当前位置:首页 > 其他书籍
Crime and Deviance in Cyberspace
Crime and Deviance in Cyberspace

Crime and Deviance in CyberspacePDF电子书下载

其他书籍

  • 电子书积分:17 积分如何计算积分?
  • 作 者:Mars
  • 出 版 社:Limited;Bookpoint Limited [Distributor]
  • 出版年份:2009
  • ISBN:
  • 页数:594 页
图书介绍:
《Crime and Deviance in Cyberspace》目录
标签:

PART Ⅰ DEVELOPMENTS IN THINKING ABOUT CYBERCRIMES 3

1 Majid Yar (2005) 'The Novelty of"Cybercrime": An Assessment in Light of Routine Activity Theory', European Journal of Criminology, 2, pp. 407-27. 3

2 Sheila Brown (2006), 'The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks', Theoretical Criminology, 10, pp. 223-44. 25

PART Ⅱ CHANGES IN THE ORGANIZATION OF CRIME ONLINE 49

3 Susan W. Brenner (2002), 'Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships', North Carolina Journal of Law and Technology, 4, pp. 1-50. 49

4 David S. Wall (2005), 'Digital Realism and the Governance of Spam as Cybercrime', European Journal on Criminal Policy and Research, 10, pp. 309-35. 99

5 Sandy Starr (2004), 'Can the Law Can Spam? Legislation is a Blunt Instrument with Which to Beat Junk Email', Spiked, April, pp. 1-4. 127

6 Sandy Starr (2004), 'Can Technology Can Spare? IT Companies Do Battle with Bulk Email', Spiked, May, pp. 1-5. 133

7 Lorine A. Hughes and Gregory J. DeLone (2007), 'Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?', Social Science Computer Review, 25, pp. 78-98. 137

8 David S. Wall and Matthew Williams (2007), 'Policing Diversity in the Digital Age: Maintaining Order in Virtual Communities', Criminology and Criminal Justice, 7, pp. 391-415. 159

PART Ⅲ THE CHANGING NATURE OF CYBERCRIME 189

Computer Integrity Crime 189

9 Helen Nissenbaum (2004), 'Hackers and the Contested Ontology of Cyberspace', New Media&Society, 6, pp. 195-217. 189

10 Briavel Holcomb, Philip B. Bakelaar and Mark Zizzamia (2003), 'The Internet in the Aftermath of the World Trade Center Attack', Journal of Urban Technology, 10, pp. 111-28. 213

Computer-assisted Crime 233

11 Gregor Urbas (2006), 'Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of"Operation Buccaneer"', Crime, Law antisocial Change, 46, pp. 207-21. 233

12 Bert-Jaap Koops and Ronald Leenes (2006), 'Identity Theft, Identity Fraud, and/ or Identity-related Crime. Definitions Matter', Datenshutz und Datensicherheit, 30, pp. 553-56. 249

Computer Content Crime 255

13 Tony Krone (2005), 'International Police Operations Against Online Child Pornography', Crime and Justice International, 21, pp. 11-20. 255

14 Barbara Hewson (2003), 'Fetishising Images', Spiked, January, pp. 1-8. 265

15 Jonathan Clough (2008), 'Now you See it, Now you Don't: Digital Images and the Meaning of"Possession"', Criminal Law Forum, 19, pp. 205-39. 273

16 Francesca Philips and Gabrielle Morrissey (2004), 'Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet', Convergence, 10, pp. 66-79. 309

17 Giselinde Kuipers (2006), 'The Social Construction of Digital Danger: Debating, Defusing and Inflating the Moral Dangers of Online Humor and Pornography in the Netherlands and the United States', New Media&Society, 8, pp. 379-400. 323

18 Jacqueline L. Schneider (2003), 'Hiding in Plain Sight: An Exploration of the Illegal(?) Activities of a Drugs Newsgroup', Howarddournal of Criminal Justice, 42, pp. 374-89. 345

19 Jerry Finn (2004), 'A Survey of Online Harassment at a University Campus', Journal of Interpersonal Violence, 19, pp. 468-83. 361

PART Ⅳ REGULATING CYBERCRIME 379

20 Neal Kumar Katyal (2003), 'Digital Architecture as Crime Control', Yale Law Journal, 112, pp. 2261-89. 379

21 Bruce Berkowitz and Robert W. Hahn (2003) 'Cybersecurity: Who's Watching the Store?', Issues in Science&Technology, 19, pp. 55-62. 409

22 F. Gregory Lastowka and Dan Hunter (2005), 'Virtual Crimes', New York Law School Law Review, 49, pp. 293-316. 417

23 Ronald V. Clarke (2004), 'Technology, Criminology and Crime Science', European Journal on Criminal Policy and Research, 10, pp. 55-63. 441

24 Sam McQuade (2006), 'Technology-enabled Crime, Policing and Security', Journal of Technology Studies, 32, pp. 32-42. 451

25 G.T. Marx (2001), 'Technology and Social Control', International Encyclopedia of the Social and Behavioral Sciences, pp. 15506-12. 463

PART Ⅴ POLICING AND PREVENTING CYBERCRIME 473

26 Kevin D. Haggerty and Amber Gazso (2005), 'Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats', Canadian Journal of Sociology, 30, pp. 169-87. 473

27 Yvonne Jewkes and Carol Andrews (2005), 'Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales', Policing and Society, 15, pp. 42-62. 493

28 Roderic Broadhurst (2006) 'Developments in the Global Law Enforcement of Cyber-crime', Policing: A n International Journal of Police Strategies and Management, 29, pp. 408-33. 515

29 Peter Sommer (2004), 'The Future for the Policing of Cybercrime', Computer Fraud&Security, 1, pp. 8-12, 12a. 541

30 Peter Grabosky (2007), 'Requirements of Prosecution Services to Deal with Cyber Crime', Crime, Law andSocial Change, 47, pp. 201-23. 547

31 Benoit Dupont (2004), 'Security in the Age of Networks', Policing and Society, 14, pp. 76-91. 571

Name Index 587

返回顶部