Crime On-line

Crime On-line

Correlates, Causes, and Context

Book - 2011
Rate this:
The ubiquity of computers and the Internet have drastically changed the landscape of crime and deviance. Computer technology enables offenders to anonymously target victims around the world, connect with others who share their interests, and participate in various crimes. The Internet and cellular telephony are increasingly incorporated into real world offenses like prostitution in order to connect sex workers and clients with minimal risk of detection. At the same time, new forms of offending have emerged as a direct consequence of technology, such as computer hacking, which can be used for both beneficial and illegal purposes. The Internet has also become an important environment for extremists and terror groups to communicate their beliefs globally in order to recruit others and generate funds. In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime On-Line provides detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes using empirical tests and unique data. This text also includes a comprehensive exploration of cyberterrorism and activism in on-line environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level. Specifically, the second edition includes updated sections on child pornography, cyberbullying, and cyberterrorism. There are also four new chapters by well known authors in the field including: (1) A qualitative exploration of the computer hacker subculture (2) A content analysis of spam based work at home schemes (3) An assessment of the tactics employed to combat music piracy over the last two decades (4) A exploration of vulnerabilities in and attacks against SCADA systems and critical infrastructure on-line These revisions expand the scope of the second edition and make it an extremely valuable text for cybercrime scholars and students alike.
Publisher: Durham, N.C. : Carolina Academic Press, c2011.
ISBN: 9781594607813
1594607818
Branch Call Number: 364.168/CRIME
Characteristics: xiii, 254 p. : ill. ; 23 cm.
Additional Contributors: Holt, Thomas J. 1978-

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at SDPL

  Loading...
[]
[]
To Top