Cyber Criminology: Exploring Internet Crimes and Criminal Behavior
CRC Press, Feb 22, 2011 - Law - 461 pages
Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. And as more personal information than ever is stored on networked computers, even the occasional or non-user is at risk. A collection of contributions from worldwide experts and emerging researchers, Cyber Criminology: Exploring Internet Crimes and Criminal Behavior explores today’s interface of computer science, Internet science, and criminology.
Topics discussed include:
Approaching the topic from a social science perspective, the book explores methods for determining the causes of computer crime victimization by examining an individual’s lifestyle patterns. It also publishes the findings of a study conducted on college students about online victimization.
Advances in information and communications technologies have created a range of new crime problems that did not exist two decades ago. Opportunities for various criminal activities to pervade the Internet have led to the growth and development of cyber criminology as a distinct discipline within the criminology framework. This volume explores all aspects of this nascent field and provides a window on the future of Internet crimes and theories behind their origins.K. Jaishankar was the General Chair of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV), held January 15-17, 2011 at the Hotel Jaipur Greens in Jaipur, Rajasthan, India.
What people are saying - Write a review
Cafť Culture and Heresy of Yahooboyism in Nigeria
Identity Construction Among Hackers
Virtual Sex Offenders A Clinical Perspective
SelfReported Internet Child Pornography Consumers A Personality Assessment Using Banduras Theory of Reciprocal Determinism
Online Social Networking and Pedophilia An Experimental Research Sting
AdultChild Sex Advocacy Websites as Learning Environments for Crime
The Internet as a Terrorists Tool A Social Learning Perspective
Digital File Sharing An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers
CyberRoutine Activities Empirical Examination of Online Lifestyle Digital Guardians and ComputerCrime Victimization
Adolescent Online Victimization and Constructs of Routine Activities Theory
Cyber Stalking Typology Etiology and Victims
Online Social Networking and Women Victims
Malware Victimization A Routine Activities Framework
Fatwas Chaos Ignites Cyber Vandalism Does Islamic Criminal Law Prohibit Cyber Vandalism?
Cyber Bullying Legal Obligations and Educational Policy Vacuum
Value and Choice Examining Their Roles in Digital Piracy
Suing the Genie Back in†the Bottle The Failed†RIAA Strategy to Deter P2P†Network Users
Criminological Predictors of Digital Piracy A Path Analysis
Change of Music Piracy and Neutralization An Examination Using ShortTerm Longitudinal Data
Human Rights Infringement in the Digital Age