图书介绍

Crime and Deviance in CyberspacePDF|Epub|txt|kindle电子书版本网盘下载

Crime and Deviance in Cyberspace
  • Mars 著
  • 出版社: Limited;Bookpoint Limited [Distributor]
  • ISBN:
  • 出版时间:2009
  • 标注页数:594页
  • 文件大小:31MB
  • 文件页数:621页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Crime and Deviance in CyberspacePDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART Ⅰ DEVELOPMENTS IN THINKING ABOUT CYBERCRIMES3

1 Majid Yar (2005) 'The Novelty of"Cybercrime": An Assessment in Light of Routine Activity Theory', European Journal of Criminology, 2, pp. 407-27.3

2 Sheila Brown (2006), 'The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks', Theoretical Criminology, 10, pp. 223-44.25

PART Ⅱ CHANGES IN THE ORGANIZATION OF CRIME ONLINE49

3 Susan W. Brenner (2002), 'Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships', North Carolina Journal of Law and Technology, 4, pp. 1-50.49

4 David S. Wall (2005), 'Digital Realism and the Governance of Spam as Cybercrime', European Journal on Criminal Policy and Research, 10, pp. 309-35.99

5 Sandy Starr (2004), 'Can the Law Can Spam? Legislation is a Blunt Instrument with Which to Beat Junk Email', Spiked, April, pp. 1-4.127

6 Sandy Starr (2004), 'Can Technology Can Spare? IT Companies Do Battle with Bulk Email', Spiked, May, pp. 1-5.133

7 Lorine A. Hughes and Gregory J. DeLone (2007), 'Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?', Social Science Computer Review, 25, pp. 78-98.137

8 David S. Wall and Matthew Williams (2007), 'Policing Diversity in the Digital Age: Maintaining Order in Virtual Communities', Criminology and Criminal Justice, 7, pp. 391-415.159

PART Ⅲ THE CHANGING NATURE OF CYBERCRIME189

Computer Integrity Crime189

9 Helen Nissenbaum (2004), 'Hackers and the Contested Ontology of Cyberspace', New Media&Society, 6, pp. 195-217.189

10 Briavel Holcomb, Philip B. Bakelaar and Mark Zizzamia (2003), 'The Internet in the Aftermath of the World Trade Center Attack', Journal of Urban Technology, 10, pp. 111-28.213

Computer-assisted Crime233

11 Gregor Urbas (2006), 'Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of"Operation Buccaneer"', Crime, Law antisocial Change, 46, pp. 207-21.233

12 Bert-Jaap Koops and Ronald Leenes (2006), 'Identity Theft, Identity Fraud, and/ or Identity-related Crime. Definitions Matter', Datenshutz und Datensicherheit, 30, pp. 553-56.249

Computer Content Crime255

13 Tony Krone (2005), 'International Police Operations Against Online Child Pornography', Crime and Justice International, 21, pp. 11-20.255

14 Barbara Hewson (2003), 'Fetishising Images', Spiked, January, pp. 1-8.265

15 Jonathan Clough (2008), 'Now you See it, Now you Don't: Digital Images and the Meaning of"Possession"', Criminal Law Forum, 19, pp. 205-39.273

16 Francesca Philips and Gabrielle Morrissey (2004), 'Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet', Convergence, 10, pp. 66-79.309

17 Giselinde Kuipers (2006), 'The Social Construction of Digital Danger: Debating, Defusing and Inflating the Moral Dangers of Online Humor and Pornography in the Netherlands and the United States', New Media&Society, 8, pp. 379-400.323

18 Jacqueline L. Schneider (2003), 'Hiding in Plain Sight: An Exploration of the Illegal(?) Activities of a Drugs Newsgroup', Howarddournal of Criminal Justice, 42, pp. 374-89.345

19 Jerry Finn (2004), 'A Survey of Online Harassment at a University Campus', Journal of Interpersonal Violence, 19, pp. 468-83.361

PART Ⅳ REGULATING CYBERCRIME379

20 Neal Kumar Katyal (2003), 'Digital Architecture as Crime Control', Yale Law Journal, 112, pp. 2261-89.379

21 Bruce Berkowitz and Robert W. Hahn (2003) 'Cybersecurity: Who's Watching the Store?', Issues in Science&Technology, 19, pp. 55-62.409

22 F. Gregory Lastowka and Dan Hunter (2005), 'Virtual Crimes', New York Law School Law Review, 49, pp. 293-316.417

23 Ronald V. Clarke (2004), 'Technology, Criminology and Crime Science', European Journal on Criminal Policy and Research, 10, pp. 55-63.441

24 Sam McQuade (2006), 'Technology-enabled Crime, Policing and Security', Journal of Technology Studies, 32, pp. 32-42.451

25 G.T. Marx (2001), 'Technology and Social Control', International Encyclopedia of the Social and Behavioral Sciences, pp. 15506-12.463

PART Ⅴ POLICING AND PREVENTING CYBERCRIME473

26 Kevin D. Haggerty and Amber Gazso (2005), 'Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats', Canadian Journal of Sociology, 30, pp. 169-87.473

27 Yvonne Jewkes and Carol Andrews (2005), 'Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales', Policing and Society, 15, pp. 42-62.493

28 Roderic Broadhurst (2006) 'Developments in the Global Law Enforcement of Cyber-crime', Policing: A n International Journal of Police Strategies and Management, 29, pp. 408-33.515

29 Peter Sommer (2004), 'The Future for the Policing of Cybercrime', Computer Fraud&Security, 1, pp. 8-12, 12a.541

30 Peter Grabosky (2007), 'Requirements of Prosecution Services to Deal with Cyber Crime', Crime, Law andSocial Change, 47, pp. 201-23.547

31 Benoit Dupont (2004), 'Security in the Age of Networks', Policing and Society, 14, pp. 76-91.571

Name Index587

热门推荐