Crime and Deviance in CyberspacePDF电子书下载
- 电子书积分:17 积分如何计算积分?
- 作 者:Mars
- 出 版 社:Limited;Bookpoint Limited [Distributor]
- 出版年份:2009
- ISBN:
- 页数:594 页
PART Ⅰ DEVELOPMENTS IN THINKING ABOUT CYBERCRIMES 3
1 Majid Yar (2005) 'The Novelty of"Cybercrime": An Assessment in Light of Routine Activity Theory', European Journal of Criminology, 2, pp. 407-27. 3
2 Sheila Brown (2006), 'The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks', Theoretical Criminology, 10, pp. 223-44. 25
PART Ⅱ CHANGES IN THE ORGANIZATION OF CRIME ONLINE 49
3 Susan W. Brenner (2002), 'Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships', North Carolina Journal of Law and Technology, 4, pp. 1-50. 49
4 David S. Wall (2005), 'Digital Realism and the Governance of Spam as Cybercrime', European Journal on Criminal Policy and Research, 10, pp. 309-35. 99
5 Sandy Starr (2004), 'Can the Law Can Spam? Legislation is a Blunt Instrument with Which to Beat Junk Email', Spiked, April, pp. 1-4. 127
6 Sandy Starr (2004), 'Can Technology Can Spare? IT Companies Do Battle with Bulk Email', Spiked, May, pp. 1-5. 133
7 Lorine A. Hughes and Gregory J. DeLone (2007), 'Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?', Social Science Computer Review, 25, pp. 78-98. 137
8 David S. Wall and Matthew Williams (2007), 'Policing Diversity in the Digital Age: Maintaining Order in Virtual Communities', Criminology and Criminal Justice, 7, pp. 391-415. 159
PART Ⅲ THE CHANGING NATURE OF CYBERCRIME 189
Computer Integrity Crime 189
9 Helen Nissenbaum (2004), 'Hackers and the Contested Ontology of Cyberspace', New Media&Society, 6, pp. 195-217. 189
10 Briavel Holcomb, Philip B. Bakelaar and Mark Zizzamia (2003), 'The Internet in the Aftermath of the World Trade Center Attack', Journal of Urban Technology, 10, pp. 111-28. 213
Computer-assisted Crime 233
11 Gregor Urbas (2006), 'Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of"Operation Buccaneer"', Crime, Law antisocial Change, 46, pp. 207-21. 233
12 Bert-Jaap Koops and Ronald Leenes (2006), 'Identity Theft, Identity Fraud, and/ or Identity-related Crime. Definitions Matter', Datenshutz und Datensicherheit, 30, pp. 553-56. 249
Computer Content Crime 255
13 Tony Krone (2005), 'International Police Operations Against Online Child Pornography', Crime and Justice International, 21, pp. 11-20. 255
14 Barbara Hewson (2003), 'Fetishising Images', Spiked, January, pp. 1-8. 265
15 Jonathan Clough (2008), 'Now you See it, Now you Don't: Digital Images and the Meaning of"Possession"', Criminal Law Forum, 19, pp. 205-39. 273
16 Francesca Philips and Gabrielle Morrissey (2004), 'Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet', Convergence, 10, pp. 66-79. 309
17 Giselinde Kuipers (2006), 'The Social Construction of Digital Danger: Debating, Defusing and Inflating the Moral Dangers of Online Humor and Pornography in the Netherlands and the United States', New Media&Society, 8, pp. 379-400. 323
18 Jacqueline L. Schneider (2003), 'Hiding in Plain Sight: An Exploration of the Illegal(?) Activities of a Drugs Newsgroup', Howarddournal of Criminal Justice, 42, pp. 374-89. 345
19 Jerry Finn (2004), 'A Survey of Online Harassment at a University Campus', Journal of Interpersonal Violence, 19, pp. 468-83. 361
PART Ⅳ REGULATING CYBERCRIME 379
20 Neal Kumar Katyal (2003), 'Digital Architecture as Crime Control', Yale Law Journal, 112, pp. 2261-89. 379
21 Bruce Berkowitz and Robert W. Hahn (2003) 'Cybersecurity: Who's Watching the Store?', Issues in Science&Technology, 19, pp. 55-62. 409
22 F. Gregory Lastowka and Dan Hunter (2005), 'Virtual Crimes', New York Law School Law Review, 49, pp. 293-316. 417
23 Ronald V. Clarke (2004), 'Technology, Criminology and Crime Science', European Journal on Criminal Policy and Research, 10, pp. 55-63. 441
24 Sam McQuade (2006), 'Technology-enabled Crime, Policing and Security', Journal of Technology Studies, 32, pp. 32-42. 451
25 G.T. Marx (2001), 'Technology and Social Control', International Encyclopedia of the Social and Behavioral Sciences, pp. 15506-12. 463
PART Ⅴ POLICING AND PREVENTING CYBERCRIME 473
26 Kevin D. Haggerty and Amber Gazso (2005), 'Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats', Canadian Journal of Sociology, 30, pp. 169-87. 473
27 Yvonne Jewkes and Carol Andrews (2005), 'Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales', Policing and Society, 15, pp. 42-62. 493
28 Roderic Broadhurst (2006) 'Developments in the Global Law Enforcement of Cyber-crime', Policing: A n International Journal of Police Strategies and Management, 29, pp. 408-33. 515
29 Peter Sommer (2004), 'The Future for the Policing of Cybercrime', Computer Fraud&Security, 1, pp. 8-12, 12a. 541
30 Peter Grabosky (2007), 'Requirements of Prosecution Services to Deal with Cyber Crime', Crime, Law andSocial Change, 47, pp. 201-23. 547
31 Benoit Dupont (2004), 'Security in the Age of Networks', Policing and Society, 14, pp. 76-91. 571
Name Index 587
- 《药草之后蒲公英》布姬特·马尔斯(Brigitte Mars)著;江丰明译 2005
- 《INTRODUCTION TO PHYSICAL EDUCATION》HANS VAN DER MARS 2012
- 《Crime and Deviance in Cyberspace》Mars 2009
- 《ADVANCES IN CORROSION SCIENCE AND TECHNOLOGY VOLUME 5》MARS G.FONTANA AND ROGER W.STAEHLE 1976
- 《莫里哀戏剧故事集》(法)诺尔曼(J.ch. Normand),(法)马尔斯(A.Mars)改写 李桐实,金志平译 1958
- 《Complete Guide to Spor Education》Daryl Siedentop Peter A.Hastie Hans van der Mars 2222
- 《GERMAN LAW PERTAINING TO COMPANIES WITH LIMITED LIABILITY》 1981
- 《ECOLOGICAL EMERGY ACCOUNTING FOR A LIMITED SYSTEM: GENERAL PRINCIPLES AND A CASE STUDY OF MACAO=有限系统》Kampeng Lei 2014
- 《Limited Budget》 1998
- 《DESIGN IDEAS WITH LIMITED COLOR》 2004
- 《CASES AND MATERIALS ON CORPORATIONS INCLUDING PARTNERSHIPS AND LIMITED LIABILITY COMPANIES ELEVENTH》ROBERT W.HAMILTON 2010
- 《CHILDREN WITH LIMITED ENGLISH:TEACHING STRATEGIES FOR THE REGULAR CLASSROOM》ELLEN KOTTLER 1994
- 《LIMITED LIABILITY COMPANIES FORMATION》OPERATION 2001
- 《LIMITED LIABILITY COMPANIES FORMATION,OPERATION,AND CONVERSION THIRD EDITION》ROBERT W.WOOD 2010
- 《LIMITED LIABILITY COMPANIES:A COMMON CORE MODEL OF FIDUCIARY DUTIES》SANDRA K.MILLER 2011
- 《GOVERNANCE WITHOUT A STATE? POLICIES AND POLITICS IN AREAS OF LIMITED STATEHOOD》THOMAS RISSE 2011