Social Networking as a Criminal Enterprise  book cover
SAVE
$21.00
1st Edition

Social Networking as a Criminal Enterprise





ISBN 9781466589797
Published April 28, 2014 by Routledge
253 Pages - 5 B/W Illustrations

 
SAVE ~ $21.00
was $105.00
USD $84.00

Prices & shipping based on shipping country


Preview

Book Description

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.

With insight from field experts, this book examines:

  • The history of social networking and the process of developing an online identity
  • Schools of criminological theory and how they relate to criminality on social networking websites
  • Forms of criminal behavior that can be performed utilizing social networking websites
  • Criminality via texting, identity theft, and hacking
  • Adolescents as offenders and victims in cyberbullying and digital piracy
  • Online sexual victimization, including child pornography and sexual solicitation of youth

The book concludes by discussing law enforcement’s response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders.

Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

Table of Contents

Understanding the Social Network
History of Social Networking; Catherine D. Marcum
Creating Identity on Social Network Sites; Matt Richie and Tina L. Freiburger
Social Networks and Crime: Applying Criminological Theories; Brian P. Schaefer
Types of Social Working Criminality
Texting and Social Networks; Melissa L. Ricketts and Cynthia Koller
Identity Theft and Social Networks; Jordana N. Navarro and Jana L. Jasinski
Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media; Robin M. Kowalski and Gary W. Giumetti
Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach; George E. Higgins
Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites; Debarati Halder and K. Jaishankar
Case Study: Advancing Research on Hackers Through Social Network Data; Thomas J. Holt, Olga Smirnova, Deborah Strumsky, and Max Kilger
The Criminal Justice System and Social Networking
Further Examining Officer Perceptions and Support for Online Community Policing; Adam M. Bossler and Thomas J. Holt
Prosecution and Social Media; Joseph D. Losavio and Michael M. Losavio
Corrections and Social Networking Websites; Catherine D. Marcum and George E. Higgins
Index

...
View More

Editor(s)

Biography

Catherine D. Marcum, PhD, is an assistant professor of justice studies at Appalachian State University. She earned a PhD in criminology from Indiana University of Pennsylvania in 2008. Her research interests include cybercrime, sexual victimization, and correctional issues.

George E. Higgins, PhD, is a professor in the Department of Justice Administration at the University of Louisville. He earned his PhD in criminology from Indiana University of Pennsylvania in 2001. He is currently the editor of the Journal of Criminal Justice Education. His most recent publications appear or are forthcoming in Journal of Criminal Justice, Deviant Behavior, Criminal Justice and Behavior, Youth and Society, and American Journal of Criminal Justice.

Reviews

"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
—G. Ernest Govea, in Security Management

"…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
—L. L. Hansen, Western New England University