Crime and deviance in cyberspace:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Aldershot, Hants, England
Ashgate
2009
|
Schriftenreihe: | International library of criminology, criminal justice and penology : second series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXX, 594 S. Ill., graph. Darst. |
ISBN: | 9780754624530 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035271222 | ||
003 | DE-604 | ||
005 | 20120820 | ||
007 | t | ||
008 | 090127s2009 xxkad|| |||| 00||| eng d | ||
010 | |a 2008030297 | ||
020 | |a 9780754624530 |c alk. paper |9 978-0-7546-2453-0 | ||
035 | |a (OCoLC)173807166 | ||
035 | |a (DE-599)BVBBV035271222 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-355 |a DE-19 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.16/8 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
245 | 1 | 0 | |a Crime and deviance in cyberspace |c ed. by David S. Wall |
264 | 1 | |a Aldershot, Hants, England |b Ashgate |c 2009 | |
300 | |a XXX, 594 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a International library of criminology, criminal justice and penology : second series | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Criminalité informatique - Prévention | |
650 | 4 | |a Pornographie sur Internet | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Deviant behavior | |
650 | 4 | |a Internet |x Social aspects | |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Wall, David S. |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017076586&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017076586 |
Datensatz im Suchindex
_version_ | 1804138558841159680 |
---|---|
adam_text | Contents
Acknowledgements
ix
Series Preface
xiii
Introduction
xv
PART I DEVELOPMENTS IN THINKING ABOUT CYBERCRIMES
1
Majid Yar
(2005)
The Novelty of Cybercrime : An Assessment in Light of
Routine Activity Theory , European Journal of Criminology,
2,
pp.
407-27. 3
2
Sheila Brown
(2006),
The Criminology of Hybrids: Rethinking Crime and Law
in
Technosocial
Networks , Theoretical Criminology,
10,
pp.
223-44. 25
PART II CHANGES IN THE ORGANIZATION OF CRIME ONLINE
3
Susan W. Brenner
(2002),
Organized Cybercrime? How Cyberspace May Affect
the Structure of Criminal Relationships , North Carolina Journal of Law and
Technology,
4,
pp.
1-50. 49
4
David S. Wall
(2005),
Digital Realism and the Governance of Spam as
Cybercrime , European Journal on Criminal Policy and Research,
10,
pp.
309—35. 99
5
Sandy Starr
(2004),
Can the Law Can Spam? Legislation is a Blunt Instrument
with Which to Beat Junk Email , Spiked, April, pp.
1-4. 127
6
Sandy Starr
(2004),
Can Technology Can Spam? IT Companies Do Battle with
Bulk Email , Spiked, May, pp.
1-5. 133
7
Lorine A. Hughes and Gregory J. DeLone
(2007),
Viruses, Worms, and Trojan
Horses: Serious Crimes, Nuisance, or Both? , Social Science Computer Review,
25,
pp.
78-98. 137
8
David S. Wall and Matthew Williams
(2007),
Policing Diversity in the Digital
Age: Maintaining Order in Virtual Communities , Criminology and Criminal
Justice,
7,
pp.
391-415. 159
PART HI THE CHANGING NATURE OF CYBERCRIME
Computer Integrity Crime
9
Helen
Nissenbaum (2004),
Hackers and the Contested Ontology of Cyberspace ,
New Media
&
Society,
6,
pp.
195-217. 189
10
Briavel Holcomb, Philip B. Bakelaar and Mark Zizzamia
(2003),
The Internet in
the Aftermath of the World Trade Center Attack , Journal of Urban Technology,
10,
pp.
111-28. 213
vi
Crime and Deviance in Cyberspace
Computer-assisted Crime
11 Gregor Urbas (2006),
Cross-National Investigation and Prosecution of
Intellectual Property Crimes: The Example of Operation Buccaneer ,
Crime, Law and Social Change,
46,
pp.
207-21. 233
12
Bert-
Jaap Koops
and Ronald Leenes
(2006),
Identity Theft, Identity Fraud, and/
or Identity-related Crime. Definitions Matter , Datenshutz
und Datensicherheit,
30,
pp.
553-56. 249
Computer Content Crime
13
Tony Krone
(2005),
International Police Operations Against Online Child
Pornography , Crime and Justice International,
21,
pp.
11-20. 255
14
Barbara Hewson
(2003),
Fetishising Images , Spiked, January, pp.
1-8. 265
15
Jonathan Clough
(2008),
Now you See it, Now you Don t: Digital Images and
the Meaning of Possession , Criminal Law Forum,
19,
pp.
205-39. 273
16
Francesca Philips and
Gábriellé Morrissey
(2004),
Cyberstalking and
Cyberpredators: A Threat to Safe Sexuality on the Internet , Convergence,
10,
pp.
66-79. 309
17
Giselinde
Kuipers
(2006),
The Social Construction of Digital Danger: Debating,
Defusing and Inflating the Moral Dangers of Online Humor and Pornography in
the Netherlands and the United States
,
New Media
&
Society,
8,
pp.
379-400. 323
18
Jacqueline L. Schneider
(2003),
Hiding in Plain Sight: An Exploration of the
Illegal(?) Activities of a Drugs Newsgroup , Howard Journal of Criminal Justice,
42,
pp.
374-89. 345
19
Jerry Finn
(2004),
A Survey of Online Harassment at a University Campus ,
Journal of Interpersonal Violence,
19,
pp.
468—83. 361
PART IV REGULATING CYBERCRIME
20
Neal Kumar Karyal
(2003),
Digital Architecture as Crime Control , Yale Law
Journal,
112,
pp.
2261-89. 379
21
Brace Berkowitz and Robert W.
Hahn (2003)
Cybersecurity: Who s Watching
the Store? , Issues in Science
&
Technology,
19,
pp.
55-62. 409
22
F. Gregory Lastowka and Dan Hunter
(2005),
Virtual Crimes , New York Law
School Law Review,
49,
pp.
293-316. 417
23
Ronald V. Clarke
(2004),
Technology, Criminology and Crime Science ,
European Journal on Criminal Policy and Research,
10,
pp.
55-63. 441
24
Sam McQuade
(2006),
Technology-enabled Crime, Policing and Security ,
Journal of Technology Studies,
32,
pp.
32-42. 451
25
G.T. Marx
(2001),
Technology and Social Control , International Encyclopedia
of the Social and Behavioral Sciences, pp.
15506-12. 463
Crime
and Deviance in Cyberspace
PART V POLICING AND PREVENTING CYBERCRIME
26
Kevin D. Haggerty and Amber Gazso
(2005),
Seeing Beyond the Ruins:
Surveillance as a Response to Terrorist Threats , Canadian Journal of Sociology,
30,
pp.
169-87. 473
27
Yvonne Jewkes and Carol Andrews
(2005),
Policing the Filth: The Problems
of Investigating Online Child Pornography in England and Wales , Policing and
Society,
15,
pp.
42-62. 493
28
Roderic Broadhurst
(2006)
Developments in the Global Law Enforcement
of Cyber-crime , Policing: An
Internationaljournal
of Police Strategies and
Management,
29,
pp.
408-33. 515
29
Peter
Sommer (2004),
The Future for the Policing of Cybercrime , Computer
Fraud
&
Security,
1,
pp.
8-12, 1
2a.
541
30
Peter Grabosky
(2007),
Requirements of Prosecution Services to Deal with
Cyber Crime , Crime, Law and Social Change,
47,
pp.
201-23. 547
31
Benoît Dupont
(2004),
Security in the Age of Networks , Policing and Society,
14,
pp.
76-91. 571
Name Index
587
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035271222 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)173807166 (DE-599)BVBBV035271222 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01899nam a2200505zc 4500</leader><controlfield tag="001">BV035271222</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120820 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090127s2009 xxkad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008030297</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780754624530</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-0-7546-2453-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)173807166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035271222</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Crime and deviance in cyberspace</subfield><subfield code="c">ed. by David S. Wall</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Aldershot, Hants, England</subfield><subfield code="b">Ashgate</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXX, 594 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">International library of criminology, criminal justice and penology : second series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique - Prévention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pornographie sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Deviant behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Social aspects</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wall, David S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017076586&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017076586</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035271222 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:30:06Z |
institution | BVB |
isbn | 9780754624530 |
language | English |
lccn | 2008030297 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017076586 |
oclc_num | 173807166 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM |
physical | XXX, 594 S. Ill., graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Ashgate |
record_format | marc |
series2 | International library of criminology, criminal justice and penology : second series |
spelling | Crime and deviance in cyberspace ed. by David S. Wall Aldershot, Hants, England Ashgate 2009 XXX, 594 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier International library of criminology, criminal justice and penology : second series Criminalité informatique Criminalité informatique - Prévention Pornographie sur Internet Sécurité informatique Gesellschaft Computer crimes Deviant behavior Internet Social aspects Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Prävention (DE-588)4076308-0 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Internetkriminalität (DE-588)7864395-8 s Prävention (DE-588)4076308-0 s b DE-604 Wall, David S. Sonstige oth Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017076586&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Crime and deviance in cyberspace Criminalité informatique Criminalité informatique - Prévention Pornographie sur Internet Sécurité informatique Gesellschaft Computer crimes Deviant behavior Internet Social aspects Internetkriminalität (DE-588)7864395-8 gnd Prävention (DE-588)4076308-0 gnd |
subject_GND | (DE-588)7864395-8 (DE-588)4076308-0 (DE-588)4143413-4 |
title | Crime and deviance in cyberspace |
title_auth | Crime and deviance in cyberspace |
title_exact_search | Crime and deviance in cyberspace |
title_full | Crime and deviance in cyberspace ed. by David S. Wall |
title_fullStr | Crime and deviance in cyberspace ed. by David S. Wall |
title_full_unstemmed | Crime and deviance in cyberspace ed. by David S. Wall |
title_short | Crime and deviance in cyberspace |
title_sort | crime and deviance in cyberspace |
topic | Criminalité informatique Criminalité informatique - Prévention Pornographie sur Internet Sécurité informatique Gesellschaft Computer crimes Deviant behavior Internet Social aspects Internetkriminalität (DE-588)7864395-8 gnd Prävention (DE-588)4076308-0 gnd |
topic_facet | Criminalité informatique Criminalité informatique - Prévention Pornographie sur Internet Sécurité informatique Gesellschaft Computer crimes Deviant behavior Internet Social aspects Internetkriminalität Prävention Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017076586&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT walldavids crimeanddevianceincyberspace |