Cyber Criminology: Exploring Internet Crimes and Criminal BehaviorK. Jaishankar Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. And as more personal information than ever is stored on networked computers, even the occasional or non-user is at risk. A collection of contributions from worldwide experts and emerging researchers, Cyber Crimino |
Contents
Café Culture and Heresy of Yahooboyism in Nigeria
| 3 |
Internet Gambling
| 13 |
Identity Construction Among Hackers
| 31 |
Virtual Sex Offenders
A Clinical Perspective | 53 |
SelfReported Internet Child Pornography Consumers
A Personality Assessment Using Banduras Theory of Reciprocal Determinism | 65 |
Online Social Networking and Pedophilia
An Experimental Research Sting | 79 |
AdultChild Sex Advocacy Websites as Learning Environments for Crime
| 103 |
The Internet as a Terrorists Tool
A Social Learning Perspective | 127 |
Digital File Sharing
An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers | 209 |
CyberRoutine Activities
Empirical Examination of Online Lifestyle Digital Guardians and ComputerCrime Victimization | 229 |
Adolescent Online Victimization and Constructs of Routine Activities Theory
| 253 |
Cyber Stalking
Typology Etiology and Victims | 277 |
Online Social Networking and Women Victims
| 299 |
Malware Victimization
A Routine Activities Framework | 317 |
Fatwas Chaos Ignites Cyber Vandalism
Does Islamic Criminal Law Prohibit Cyber Vandalism? | 347 |
Cyber Bullying
Legal Obligations and Educational Policy Vacuum | 359 |
Value and Choice
Examining Their Roles in Digital Piracy | 141 |
Suing the Genie Back in the Bottle
The Failed RIAA Strategy to Deter P2P Network Users | 155 |
Criminological Predictors of Digital Piracy
A Path Analysis | 173 |
Change of Music Piracy and Neutralization
An Examination Using ShortTerm Longitudinal Data | 193 |
Human Rights Infringement in the Digital Age
| 393 |
Conclusion
| 411 |
Back Cover | 415 |
Other editions - View all
Cyber Criminology: Exploring Internet Crimes and Criminal Behavior K. Jaishankar No preview available - 2011 |
Common terms and phrases
adolescents adult–child sex advocacy adults Akers analysis anonymous Antigua Bocij chat rooms communication computer crime computer-crime victimization court Criminal Justice cyber bullying cyber crime cyber criminology cyber stalking cyber vandalism cyberspace Deviant Behavior differential association digital file sharing digital piracy downloading music e-mail electronic engage factors fatwa file sharing groups guardianship hackers hacking harassment Higgins Hinduja human rights illegal increased individual’s individuals interactions Internet child pornography Internet users Jaishankar Journal law enforcement lifestyle low self-control malware malware infection measures music downloading music piracy neutralization online victimization participants pedophiles pirate present profiles programs protect rational choice rational choice theory relationship Reno responses Retrieved risk routine activities theory sample sex advocacy websites sexual Shariah SNWs social learning theory social networking software piracy stalkers target techniques terrorist tion United University variables youths