Cybercrime and society:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Los Angeles ; London ; New Delhi ; Singapore ; Washingthon DC ; Melbourne
Sage
2019
|
Ausgabe: | Third Edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Auf dem Umschlag: Online resources |
Beschreibung: | x, 350 Seiten Illustrationen |
ISBN: | 9781526440655 9781526440648 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV045574392 | ||
003 | DE-604 | ||
005 | 20190527 | ||
007 | t | ||
008 | 190426s2019 a||| |||| 00||| eng d | ||
020 | |a 9781526440655 |c pbk |9 978-1-5264-4065-5 | ||
020 | |a 9781526440648 |c hbk |9 978-1-5264-4064-8 | ||
035 | |a (OCoLC)1103477503 | ||
035 | |a (DE-599)KXP1663175772 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-824 |a DE-19 |a DE-898 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.168 |2 23 | |
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |a 05.38 |2 bkl | ||
084 | |a 86.41 |2 bkl | ||
100 | 1 | |a Yar, Majid |e Verfasser |0 (DE-588)1035577704 |4 aut | |
245 | 1 | 0 | |a Cybercrime and society |c Majid Yar, Kevin F. Steinmetz |
250 | |a Third Edition | ||
264 | 1 | |a Los Angeles ; London ; New Delhi ; Singapore ; Washingthon DC ; Melbourne |b Sage |c 2019 | |
300 | |a x, 350 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Auf dem Umschlag: Online resources | ||
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer crimes | |
653 | 0 | |a Computer crimes | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Steinmetz, Kevin F. |e Verfasser |0 (DE-588)1123654239 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030957957 |
Datensatz im Suchindex
_version_ | 1804179565381156864 |
---|---|
adam_text | About the Authors Preface to the Third Edition Acknowledgements Online Resources xi xiii xv xvii 1 Cybercrime and the Internet: An Introduction 1.1 Perceptions of cybercrime 1.2 Cybercrime: Questions and answers 1.3 A brief history and analysis of the internet 1.4 Defining and classifying cybercrime 1.5 What’s ‘new’ about cybercrime? 1.6 Explaining cybercrime 1.7 Challenges for criminal justice and policing 1.8 Summary Study questions Further reading 1 3 5 7 10 13 15 16 19 20 20 2 Researching and Theorizing Cybercrime 2.1 Studying cybercrime 2.2 Criminological theory 2.3 Researching cybercrime 2.4 Summary Study questions Further reading 21 23 23 41 48 49 49 3 Hackers, Crackers and Viral Coders 3.1 Hackers and hacking: Contested definitions 3.2 Representations of hackers and hacking: Technological fears and fantasies 3.3 What hackers actually do: A brief guide for the technologically bewildered 3.4 Hacker myths and realities: Wizards or button-pushers? 3.5 ‘Why do they do it?’ Motivation, psychology, gender and youth 51 53 55 58 64 67
viii CONTENTS 3.6 Hacking and the law: Legislative innovations and responses 3.7 Summary Study questions Further reading 73 78 78 78 4 Political Hacking: From Hacktivism to Cyberterrorism 4.1 Introduction 4.2 Hacktivism and the politics of resistance in a globalized world 4.3 The spectre of cyberterrorism 4.4 Why cyberterror? Terrorist advantages of utilizing internet attacks 4.5 Rhetorics and myths of cyberterrorism 4.6 Alternative conjunctions between terrorism and the internet 4.7 Cyberwarfare 4.8 Summary Study questions Further reading 81 83 84 88 93 94 97 100 102 103 104 5 Virtual ‘Pirates’: Intellectual Property Theft Online 5.1 Introduction 5.2 Intellectual property, copyright and piracy: An overview 5.3 Scope and scale of piracy activity 5.4 The history and growth of internet piracy 5.5 Who are the ‘pirates’? 5.6 The development of anti-piracy initiatives 5.7 Thinking critically about piracy statistics 5.8 Thinking critically about intellectual property rights 5.9 Summary Study questions Further reading 105 107 107 109 111 114 117 121 123 125 126 126 6 Cyber-frauds, Scams and Cons 6.1 Introduction 6.2 Scope and scale of online fraud 6.3 Varieties of online fraud 6.4 Online fraud: Perpetrators’ advantages and criminal justice’s problems 6.5 Strategies for policing and combating internet frauds 6.6 Summary Study questions Further reading 127 129 129 131 142 145 147 148 148 7 Illegal, Harmful and Offensive Content Online: From Hate Speech to ‘the Dangers’ of Pornography 7.1 Introduction 7.2 Thinking about‘hate speech’ 151 153 153
CONTENTS 7.3 Hate speech online 7.4 Legal, policing and political challenges in tackling online hate speech 7.5 The growth and popularity of internet pornography 7.6 Legal issues relating to internet pornography 7.7 Summary Study questions Further reading 155 159 163 164 171 171 172 8 Child Pornography and Child Sex Abuse Imagery 8.1 Introduction 8.2 Child pornography and the internet: Images, victims and offenders 8.3 Legislative and policing measures to combat online child pornography 8.4 Legal and policing challenges in tackling child pornography 8.5 The controversy over virtual child pornography and ‘jailbaiť images 8.6 Summary Study questions Further reading 173 175 175 180 183 186 189 189 190 9 The Victimization of Individuals Online: Cyberstalking and Paedophilia 9.1 Introduction 9.2 The emergence of stalking as a crime problem 9.3 Cyberstalking 9.4 Online paedophilia 9.5 Thinking critically about online victimization: Stalking and paedophilia as moral panics? 9.6 Summary Study questions Further reading 191 193 193 197 206 210 213 213 214 10 Policing the Internet 10.1 Introduction 10.2 Public policing and the cybercrime problem 10.3 Pluralized policing: The involvement of quasi-state and non-state actors in policing the internet 10.4 Privatized ‘for-proňť cybercrime policing 10.5 Explaining the pluralization and privatization of internet policing 10.6 Critical issues about private policing of the internet 10.7 Summary Study questions Further reading 215 217 217 11 233 235 236 Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control 11.1 Introduction
11.2 From surveillance to dataveillance: The rise of the electronic web 222 227 228 230 231 232 232 ¡x
x CONTENTS 11.3 The development of internet surveillance 11.4 The dilemmas of surveillance as crime control: The case of encryption 11.5 Summary Study questions Further reading 12 Conclusion: Looking Toward the Future of Cybercrime 12.1 Introduction 12.2 Future directions in cybercrime 12.3 Considerations for civil liberties 12.4 Concluding thoughts Study questions Further reading Glossary References Index 237 246 250 251 251 253 255 255 258 261 261 262 263 273 339
byliv About the Authors Preface to the Third Edition Acknowledgements Online Resources xi xiii xv xvii 1 Cybercrime and the Internet: An Introduction 1.1 Perceptions of cybercrime 1.2 Cybercrime: Questions and answers 1.3 A brief history and analysis of the internet 1.4 Defining and classifying cybercrime 1.5 Whats ‘new’ about cybercrime? 1.6 Explaining cybercrime 1.7 Challenges for criminal justice and policing 1.8 Summary Study questions Further reading 1 3 5 7 10 13 15 16 19 20 20 2 Researching and Theorizing Cybercrime 2.1 Studying cybercrime 2.2 Criminological theory 2.3 Researching cybercrime 2.4 Summary Study questions Further reading 21 23 23 41 48 49 49 3 Hackers, Crackers and Viral Coders 3.1 Hackers and hacking: Contested definitions 3.2 Representations of hackers and hacking: Technological fears and fantasies 3.3 What hackers actually do: A brief guide for the technologically bewildered 3.4 Hacker myths and realities: Wizards or button-pushers? 3.5 ‘Why do they do it?’ Motivation, psychology, gender and youth 51 53 55 58 64 67
viii CONTENTS 3.6 Hacking and the law: Legislative innovations and responses 3.7 Summary Study questions Further reading 4 Political Hacking: From Hacktivism to Cyberterrorism 4.1 Introduction 4.2 Hacktivism and the politics of resistance in a globalized world 4.3 The spectre of cyberterrorism 4.4 Why cyberterror? Terrorist advantages of utilizing internet attacks 4.5 Rhetorics and myths of cyberterrorism 4.6 Alternative conjunctions between terrorismand the internet 4.7 Cyberwarfare 4.8 Summary Study questions Further reading 5 Virtual ‘Pirates’: Intellectual Property Theft Online 5.1 Introduction 5.2 Intellectual property, copyright and piracy: Anoverview 5.3 Scope and scale of piracy activity 5.4 The history and growth of internet piracy 5.5 Who are the pirates’? 5.6 The development of anti-piracy initiatives 5.7 Thinking critically about piracy statistics 5.8 Thinking critically about intellectual property rights 5.9 Summary Study questions Further reading 6 Cyber-frauds, Scams and Cons 6.1 Introduction 6.2 Scope and scale of online fraud 6.3 Varieties of online fraud 6.4 Online fraud: Perpetrators’ advantages and criminal justice’s problems 6.5 Strategies for policing and combating internet frauds 6.6 Summary Study questions Further reading 7 Illegal, Harmful and Offensive Content Online: From Hate Speech to ‘the Dangers’ of Pornography 7.1 Introduction 7.2 Thinking about‘hate speech’ 73 78 78 78 81 83 84 88 93 94 97 100 102 103 104 105 107 107 Ю9 111 114 117 121 123 123 126 126 122 129 129 131 142 145 147 148 148 151 153 153
CONTENTS 7.3 Hate speech online 7.4 Legal, policing and political challenges in tackling online hate speech 7.5 The growth and popularity of internet pornography 7.6 Legal issues relating to internet pornography 7.7 Summary Study questions Further reading 155 159 163 164 171 171 172 8 Child Pornography and Child Sex Abuse Imagery 8.1 Introduction 8.2 Child pornography and the internet: Images, victims and offenders 8.3 Legislative and policing measures to combat online child pornography 8.4 Legal and policing challenges in tackling child pornography 8.5 The controversy over virtual child pornography and ‘jailbaiť images 8.6 Summary Study questions Further reading 173 175 175 180 183 186 189 189 !90 9 The Victimization of Individuals Online: Cyberstalking and Paedophilia 9.1 Introduction 9.2 The emergence of stalking as a crime problem 9.3 Cyberstalking 9.4 Online paedophilia 9.5 Thinking critically about online victimization: Stalking and paedophilia as moral panics? 9.6 Summary Study questions Further reading 191 193 193 197 206 10 Policing the Internet 10.1 Introduction 10.2 Public policing and the cybercrime problem 10.3 Pluralized policing: The involvement of quasi-state and non-state actors in policing the internet 10.4 Privatized ‘for-profiť cybercrime policing 10.5 Explaining the pluralization and privatization of internet policing 10.6 Critical issues about private policing of the internet 10.7 Summary Study questions Further reading 11 Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control 11.1 Introduction 11.2 From surveillance to dataveillance:
The rise of the electronic web 210 213 213 214 215 217 217 222 227 228 230 231 232 232 233 235 236 ix
x CONTENTS 11.3 The development of internet surveillance 11.4 The dilemmas of surveillance as crime control: The case of encryption 11.5 Summary Study questions Further reading 12 Conclusion: Looking Toward the Future of Cybercrime 12.1 Introduction 12.2 Future directions in cybercrime 12.3 Considerations for civil liberties 12.4 Concluding thoughts Study questions Further reading Glossary References Index 237 246 250 251 251 253 255 255 258 261 261 262 263 273 339
|
any_adam_object | 1 |
author | Yar, Majid Steinmetz, Kevin F. |
author_GND | (DE-588)1035577704 (DE-588)1123654239 |
author_facet | Yar, Majid Steinmetz, Kevin F. |
author_role | aut aut |
author_sort | Yar, Majid |
author_variant | m y my k f s kf kfs |
building | Verbundindex |
bvnumber | BV045574392 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | SR 850 PZ 3700 |
ctrlnum | (OCoLC)1103477503 (DE-599)KXP1663175772 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik |
edition | Third Edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02005nam a22004578c 4500</leader><controlfield tag="001">BV045574392</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190527 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190426s2019 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781526440655</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-5264-4065-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781526440648</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-5264-4064-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1103477503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1663175772</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">05.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.41</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yar, Majid</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1035577704</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrime and society</subfield><subfield code="c">Majid Yar, Kevin F. Steinmetz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third Edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Los Angeles ; London ; New Delhi ; Singapore ; Washingthon DC ; Melbourne</subfield><subfield code="b">Sage</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 350 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Umschlag: Online resources</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Steinmetz, Kevin F.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1123654239</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030957957</subfield></datafield></record></collection> |
id | DE-604.BV045574392 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:21:53Z |
institution | BVB |
isbn | 9781526440655 9781526440648 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030957957 |
oclc_num | 1103477503 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-824 DE-19 DE-BY-UBM DE-898 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR DE-824 DE-19 DE-BY-UBM DE-898 DE-BY-UBR |
physical | x, 350 Seiten Illustrationen |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Sage |
record_format | marc |
spelling | Yar, Majid Verfasser (DE-588)1035577704 aut Cybercrime and society Majid Yar, Kevin F. Steinmetz Third Edition Los Angeles ; London ; New Delhi ; Singapore ; Washingthon DC ; Melbourne Sage 2019 x, 350 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Auf dem Umschlag: Online resources Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Computer crimes Internetkriminalität (DE-588)7864395-8 s DE-604 Steinmetz, Kevin F. Verfasser (DE-588)1123654239 aut Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Yar, Majid Steinmetz, Kevin F. Cybercrime and society Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)7864395-8 |
title | Cybercrime and society |
title_auth | Cybercrime and society |
title_exact_search | Cybercrime and society |
title_full | Cybercrime and society Majid Yar, Kevin F. Steinmetz |
title_fullStr | Cybercrime and society Majid Yar, Kevin F. Steinmetz |
title_full_unstemmed | Cybercrime and society Majid Yar, Kevin F. Steinmetz |
title_short | Cybercrime and society |
title_sort | cybercrime and society |
topic | Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Internetkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030957957&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yarmajid cybercrimeandsociety AT steinmetzkevinf cybercrimeandsociety |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis