 55)
  • 3.6 Alternative conjunctions between terrorism and the Internet (p. 57)
  • 3.7 Summary (p. 60)
  • Study questions (p. 61)
  • Further reading (p. 61)
  • 4 Virtual 'Pirates': Intellectual Property Theft Online (p. 62)
  • 4.1 Introduction (p. 63)
  • 4.2 Intellectual property, copyright and piracy; an overview (p. 64)
  • 4.3 Scope and scale of piracy activity (p. 65)
  • 4.4 Explaining the growth of internet piracy (p. 66)
  • 4.5 Who are the 'pirates'? (p. 67)
  • 4.6 The development of anti-piracy initiatives (p. 68)
  • 4.7 Thinking critically about piracy statistics (p. 72)
  • 4.8 Thinking critically about intellectual property rights (p. 73)
  • 4.9 Summary (p. 76)
  • Study questions (p. 76)
  • Further reading (p. 77)
  • 5 Cyber-Frauds, Scams and Cons (p. 78)
  • 5.1 Introduction (p. 79)
  • 5.2 Scope and scale of online fraud (p. 79)
  • 5.3 Varieties of online fraud (p. 80)
  • 5.4 Online fraud: perpetrators' advantages and criminal justice's problems (p. 88)
  • 5.5 Strategies for policing and combating internet frauds (p. 91)
  • 5.6 Summary (p. 93)
  • Study questions (p. 93)
  • Further reading (p. 93)
  • 6 Illegal, Harmful and Offensive Content Online: From Hate Speech to 'the Dangers' of Pornography (p. 95)
  • 6.1 Introduction (p. 96)
  • 6.2 Thinking about 'hate speech' (p. 97)
  • 6.3 Hate speech online (p. 99)
  • 6.4 Legal, policing and political challenges in tackling online hate speech (p. 101)
  • 6.5 The growth and popularity of internet pornography (p. 103)
  • 6.6 Criminological issues relating to internet pornography (p. 104)
  • 6.7 Summary (p. 110)
  • Study questions (p. 111)
  • Further reading (p. 111)
  • Contents
  • 7 Child Pornography and Child Sex Abuse Imagery (p. 113)
  • 7.1 Introduction (p. 114)
  • 7.2 Child pornography and the Internet: images, victims and offenders (p. 114)
  • 7.3 Legislative and policing measures to combat online child pornography (p. 118)
  • 7.4 Legal and policing challenges in tackling child pornography (p. 120)
  • 7.5 The controversy over virtual child pornography (p. 123)
  • 7.6 Summary 125 Study questions 125 Further reading (p. 126)
  • 8 The Victimization of Individuals Online: Cyberstalking and Paedophilia (p. 127)
  • 8.1 Introduction (p. 128)
  • 8.2 The emergence of stalking as a crime problem (p. 128)
  • 8.3 Cyberstalking (p. 132)
  • 8.4 Online paedophilia (p. 136)
  • 8.5 Thinking critically about online victimization: stalking and paedophilia as moral panics? (p. 138)
  • 8.6 Summary (p. 140)
  • Study questions (p. 141)
  • Further reading (p. 141)
  • 9 Policing the Internet (p. 142)
  • 9.1 Introduction (p. 143)
  • 9.2 Public policing and the cybercrime problem (p. 143)
  • 9.3 Pluralized policing: the involvement of quasi-state and non-state actors in policing the internet (p. 146)
  • 9.4 Privatized 'for-profit' cybercrime policing (p. 150)
  • 9.5 Explaining the pluralization and privatization of internet policing (p. 151)
  • 9.6 Critical issues about private policing of the Internet (p. 153)
  • 9.7 Summary (p. 154)
  • Study questions (p. 155)
  • Further reading (p. 155)
  • 10 Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control (p. 156)
  • 10.1 Introduction (p. 157)
  • 10.2 From surveillance to dataveillance: the rise of the electronic web (p. 158)
  • 10.3 The development of internet surveillance (p. 159)
  • 10.4 The dilemmas of surveillance as crime control of encryption (p. 165)
  • 10.5 Summary (p. 169)
  • Study questions (p. 170)
  • Further reading (p. 170)
  • Glossary (p. 171)
  • Bibliography (p. 178)
  • Index (p. 207)