Cybercrime and SocietyCybercrime and Society provides a clear, systematic, and critical introduction to current debates about cybercrime. It locates the phenomenon in the wider contexts of social, political, cultural, and economic change. It is the first book to draw upon perspectives spanning criminology, sociology, law, politics, and cultural studies to examine the whole range of cybercrime issues. |
From inside the book
Results 1-5 of 24
Page vii
... gender and youth 33 2.6 Hacking and the law : legislative innovations and responses 2.7 Summary Study questions Further reading 2222 39 42 42 42 3 Political Hacking : From Hacktivism to Cyberterrorism 3.1 Introduction.
... gender and youth 33 2.6 Hacking and the law : legislative innovations and responses 2.7 Summary Study questions Further reading 2222 39 42 42 42 3 Political Hacking : From Hacktivism to Cyberterrorism 3.1 Introduction.
Page ix
... Legislative and policing measures to combat online child pornography 113 6.9 Legal and policing challenges in tackling child pornography 115 6.10 Summary 119 Study questions 119 Further reading 120 7 The Victimization of Individuals ...
... Legislative and policing measures to combat online child pornography 113 6.9 Legal and policing challenges in tackling child pornography 115 6.10 Summary 119 Study questions 119 Further reading 120 7 The Victimization of Individuals ...
Page 13
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 14
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page 15
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
IV | 2 |
VI | 5 |
VII | 6 |
VIII | 9 |
IX | 11 |
XI | 12 |
XII | 16 |
XIII | 19 |
LIII | 79 |
LIV | 80 |
LV | 81 |
LIX | 90 |
LXII | 92 |
LXIII | 94 |
LXIV | 95 |
LXVI | 97 |
XIV | 20 |
XVI | 21 |
XVII | 22 |
XVIII | 24 |
XIX | 27 |
XX | 31 |
XXI | 33 |
XXII | 39 |
XXIV | 42 |
XXV | 43 |
XXVI | 45 |
XXVIII | 46 |
XXIX | 47 |
XXX | 50 |
XXXII | 54 |
XXXIII | 55 |
XXXIV | 58 |
XXXVI | 61 |
XXXIX | 62 |
XL | 63 |
XLI | 64 |
XLII | 65 |
XLIII | 66 |
XLV | 67 |
XLVI | 68 |
XLVII | 69 |
XLVIII | 72 |
XLIX | 73 |
L | 76 |
LI | 77 |
Other editions - View all
Common terms and phrases
abuse action advanced fee frauds Akdeniz anonymity attacks auction fraud behaviour Bocij cent challenges chapter child pornography claims communication computer crime computer security countries criminal justice criminology critical cultural cyber cybercrime cyberspace cyberstalking cyberterrorism deviance electronic encryption example exploit fraudsters Furnell global groups hacktivism harm hate speech ibid ICCC illegal images increasingly individuals industry infrastructure intellectual property Internet fraud Internet pornography issues law enforcement agencies legislation legitimate million moral panic MPAA networks obscene offences online fraud organizations paedophiles paedophilia phishing piracy police political potential problem prohibition protection range recent relating reported representations September 11 sexual social Society stalking steganography surveillance tackling target terrestrial terrorism terrorist theft threat tion transnational unauthorized users victims viruses Website defacement websites worldwide
Popular passages
Page 168 - From Anarchy to Power: The Net Comes of Age. New York: New York University Press.