点此搜书

CYBER CRIMINOLOGY  EXPLORING INTERNET CRIMES AND CRIMINAL BEHAVIOR
  • 作 者:K.JAISHANKAR
  • 出 版 社:CRC PRESS
  • 出版年份:2011
  • ISBN:1439829497
  • 标注页数:425 页
  • PDF页数:455 页
  • 请阅读订购服务说明与试读!

文档类型

价格(积分)

购买连接

试读

PDF格式

13

立即购买

点击试读

订购服务说明

1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。

2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源455 ≥425页】

图书下载及付费说明

1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

3、所有的电子图书都是原书直接扫描方式制作而成。

Section Ⅰ DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE 3

1 Cafe Culture and Heresy of Yahooboyism in Nigeria&ADEBUSUYII. ADENIRAN 3

2 Internet Gambling&HENRY N. PONTELL, GILBERT GEIS, AND GREGORY C. BROWN 13

Section Ⅱ PERPETRATORS' PERSPECTIVES AND OFFENDER USE OF THE INTERNET 31

3 Identity Construction Among Hackers&ORLY TURGEMAN-GOLDSCHMIDT 31

4 Virtual Sex Offenders: A Clinical Perspective&KIMBERLY YOUNG 53

5 Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism&KATHRYN C. SEIGFRIED-SPELLAR, RICHARD W.LOVELY, AND MARCUS K. ROGERS 65

6 Online Social Networking and Pedophilia: An Experimental Research "Sting"&RODERIC BROADHURST AND KASUN JAYAWARDENA 79

7 Adult-Child Sex Advocacy Websites as Learning Environments for Crime&ROB D'OVIDIO, TYSON MITMAN, IMAANI JAMILLAH EL-BURKI, AND WESLEY SHUMAR 103

8 The Internet as a Terrorist's Tool: A Social Learning Perspective&TINA FREIBURGER AND JEFFREY S. CRANE 127

Section Ⅲ DIGITAL PIRACY 141

9 Value and Choice: Examining Their Roles in Digital Piracy&GEORGE E. HIGGINS 141

10 Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users&MICHAEL BACHMANN 155

11 Criminological Predictors of Digital Piracy: A Path Analysis&WHITNEY D. GUNTER 173

12 Change of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data&GEORGE E. HIGGINS, SCOTT E. WOLFE, AND CATHERINE D. MARCUM 193

13 Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers&ROBERT MOORE 209

Section Ⅳ CYBER VICTIMIZATION 229

14 Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization&KYUNG-SHICK CHOI 229

15 Adolescent Online Victimization and Constructs of Routine Activities Theory&CATHERINE D. MARCUM 253

16 Cyber Stalking: Typology, Etiology, and Victims&MICHAEL L. PITTARO 277

17 Online Social Networking and Women Victims&DEBARATI HALDER AND K. JAISHANKAR 299

18 Malware Victimization: A Routine Activities Framework&ADAM M. BOSSLER AND THOMAS J. HOLT 317

Section Ⅴ LEGAL AND POLICY ISSUES OF CYBER CRIMES 347

19 Fatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism?&ALAELDIN MANSOUR MAGHAIREH 347

20 Cyber Bullying: Legal Obligations and Educational Policy Vacuum&SHAHEEN SHARIFF AND DIANNE L. HOFF 357

21 Human Rights Infringement in the Digital Age&RUSSELL G. SMITH 393

Conclusion&K. JAISHANKAR 411

Index 415

购买PDF格式(13分)
返回顶部