461 pages | 8 B/W Illus.
Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. And as more personal information than ever is stored on networked computers, even the occasional or non-user is at risk. A collection of contributions from worldwide experts and emerging researchers, Cyber Criminology: Exploring Internet Crimes and Criminal Behavior explores today’s interface of computer science, Internet science, and criminology.
Topics discussed include:
Approaching the topic from a social science perspective, the book explores methods for determining the causes of computer crime victimization by examining an individual’s lifestyle patterns. It also publishes the findings of a study conducted on college students about online victimization.
Advances in information and communications technologies have created a range of new crime problems that did not exist two decades ago. Opportunities for various criminal activities to pervade the Internet have led to the growth and development of cyber criminology as a distinct discipline within the criminology framework. This volume explores all aspects of this nascent field and provides a window on the future of Internet crimes and theories behind their origins.K. Jaishankar was the General Chair of the First International Conference of the South Asian Society of Criminology and Victimology (SASCV), held January 15-17, 2011 at the Hotel Jaipur Greens in Jaipur, Rajasthan, India.
Section I: Deviance and Criminal Subculture in Cyberspace
Café Culture and Heresy of Yahooboyism in Nigeria;A. I. Adeniran
Internet Gambling; H. N. Pontell, G. Geis, and G. C. Brown
Section II: Perpetrators; Perspectives and Offender Use of the Internet
Identity Construction Among Hackers; O. Turgeman-Goldschmidt
Virtual Sex Offenders: A Clinical Perspective; K. Young
Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura’s Theory of Reciprocal Determinism; K. C. Seigfried-Spellar, R. W. Lovely, and M. K. Rogers
Online Social Networking and Pedophilia: An Experimental Research "Sting"; R. Broadhurst and K. Jayawardena
Adult–Child Sex Advocacy Websites as Learning Environments for Crime; R. D’Ovidio, T. Mitman, I. J. El-Burki, and W. Shumar
The Internet as a Terrorist’s Tool: A Social Learning Perspective; T. Freiburger and J. S. Crane
Section III:Digital Piracy
Value and Choice: Examining Their Roles in Digital Piracy; G. E. Higgins
Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users; M. Bachmann
Criminological Predictors of Digital Piracy: A Path Analysis; W. D. Gunter
Change of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data; G. E. Higgins, S. E. Wolfe, and C. D. Marcum
Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers; R. Moore
Section IV: Cyber Victimization
Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization; K.-S. Choi
Adolescent Online Victimization and Constructs of Routine Activities Theory;C. D. Marcum
Cyber Stalking: Typology, Etiology, and Victims;M. L. Pittaro
Online Social Networking and Women Victims;D. Halder and K. Jaishankar
Malware Victimization: A Routine Activities Framework; A. M. Bossler and T. J. Holt
Section V: Legal and Policy Issues of Cyber Crimes
Fatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism? A. M. Maghaireh
Cyber Bullying: Legal Obligations and Educational Policy Vacuum;S. Shariff and D. L. Hoff
Human Rights Infringement in the Digital Age; R. G. Smith
Conclusion; K. Jaishankar