Cybercrime and society:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Sage
2006
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 185 S. |
ISBN: | 1412907535 1412907543 9781412907538 9781412907545 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021581315 | ||
003 | DE-604 | ||
005 | 20120418 | ||
007 | t | ||
008 | 060515s2006 |||| 00||| eng d | ||
020 | |a 1412907535 |9 1-4129-0753-5 | ||
020 | |a 1412907543 |9 1-4129-0754-3 | ||
020 | |a 9781412907538 |9 978-1-4129-0753-8 | ||
020 | |a 9781412907545 |9 978-1-4129-0754-5 | ||
035 | |a (OCoLC)74491955 | ||
035 | |a (DE-599)BVBBV021581315 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-12 |a DE-2070s | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a Yar, Majid |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybercrime and society |c Majid Yar |
264 | 1 | |a London [u.a.] |b Sage |c 2006 | |
300 | |a XII, 185 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Computercriminaliteit |2 gtt | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Criminalité informatique - Aspect social | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes |x Social aspects | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014796963&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014796963 |
Datensatz im Suchindex
_version_ | 1804135353111543808 |
---|---|
adam_text | CYBERCRIME AND SOCIETY MAJID YAR PUBLICATIONS LONDON * THOUSAND OAKS *
NEW DELHI CONTENTS PREFACE LACE AIOWLEDGEMENTS CYBERCRIME AND THE
INTERNET: AN INTRODUCTION 1 . 1 PERCEPTIONS OF CYBERCRIME 1.2
CYBERCRIME: QUESTIONS AND ANSWERS 1.3 A BRIEF HISTORY AND ANALYSIS OF
THE INTERNET 1.4 DEFINING AND CLASSIFYING CYBERCRIME 1.5 WHAT S NEW
ABOUT CYBERCRIME? 1.6 HOW MANY CRIMES? ASSESSING THE SCALE OF INTERNET
OFFENCES 1.7 CHALLENGES FOR CRIMINOLOGY, CRIMINAL JUSTICE AND POLICING
1.8 SUMMARY STUDY QUESTIONS FURTHER READING HACKERS, CRACKERS AND VIRAL
CODERS 2.1 HACKERS AND HACKING - CONTESTED DEFINITIONS 2.2
REPRESENTATIONS OF HACKERS AND HACKING: TECHNOLOGICAL FEARS AND
FANTASIES 2.3 WHAT HACKERS ACTUALLY DO: A BRIEF GUIDE FOR THE
TECHNOLOGICALLY BEWILDERED 2.4 HACKER MYTHS AND REALITIES: WIZARDS OR
BUTTON-PUSHERS? 2.5 WHY DO THEY DO IT? MOTIVATION, PSYCHOLOGY, GENDER
AND YOUTH 2.6 HACKING AND THE LAW: LEGISLATIVE INNOVATIONS AND RESPONSES
2.7 SUMMARY STUDY QUESTIONS FURTHER READING XI XIII 1 2 5 6 9 11 12 16
19 20 20 21 22 24 27 31 33 39 42 42 42 POLITICAL HACKING: FROM
HACKTIVISM TO CYBERTERRORISM 45 3.1 INTRODUCTION 46 3.2 HACKTIVISM AND
THE POLITICS OF RESISTANCE IN A GLOBALISED WORLD 47 3.3 THE SPECTRE OF
CYBERTERRORISM 50 3.4 WHY CYFCER-TERROR? TERRORIST ADVANTAGES OF
UTILIZING INTERNET ATTACKS 54 3.5 RHETORICS AND MYTHS OF CYBERTERRORISM
55 3.6 ALTERNATIVE CONJUNCTIONS BETWEEN TERRORISM AND THE INTERNET 58
3.7 SUMMARY 61 STUDY QUESTIONS 61 FURTHER READING 62 VIRTUAL PIRATES :
INTELLECTUAL PROPERTY THEFT ONLINE 63 4.1 INTRODUCTION 64 4.2
INTELLECTUAL PROPERTY, COPYRIGHT AND PIRACY : A BRIEF GUIDE FOR THE
BEWILDERED 65 4.3 SCOPE AND SCALE OF PIRACY ACTIVITY 66 4.4 EXPLAINING
THE GROWTH OF INTERNET PIRACY 67 4.5 WHO ARE THE PIRATES ? 68 4.6 THE
DEVELOPMENT OF ANTI-PIRACY INITIATIVES 69 4.7 THINKING CRITICALLY ABOUT
PIRACY STATISTICS 72 4.8 THINKING CRITICALLY ABOUT INTELLECTUAL
PROPERTY RIGHTS 73 4.9 SUMMARY 76 STUDY QUESTIONS 77 FURTHER READING 77
CYBER-FRAUDS, SCAMS AND CONS 79 5.1 INTRODUCTION 80 5.2 SCOPE AND SCALE
OF ONLINE FRAUD 81 5.3 VARIETIES OF ONLINE FRAUD 81 5.4 ONLINE FRAUD:
PERPETRATORS ADVANTAGES AND CRIMINAL JUSTICE S PROBLEMS 90 5.5
STRATEGIES FOR POLICING AND COMBATING INTERNET FRAUDS 92 5.6 SUMMARY 94
STUDY QUESTIONS 95 FURTHER READING 95 CONTENTS VIII 6 ILLEGAL, HARMFUL
AND OFFENSIVE CONTENT ONLINE: FROM HATE SPEECH TO CHILD PORNOGRAPHY 97
6.1 INTRODUCTION 98 6.2 THINKING ABOUT HATE SPEECH ONLINE 99 6.3
HATE SPEECH ONLINE 101 6.4 LEGAL, POLICING AND POLITICAL CHALLENGES IN
TACKLING ONLINE HATE SPEECH 103 6.5 THE GROWTH AND POPULARITY OF
INTERNET PORNOGRAPHY 105 6.6 CRIMINOLOGICAL ISSUES RELATING TO INTERNET
PORNOGRAPHY 107 6.7 CHILD PORNOGRAPHY 112 6.8 LEGISLATIVE AND POLICING
MEASURES TO COMBAT ONLINE CHILD PORNOGRAPHY 113 6.9 LEGAL AND POLICING
CHALLENGES IN TACKLING CHILD PORNOGRAPHY 115 6.10 SUMMARY 119 STUDY
QUESTIONS 119 FURTHER READING 120 7 THE VICTIMIZATION OF INDIVIDUALS
ONLINE: CYBERSTALKING AND PAEDOPHILIA 121 7.1 INTRODUCTION 122 7.2 THE
EMERGENCE OF STALKING AS A CRIME PROBLEM 123 7.3 CYBERSTALKING 127 7.4
ONLINE PAEDOPHILIA 131 7.5 THINKING CRITICALLY ABOUT ONLINE
VICTIMIZATION: STALKING AND PAEDOPHILIA AS MORAL PANICS? 133 7.6 SUMMARY
136 STUDY QUESTIONS 136 FURTHER READING 137 8 CYBERCRIMES AND
CYBERLIBERTIES: SURVEILLANCE, PRIVACY AND CRIME CONTROL 139 8.1
INTRODUCTION 140 8.2 FROM SURVEILLANCE TO DATAVEILLANCE: THE RISE OF THE
ELECTRONIC WEB 141 8.3 THE DEVELOPMENT OF INTERNET SURVEILLANCE 143 8.4
THE DILEMMAS OF SURVEILLANCE AS CRIME CONTROL: THE CASE OF ENCRYPTION
148 8.5 SUMMARY 153 JY L/V CONTENTS STUDY QUESTIONS 153 FURTHER READING
154 GLOSSARY 155 BIBLIOGRAPHY 161 INDEX 181 CONTENTS
|
adam_txt |
CYBERCRIME AND SOCIETY MAJID YAR PUBLICATIONS LONDON * THOUSAND OAKS *
NEW DELHI CONTENTS PREFACE LACE AIOWLEDGEMENTS CYBERCRIME AND THE
INTERNET: AN INTRODUCTION 1 . 1 PERCEPTIONS OF CYBERCRIME 1.2
CYBERCRIME: QUESTIONS AND ANSWERS 1.3 A BRIEF HISTORY AND ANALYSIS OF
THE INTERNET 1.4 DEFINING AND CLASSIFYING CYBERCRIME 1.5 WHAT'S 'NEW'
ABOUT CYBERCRIME? 1.6 HOW MANY CRIMES? ASSESSING THE SCALE OF INTERNET
OFFENCES 1.7 CHALLENGES FOR CRIMINOLOGY, CRIMINAL JUSTICE AND POLICING
1.8 SUMMARY STUDY QUESTIONS FURTHER READING HACKERS, CRACKERS AND VIRAL
CODERS 2.1 HACKERS AND HACKING - CONTESTED DEFINITIONS 2.2
REPRESENTATIONS OF HACKERS AND HACKING: TECHNOLOGICAL FEARS AND
FANTASIES 2.3 WHAT HACKERS ACTUALLY DO: A BRIEF GUIDE FOR THE
TECHNOLOGICALLY BEWILDERED 2.4 HACKER MYTHS AND REALITIES: WIZARDS OR
BUTTON-PUSHERS? 2.5 'WHY DO THEY DO IT?' MOTIVATION, PSYCHOLOGY, GENDER
AND YOUTH 2.6 HACKING AND THE LAW: LEGISLATIVE INNOVATIONS AND RESPONSES
2.7 SUMMARY STUDY QUESTIONS FURTHER READING XI XIII 1 2 5 6 9 11 12 16
19 20 20 21 22 24 27 31 33 39 42 42 42 POLITICAL HACKING: FROM
HACKTIVISM TO CYBERTERRORISM 45 3.1 INTRODUCTION 46 3.2 HACKTIVISM AND
THE POLITICS OF RESISTANCE IN A GLOBALISED WORLD 47 3.3 THE SPECTRE OF
CYBERTERRORISM 50 3.4 WHY CYFCER-TERROR? TERRORIST ADVANTAGES OF
UTILIZING INTERNET ATTACKS 54 3.5 RHETORICS AND MYTHS OF CYBERTERRORISM
55 3.6 ALTERNATIVE CONJUNCTIONS BETWEEN TERRORISM AND THE INTERNET 58
3.7 SUMMARY 61 STUDY QUESTIONS 61 FURTHER READING 62 VIRTUAL 'PIRATES':
INTELLECTUAL PROPERTY THEFT ONLINE 63 4.1 INTRODUCTION 64 4.2
INTELLECTUAL PROPERTY, COPYRIGHT AND 'PIRACY': A BRIEF GUIDE FOR THE
BEWILDERED 65 4.3 SCOPE AND SCALE OF'PIRACY'ACTIVITY 66 4.4 EXPLAINING
THE GROWTH OF INTERNET 'PIRACY' 67 4.5 WHO ARE THE 'PIRATES'? 68 4.6 THE
DEVELOPMENT OF'ANTI-PIRACY'INITIATIVES 69 4.7 THINKING CRITICALLY ABOUT
'PIRACY' STATISTICS 72 4.8 THINKING CRITICALLY ABOUT INTELLECTUAL
PROPERTY RIGHTS 73 4.9 SUMMARY 76 STUDY QUESTIONS 77 FURTHER READING 77
CYBER-FRAUDS, SCAMS AND CONS 79 5.1 INTRODUCTION 80 5.2 SCOPE AND SCALE
OF ONLINE FRAUD 81 5.3 VARIETIES OF ONLINE FRAUD 81 5.4 ONLINE FRAUD:
PERPETRATORS' ADVANTAGES AND CRIMINAL JUSTICE'S PROBLEMS 90 5.5
STRATEGIES FOR POLICING AND COMBATING INTERNET FRAUDS 92 5.6 SUMMARY 94
STUDY QUESTIONS 95 FURTHER READING 95 CONTENTS VIII 6 ILLEGAL, HARMFUL
AND OFFENSIVE CONTENT ONLINE: FROM HATE SPEECH TO CHILD PORNOGRAPHY 97
6.1 INTRODUCTION 98 6.2 THINKING ABOUT 'HATE SPEECH' ONLINE " 99 6.3
HATE SPEECH ONLINE 101 6.4 LEGAL, POLICING AND POLITICAL CHALLENGES IN
TACKLING ONLINE HATE SPEECH 103 6.5 THE GROWTH AND POPULARITY OF
INTERNET PORNOGRAPHY 105 6.6 CRIMINOLOGICAL ISSUES RELATING TO INTERNET
PORNOGRAPHY 107 6.7 CHILD PORNOGRAPHY 112 6.8 LEGISLATIVE AND POLICING
MEASURES TO COMBAT ONLINE CHILD PORNOGRAPHY 113 6.9 LEGAL AND POLICING
CHALLENGES IN TACKLING CHILD PORNOGRAPHY 115 6.10 SUMMARY 119 STUDY
QUESTIONS 119 FURTHER READING 120 7 THE VICTIMIZATION OF INDIVIDUALS
ONLINE: CYBERSTALKING AND PAEDOPHILIA 121 7.1 INTRODUCTION 122 7.2 THE
EMERGENCE OF STALKING AS A CRIME PROBLEM 123 7.3 CYBERSTALKING 127 7.4
ONLINE PAEDOPHILIA 131 7.5 THINKING CRITICALLY ABOUT ONLINE
VICTIMIZATION: STALKING AND PAEDOPHILIA AS MORAL PANICS? 133 7.6 SUMMARY
136 STUDY QUESTIONS 136 FURTHER READING 137 8 CYBERCRIMES AND
CYBERLIBERTIES: SURVEILLANCE, PRIVACY AND CRIME CONTROL 139 8.1
INTRODUCTION 140 8.2 FROM SURVEILLANCE TO DATAVEILLANCE: THE RISE OF THE
ELECTRONIC WEB 141 8.3 THE DEVELOPMENT OF INTERNET SURVEILLANCE 143 8.4
THE DILEMMAS OF SURVEILLANCE AS CRIME CONTROL: THE CASE OF ENCRYPTION
148 8.5 SUMMARY 153 JY L/V CONTENTS STUDY QUESTIONS 153 FURTHER READING
154 GLOSSARY 155 BIBLIOGRAPHY 161 INDEX 181 CONTENTS |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Yar, Majid |
author_facet | Yar, Majid |
author_role | aut |
author_sort | Yar, Majid |
author_variant | m y my |
building | Verbundindex |
bvnumber | BV021581315 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)74491955 (DE-599)BVBBV021581315 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01524nam a2200433 c 4500</leader><controlfield tag="001">BV021581315</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120418 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060515s2006 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1412907535</subfield><subfield code="9">1-4129-0753-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1412907543</subfield><subfield code="9">1-4129-0754-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781412907538</subfield><subfield code="9">978-1-4129-0753-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781412907545</subfield><subfield code="9">978-1-4129-0754-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)74491955</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021581315</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-2070s</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yar, Majid</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrime and society</subfield><subfield code="c">Majid Yar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Sage</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 185 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computercriminaliteit</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique - Aspect social</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Social aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014796963&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014796963</subfield></datafield></record></collection> |
id | DE-604.BV021581315 |
illustrated | Not Illustrated |
index_date | 2024-07-02T14:41:43Z |
indexdate | 2024-07-09T20:39:09Z |
institution | BVB |
isbn | 1412907535 1412907543 9781412907538 9781412907545 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014796963 |
oclc_num | 74491955 |
open_access_boolean | |
owner | DE-M382 DE-12 DE-2070s |
owner_facet | DE-M382 DE-12 DE-2070s |
physical | XII, 185 S. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Sage |
record_format | marc |
spelling | Yar, Majid Verfasser aut Cybercrime and society Majid Yar London [u.a.] Sage 2006 XII, 185 S. txt rdacontent n rdamedia nc rdacarrier Computercriminaliteit gtt Criminalité informatique Criminalité informatique - Aspect social Gesellschaft Computer crimes Computer crimes Social aspects Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s DE-604 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014796963&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Yar, Majid Cybercrime and society Computercriminaliteit gtt Criminalité informatique Criminalité informatique - Aspect social Gesellschaft Computer crimes Computer crimes Social aspects Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Cybercrime and society |
title_auth | Cybercrime and society |
title_exact_search | Cybercrime and society |
title_exact_search_txtP | Cybercrime and society |
title_full | Cybercrime and society Majid Yar |
title_fullStr | Cybercrime and society Majid Yar |
title_full_unstemmed | Cybercrime and society Majid Yar |
title_short | Cybercrime and society |
title_sort | cybercrime and society |
topic | Computercriminaliteit gtt Criminalité informatique Criminalité informatique - Aspect social Gesellschaft Computer crimes Computer crimes Social aspects Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Computercriminaliteit Criminalité informatique Criminalité informatique - Aspect social Gesellschaft Computer crimes Computer crimes Social aspects Internetkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014796963&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yarmajid cybercrimeandsociety |