Section Ⅰ DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE 3
1 Cafe Culture and Heresy of Yahooboyism in Nigeria&ADEBUSUYII. ADENIRAN 3
2 Internet Gambling&HENRY N. PONTELL, GILBERT GEIS, AND GREGORY C. BROWN 13
Section Ⅱ PERPETRATORS' PERSPECTIVES AND OFFENDER USE OF THE INTERNET 31
3 Identity Construction Among Hackers&ORLY TURGEMAN-GOLDSCHMIDT 31
4 Virtual Sex Offenders: A Clinical Perspective&KIMBERLY YOUNG 53
5 Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism&KATHRYN C. SEIGFRIED-SPELLAR, RICHARD W.LOVELY, AND MARCUS K. ROGERS 65
6 Online Social Networking and Pedophilia: An Experimental Research "Sting"&RODERIC BROADHURST AND KASUN JAYAWARDENA 79
7 Adult-Child Sex Advocacy Websites as Learning Environments for Crime&ROB D'OVIDIO, TYSON MITMAN, IMAANI JAMILLAH EL-BURKI, AND WESLEY SHUMAR 103
8 The Internet as a Terrorist's Tool: A Social Learning Perspective&TINA FREIBURGER AND JEFFREY S. CRANE 127
Section Ⅲ DIGITAL PIRACY 141
9 Value and Choice: Examining Their Roles in Digital Piracy&GEORGE E. HIGGINS 141
10 Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users&MICHAEL BACHMANN 155
11 Criminological Predictors of Digital Piracy: A Path Analysis&WHITNEY D. GUNTER 173
12 Change of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data&GEORGE E. HIGGINS, SCOTT E. WOLFE, AND CATHERINE D. MARCUM 193
13 Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers&ROBERT MOORE 209
Section Ⅳ CYBER VICTIMIZATION 229
14 Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization&KYUNG-SHICK CHOI 229
15 Adolescent Online Victimization and Constructs of Routine Activities Theory&CATHERINE D. MARCUM 253
16 Cyber Stalking: Typology, Etiology, and Victims&MICHAEL L. PITTARO 277
17 Online Social Networking and Women Victims&DEBARATI HALDER AND K. JAISHANKAR 299
18 Malware Victimization: A Routine Activities Framework&ADAM M. BOSSLER AND THOMAS J. HOLT 317
Section Ⅴ LEGAL AND POLICY ISSUES OF CYBER CRIMES 347
19 Fatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism?&ALAELDIN MANSOUR MAGHAIREH 347
20 Cyber Bullying: Legal Obligations and Educational Policy Vacuum&SHAHEEN SHARIFF AND DIANNE L. HOFF 357
21 Human Rights Infringement in the Digital Age&RUSSELL G. SMITH 393
Conclusion&K. JAISHANKAR 411
Index 415