About the Authors |
|
xi | |
Preface to the Third Edition |
|
xiii | |
Acknowledgements |
|
xv | |
Online Resources |
|
xvii | |
|
1 Cybercrime and the Internet: An Introduction |
|
|
1 | (20) |
|
1.1 Perceptions of cybercrime |
|
|
3 | (2) |
|
1.2 Cybercrime: Questions and answers |
|
|
5 | (2) |
|
1.3 A brief history and analysis of the internet |
|
|
7 | (3) |
|
1.4 Defining and classifying cybercrime |
|
|
10 | (3) |
|
1.5 What's `new' about cybercrime? |
|
|
13 | (2) |
|
1.6 Explaining cybercrime |
|
|
15 | (1) |
|
1.7 Challenges for criminal justice and policing |
|
|
16 | (3) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
2 Researching and Theorizing Cybercrime |
|
|
21 | (30) |
|
|
23 | (1) |
|
2.2 Criminological theory |
|
|
23 | (18) |
|
2.3 Researching cybercrime |
|
|
41 | (7) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (2) |
|
3 Hackers, Crackers and Viral Coders |
|
|
51 | (30) |
|
3.1 Hackers and hacking: Contested definitions |
|
|
53 | (2) |
|
3.2 Representations of hackers and hacking: Technological fears and fantasies |
|
|
55 | (3) |
|
3.3 What hackers actually do: A brief guide for the technologically bewildered |
|
|
58 | (6) |
|
3.4 Hacker myths and realities: Wizards or button-pushers? |
|
|
64 | (3) |
|
3.5 `Why do they do it?' Motivation, psychology, gender and youth |
|
|
67 | (6) |
|
3.6 Hacking and the law: Legislative innovations and responses |
|
|
73 | (5) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (3) |
|
4 Political Hacking: From Hacktivism to Cyberterrorism |
|
|
81 | (24) |
|
|
83 | (1) |
|
4.2 Hacktivism and the politics of resistance in a globalized world |
|
|
84 | (4) |
|
4.3 The spectre of cyberterrorism |
|
|
88 | (5) |
|
4.4 Why cyberterror? Terrorist advantages of utilizing internet attacks |
|
|
93 | (1) |
|
4.5 Rhetorics and myths of cyberterrorism |
|
|
94 | (3) |
|
4.6 Alternative conjunctions between terrorism and the internet |
|
|
97 | (3) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
5 Virtual `Pirates': Intellectual Property Theft Online |
|
|
105 | (22) |
|
|
107 | (1) |
|
5.2 Intellectual property, copyright and piracy: An overview |
|
|
107 | (2) |
|
5.3 Scope and scale of piracy activity |
|
|
109 | (2) |
|
5.4 The history and growth of internet piracy |
|
|
111 | (3) |
|
5.5 Who are the `pirates'? |
|
|
114 | (3) |
|
5.6 The development of anti-piracy initiatives |
|
|
117 | (4) |
|
5.7 Thinking critically about piracy statistics |
|
|
121 | (2) |
|
5.8 Thinking critically about intellectual property rights |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
6 Cyber-frauds, Scams and Cons |
|
|
127 | (24) |
|
|
129 | (1) |
|
6.2 Scope and scale of online fraud |
|
|
129 | (2) |
|
6.3 Varieties of online fraud |
|
|
131 | (11) |
|
6.4 Online fraud: Perpetrators' advantages and criminal justice's problems |
|
|
142 | (3) |
|
6.5 Strategies for policing and combating internet frauds |
|
|
145 | (2) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (3) |
|
7 Illegal, Harmful and Offensive Content Online: From Hate Speech to `the Dangers' of Pornography |
|
|
151 | (22) |
|
|
153 | (1) |
|
7.2 Thinking about `hate speech' |
|
|
153 | (2) |
|
|
155 | (4) |
|
7.4 Legal, policing and political challenges in tackling online hate speech |
|
|
159 | (4) |
|
7.5 The growth and popularity of internet pornography |
|
|
163 | (1) |
|
7.6 Legal issues relating to internet pornography |
|
|
164 | (7) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
8 Child Pornography and Child Sex Abuse Imagery |
|
|
173 | (18) |
|
|
175 | (1) |
|
8.2 Child pornography and the internet: Images, victims and offenders |
|
|
175 | (5) |
|
8.3 Legislative and policing measures to combat online child pornography |
|
|
180 | (3) |
|
8.4 Legal and policing challenges in tackling child pornography |
|
|
183 | (3) |
|
8.5 The controversy over virtual child pornography and `jailbait' images |
|
|
186 | (3) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (1) |
|
9 The Victimization of Individuals Online: Cyberstalking and Paedophilia |
|
|
191 | (24) |
|
|
193 | (1) |
|
9.2 The emergence of stalking as a crime problem |
|
|
193 | (4) |
|
|
197 | (9) |
|
|
206 | (4) |
|
9.5 Thinking critically about online victimization: Stalking and paedophilia as moral panics? |
|
|
210 | (3) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (18) |
|
|
217 | (1) |
|
10.2 Public policing and the cybercrime problem |
|
|
217 | (5) |
|
10.3 Pluralized policing: The involvement of quasi-state and non-state actors in policing the internet |
|
|
222 | (5) |
|
10.4 Privatized `for-profit' cybercrime policing |
|
|
227 | (1) |
|
10.5 Explaining the pluralization and privatization of internet policing |
|
|
228 | (2) |
|
10.6 Critical issues about private policing of the internet |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
11 Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control |
|
|
233 | (20) |
|
|
235 | (1) |
|
11.2 From surveillance to dataveillance: The rise of the electronic web |
|
|
236 | (1) |
|
11.3 The development of internet surveillance |
|
|
237 | (9) |
|
11.4 The dilemmas of surveillance as crime control: The case of encryption |
|
|
246 | (4) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (2) |
|
12 Conclusion: Looking Toward the Future of Cybercrime |
|
|
253 | (10) |
|
|
255 | (1) |
|
12.2 Future directions in cybercrime |
|
|
255 | (3) |
|
12.3 Considerations for civil liberties |
|
|
258 | (3) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
Glossary |
|
263 | (10) |
References |
|
273 | (66) |
Index |
|
339 | |