Cybercriminology
Cybercriminology
Click to enlarge
Author(s): Maras, Maire-Helen
Maras, Marie-Helen
ISBN No.: 9780190278441
Pages: 448
Year: 201611
Format: Trade Paper
Price: $ 200.10
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface: PART 1. THE NATURE AND EXTENT OF CYBERCRIMEChapter 1. Cybercrime and Cybercriminals: The Development of Cybercriminology1. Cybercrime: The Basics2. Cybercrime CategoriesA. Cybertrespass and CybervandalismB. CybertheftC. Interpersonal CybercrimeD.


Cyberdeviance and Public Order CybercrimesE. Organized CybercrimeF. Political Cybercrime3. The Field of Cybercriminology4. Case Study5. Review Questions6. Laws7. Definitions8.


EndnotesChapter 2. Measuring Cybercrime1. Uniform Crime Reporting Program2. National Incident Based Reporting SystemA. Underreporting of Cybercrime3. National Crime Victimization SurveyA. Other National Victimization Surveys4. Self-Report Survey5.


National Computer Security SurveyA. Other Business Surveys6. International Measurements of Cybercrime7. Case Study8. Review Questions9. Laws10. Definitions11. EndnotesChapter 3.


Cybervictimization1. Being a Cybervictim and All That it EntailsA. The Profile of a Cybervictim2. Victimization TheoriesA. Victim Precipitation TheoryB. Lifestyle Exposure TheoryC. Routine Activities Theory3. Case Study4.


Review Questions5. Laws6. Definitions7. EndnotesPART 2. CYBERCRIME CAUSATION AND REDUCTIONChapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and Reduction of Cyberoffending1. The Reasoning Cybercriminal2. Seductions and Repulsions of Cybercrime3.


Punishing CybercriminalsA. Retributive Perspectivei. Cybercriminals Getting their "Just Deserts"B. Utilitarian Perspectivei. Incapacitation and RehabilitationC. Deterrence4. Reducing CybercrimeA. Cybercrime LawsB.


Cybercrime EnforcementC. Situational Crime Prevention5. Case Study6. Review Questions7. Laws8. Definitions9. EndnotesChapter 5. Cybercrime and the Propensity to Offend1.


The Positivist School and Trait TheoriesA. Cybercriminals: Born That Wayi. Physiological Characteristicsii. Brain Abnormalitiesiii. Hormones2. The Intelligence of Cybercriminals and Psychology of Cybercrime: The New PositivistsA. IntelligenceB. Mental DisordersC.


Personality TheoriesD. Psychoanalytical TheoriesE. Attachment Theory3. Internet Addiction and CybercrimeA. Measuring Internet AddictionB. Treatment4. Case Study5. Review Questions6.


Laws7. Definitions8. EndnotesChapter 6. Cybercrime, Culture, and Inequality1. Chicago School of CriminologyA. Social Disorganization Theoryi. Social Capital and Collective Efficacya. Cyberspace: Applying the Broken Windows Theory2.


Anomie Theory3. Institutional Anomie Theory4. Relative Deprivation Theory5. A General Strain Theory of Cybercrime6. Cultural Deviance TheoriesA. Delinquent Subculture TheoryB. Differential Opportunity Theoryi. Subcultures in the Virtual Environment7.


Case Study8. Review Questions9. Laws10. Definitions11. EndnotesChapter 7. Conformity, Learning, and Sources of Social Control1. Controlling Cybercriminality2. Learning Cybercriminality3.


Neutralizing CyberoffensesA. Moral Disengagementi. Disinhibition, Deindividuation, and Anonymity4. Developmental and Life Course CybercriminologyA. Latent Trait Perspectivei. A General Theory of CybercrimeB. Life Course Perspective5. Case Study6.


Review Questions7. Laws8. Definitions9. EndnotesChapter 8. Constructing and Reacting to Cybercrime: Labels and Moral Panics1. Labeling CybercriminalsA. Shaming, Censorship, and Defiance2. Cybercriminals as the "Others"A.


Moral Panicsi. The Internet Gaming Moral Panic3. Case Study4. Review Questions5. Laws6. Definitions7. EndnotesChapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender1.


Marxist Criminology2. Left Realism3. Peacemaking Criminology4. Feminist CriminologyA. Variations in Cybercriminality: Mind the Gender GapB. Cyberfeminism5. #GamerGate6. Case Study7.


Review Questions8. Laws9. Definitions10. EndnotesPART 3. CYBERCRIME TYPOLOGIESChapter 10. Interpersonal Cybercrime1. Internet Trolls2. CyberstalkingA.


Criminalizing and Responding to Cyberstalking3. CyberharassmentA. Criminalizing and Responding to CyberharassmentB. Revenge Porn as Cyberharassment4. CyberbullyingA. Criminalizing and Responding to Cyberbullying5. Sextortion6. Online Child Sexual PredationA.


Online Child GroomingB. Criminalizing and Responding to Internet Sex Offenders and Child Pornography7. Sexting8. Controlling Interpersonal Cybercrime9. Case Study10. Review Questions11. Laws12. Definitions13.


EndnotesChapter 11. Cybertrespass, Cybervandalism, and Cybertheft1. Cybertrespass and CybervandalismA. HackingB. MalwareC. Denial of Service and Distributed Denial of Service AttacksD. Website Defacement2. CybertheftA.


Cyberidentity thefti. Data Breachesii. Medical Identity Theftiii. Internet of ThingsB. Intellectual Property Theft3. Controlling Cybertrespass, Cybervandalism, and Cybertheft4. Case Study5. Review Questions6.


Laws7. Definitions8. EndnotesChapter 12. Deviant Cyberacts and Public Order Cybercrimes: Prostitution, Gambling and Substance Abuse1. The Relationship Between Law and Morality2. CyberdevianceA. Paraphilia Online3. Public Order CybercrimesA.


Cyberprostitutioni. The Facilitation of Prostitution via the Interneta. Can a Website Be a House of Prostitution?b. Prostitution: There is An App for Thatii. Escorts: Prostitutes with a Different Name?iii. Juvenile Prostitutioniv. Cyberprostitution, Cybersex, and CyberpornographyB. Substance Abuse and Drugs Onlinei.


Online Pharmaciesa. Differentiating Licit, Illicit, and Fake Online PharmaciesC. Internet Gamblingi. Licit and Illicit Online Gambling Sitesii. Regulating Internet Gambling4. Controlling Cyberdeviance and Public Order Cybercrimes5. Case Study6. Review Questions7.


Laws8. Definitions9. EndnotesChapter 13. Organized Cybercrime1. Organized Cybercrime: An Introduction2. Activities of Organized CybercriminalsA. Crime as a ServiceB. Money Laundering3.


Online Drug TraffickingA. Surface Web vs. Deep Webi. Darknet: The Underworld of Cyberspace4. Human TraffickingA. Nature and Extent of Human TraffickingB. Human Traffickers: Targets and Tactics of Controli. Human Traffickers: Online TacticsC.


Organ Trafficking5. Firearms Trafficking6. Cigarette Trafficking7. Wildlife Trafficking8. Controlling Organized Cybercrime9. Case Study10. Review Questions11. Laws12.


Definitions13. EndnotesChapter 14. Political Cybercrime1. Types of Political CybercrimeA. HacktivismB. CyberespionageC. CyberterrorismD. Cyberwarfarei.


Laws of War: Can They be Applied to Cyberspace?2. Combating Political Cybercrime3. Case Study4. Review Questions5. Laws6. Definitions7. Endnotes.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...