Cybercrime and society:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
London
SAGE Publications
[2024]
|
Ausgabe: | Fourth edition |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034843623&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | xi, 390 Seiten Illustrationen |
ISBN: | 9781529772074 9781529772067 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049498438 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | t| | ||
008 | 240112s2024 xx a||| |||| 00||| eng d | ||
020 | |a 9781529772074 |c pbk |9 978-1-5297-7207-4 | ||
020 | |a 9781529772067 |c hbk |9 978-1-5297-7206-7 | ||
035 | |a (OCoLC)1422343798 | ||
035 | |a (DE-599)BVBBV049498438 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
084 | |a MS 6380 |0 (DE-625)123753: |2 rvk | ||
100 | 1 | |a Yar, Majid |e Verfasser |0 (DE-588)1035577704 |4 aut | |
245 | 1 | 0 | |a Cybercrime and society |c Majid Yar & Kevin F. Steinmetz |
250 | |a Fourth edition | ||
264 | 1 | |a London |b SAGE Publications |c [2024] | |
264 | 4 | |c © 2024 | |
300 | |a xi, 390 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Gesellschaft |0 (DE-588)4020588-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Gesellschaft |0 (DE-588)4020588-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Steinmetz, Kevin F. |e Sonstige |0 (DE-588)1123654239 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034843623&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034843623 |
Datensatz im Suchindex
_version_ | 1822392355788947456 |
---|---|
adam_text |
CONTENTS About the Authors Preface to the Fourth Edition Acknowledgements xiii xv xvii 1 Cybercrime and the Internet: An Introduction 1.1 Perceptions of cybercrime 1.2 Cybercrime: Questions and answers 1.3 A brief history and analysis of the internet 1.4 Defining and classifying cybercrime 1.5 What’s ‘new’ about cybercrime? 1.6 Explaining cybercrime 1.7 Challenges for criminal justice and policing 1.8 Summary Study questions Further reading 1 2 3 4 8 11 11 13 15 16 16 2 Theorizing Cybercrime 2.1 Thinking about cybercrime 2.2 Classical and neo-classical criminology 2.3 Social learning theory 2.4 Strain theory 2.5 Drift and neutralization theory 2.6 Self-control theory 2.7 Feminist criminology 2.8 Radical criminology 2.9 Summary Study questions Further reading 17 18 18 23 24 26 28 29 31 33 34 34 3 Researching Cybercrime 3.1 Studying cybercrime 3.2 Public and private data sources 3.3 Academic research methods 3.4 Summary Study questions Further reading 35 36 36 42 49 50 50
vili CYBERCRIME AND SOCIETY 4 Hackers 4.1 The social life of hacking 4.2 What is hacking? 4.3 A social history of hacking 4.4 Representations of hackers and hacking: Technological fears and fantasies 4.5 ‘Why do they do it?’ Hacker motivations 4.6 Who are the hackers? 4.7 Summary Study questions Further reading 51 52 52 53 57 61 62 70 70 71 5 Hacking 5.1 What do hackers do? 5.2 Finding and exploiting vulnerabilities 5.3 Unauthorized access to computer systems 5.4 Theft of computer resources 5.5 Data breaches 5.6 Systems alteration 5.7 Website defacement and ‘spoofing’ 5.8 Denial of service attacks 5.9 Malware 5.10 Automated hacking tools 5.11 Legislative responses to hacking 5.12 Summary Study questions Further reading 6 Hacktivism: Digital Resistance and Disobedience 6.1 Introduction 6.2 The emergence and development of hacktivism 6.3 Criminal justice responses to hacktivism and their aftermath 6.4 Hacker states 6.5 Summary Study questions Further reading 95 96 96 105 107 108 108 109 7 Cyberterrorism 7.1 Introduction 7.2 The spectre of cyberterrorism 7.3 Why cyberterror? Terrorist advantages of utilizing internet attacks 7.4 Rhetorics and myths of cyberterrorism 7.5 Alternative conjunctions between terrorism and the internet 7.6 Cyberwarfare 7.7 Summary Study questions Further reading 111 112 112 115 117 119 123 125 126 126 73 74 74 75 76 77 79 79 80 82 87 88 92 93 93
CONTENTS Illegal Goods and Illicit Markets 8.1 Introduction 8.2 Surface web, deep web and dark web 8.3 Illegal drugs and the surface web 8.4 Markets for other illicit goods: The online antiquities and wildlife trade 8.5 Markets for illicit digital goods: Hacker forums and media piracy 8.6 Cryptomarkets: Illicit goods and services on the dark web 8.7 Summary Study questions Further reading 127 128 128 129 Online Fraud 9.1 Introduction 9.2 Scope and scale of online fraud 9.3 The anatomy of fraud 9.4 Varieties of online fraud 9.5 Fraud victimization 9.6 Challenges in policing online fraud 9.7 Regulating online fraud 9.8 Summary Study questions Further reading 147 148 148 150 152 160 162 163 165 166 166 10 Pornography and Obscenity 10.1 Introduction 10.2 The growth and popularity of internet pornography 10.3 Obscenity, extreme pornography and prohibited images 10.4 Protecting minors from sexually explicit content 10.5 Image-based abuse and ‘revenge porn’ 10.6 Deepfake pornography as criminal victimization 10.7 Summary Study questions Further reading 167 168 168 170 173 176 179 181 182 182 11 Online Falsehoods: Fake News, Information Warfare and Deepfakes 11.1 Introduction 11.2 Fake news 11.3 Information warfare 11.4 Deepfakes and synthetic media 11.5 Responding to online disinformation: Education, technology, regulation and the law 11.6 Summary Study questions Further reading 183 184 184 189 191 8 9 134 135 139 144 145 145 194 197 198 198 ix
X CYBERCRIME AND SOCIETY 12 Online Hate 12.1 Introduction 12.2 Thinking about ‘hate speech’ 12.3 Hate speech online 12.4 Targets of hate speech 12.5 Legal, policing and political challenges in tackling online hate speech 12.6 Social media policies and practices for tackling online hate speech 12.7 Summary Study questions Further reading 199 200 200 203 204 208 212 213 214 214 13 Child Sexual Exploitation: Images and Abuse 13.1 Introduction 13.2 CSEM and the internet 13.3 Measuring the availability of CSEM 13.4 CSEM victims 13.5 CSEM offenders 13.6 Self-victimization and child perpetration 13.7 Legislating CSEM 13.8 Policing CSEM 13.9 Grey areas: Fictionalized depictions of child sexual abuse 13.10 Online child sexual abuse elicitation and ‘grooming’ 13.11 Comparing CSEM-only and contact offenders 13.12 Measuring the scope and scale of the sexual solicitation of children online 13.13 Processes of online sexual elicitation and ‘grooming’ 13.14 Legal responses to child sexual elicitation and ‘grooming’ 13.15 Thinking critically about internet-facilitated child sexual abuse 13.16 Summary Study questions Further reading 215 216 216 218 219 220 221 223 226 229 231 231 14 Online Harassment, Bullying and Stalking 14.1 Introduction 14.2 The emergence of stalking as a crime problem 14.3 Cyberstalking 14.4 Cyberbullying 14.5 Summary Study questions Further reading 232 233 235 236 238 239 239 241 242 242 246 253 254 255 255
CONTENTS 15 The Public Policing of Cybercrime 15.1 Introduction 15.2 Challenges in policing cybercrime 15.3 Structure of cybercrime policing 15.4 The cybercrime investigative process 15.5 Digital forensics 15.6 Summary Study questions Further reading 16 The Private Policing and Prevention of Cybercrimes 275 16.1 Introduction 276 16.2 Pluralized policing: The involvement of quasi-state and non-state actors in policing the internet 276 16.3 Responsibilization of internet platforms and services 280 16.4 Privatized ‘for-profit’ cybercrime policing 282 16.5 Explaining the pluralization and privatization of internet policing 283 16.6 Critical issues about private policing of the internet 285 16.7 Summary 286 Study questions 287 Further reading 287 17 Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control 17.1 Introduction 17.2 From surveillance to dataveillance: The rise of the electronic web 17.3 The development of internet surveillance 17.4 The dilemmas of surveillance as crime control: Thecaseofencryption 17.5 Summary Study questions Further reading 18 The Futures of Cybercrime 18.1 Introduction 18.2 Future directions in cybercrime 18.3 Considerations for civil liberties 18.4 Concluding thoughts Study questions Further reading Glossary Bibliography Index 257 258 258 266 270 272 273 273 274 289 290 290 292 301 305 306 306 307 308 308 312 314 315 315 317 329 379 xi |
any_adam_object | 1 |
author | Yar, Majid |
author_GND | (DE-588)1035577704 (DE-588)1123654239 |
author_facet | Yar, Majid |
author_role | aut |
author_sort | Yar, Majid |
author_variant | m y my |
building | Verbundindex |
bvnumber | BV049498438 |
classification_rvk | SR 850 PZ 3700 MS 6380 |
ctrlnum | (OCoLC)1422343798 (DE-599)BVBBV049498438 |
discipline | Rechtswissenschaft Informatik Soziologie |
edition | Fourth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049498438</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">240112s2024 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781529772074</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-5297-7207-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781529772067</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-5297-7206-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422343798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049498438</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 6380</subfield><subfield code="0">(DE-625)123753:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yar, Majid</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1035577704</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybercrime and society</subfield><subfield code="c">Majid Yar & Kevin F. Steinmetz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">SAGE Publications</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xi, 390 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gesellschaft</subfield><subfield code="0">(DE-588)4020588-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Gesellschaft</subfield><subfield code="0">(DE-588)4020588-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Steinmetz, Kevin F.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1123654239</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034843623&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034843623</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV049498438 |
illustrated | Illustrated |
indexdate | 2025-01-27T09:06:23Z |
institution | BVB |
isbn | 9781529772074 9781529772067 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034843623 |
oclc_num | 1422343798 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xi, 390 Seiten Illustrationen |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | SAGE Publications |
record_format | marc |
spelling | Yar, Majid Verfasser (DE-588)1035577704 aut Cybercrime and society Majid Yar & Kevin F. Steinmetz Fourth edition London SAGE Publications [2024] © 2024 xi, 390 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Gesellschaft (DE-588)4020588-5 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Internetkriminalität (DE-588)7864395-8 s Gesellschaft (DE-588)4020588-5 s DE-604 Steinmetz, Kevin F. Sonstige (DE-588)1123654239 oth Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034843623&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Yar, Majid Cybercrime and society Gesellschaft (DE-588)4020588-5 gnd Internetkriminalität (DE-588)7864395-8 gnd |
subject_GND | (DE-588)4020588-5 (DE-588)7864395-8 (DE-588)4123623-3 |
title | Cybercrime and society |
title_auth | Cybercrime and society |
title_exact_search | Cybercrime and society |
title_full | Cybercrime and society Majid Yar & Kevin F. Steinmetz |
title_fullStr | Cybercrime and society Majid Yar & Kevin F. Steinmetz |
title_full_unstemmed | Cybercrime and society Majid Yar & Kevin F. Steinmetz |
title_short | Cybercrime and society |
title_sort | cybercrime and society |
topic | Gesellschaft (DE-588)4020588-5 gnd Internetkriminalität (DE-588)7864395-8 gnd |
topic_facet | Gesellschaft Internetkriminalität Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034843623&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yarmajid cybercrimeandsociety AT steinmetzkevinf cybercrimeandsociety |