图书介绍
Crime and Deviance in CyberspacePDF|Epub|txt|kindle电子书版本网盘下载
![Crime and Deviance in Cyberspace](https://www.shukui.net/cover/2/34131719.jpg)
- Mars 著
- 出版社: Limited;Bookpoint Limited [Distributor]
- ISBN:
- 出版时间:2009
- 标注页数:594页
- 文件大小:31MB
- 文件页数:621页
- 主题词:
PDF下载
下载说明
Crime and Deviance in CyberspacePDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART Ⅰ DEVELOPMENTS IN THINKING ABOUT CYBERCRIMES3
1 Majid Yar (2005) 'The Novelty of"Cybercrime": An Assessment in Light of Routine Activity Theory', European Journal of Criminology, 2, pp. 407-27.3
2 Sheila Brown (2006), 'The Criminology of Hybrids: Rethinking Crime and Law in Technosocial Networks', Theoretical Criminology, 10, pp. 223-44.25
PART Ⅱ CHANGES IN THE ORGANIZATION OF CRIME ONLINE49
3 Susan W. Brenner (2002), 'Organized Cybercrime? How Cyberspace May Affect the Structure of Criminal Relationships', North Carolina Journal of Law and Technology, 4, pp. 1-50.49
4 David S. Wall (2005), 'Digital Realism and the Governance of Spam as Cybercrime', European Journal on Criminal Policy and Research, 10, pp. 309-35.99
5 Sandy Starr (2004), 'Can the Law Can Spam? Legislation is a Blunt Instrument with Which to Beat Junk Email', Spiked, April, pp. 1-4.127
6 Sandy Starr (2004), 'Can Technology Can Spare? IT Companies Do Battle with Bulk Email', Spiked, May, pp. 1-5.133
7 Lorine A. Hughes and Gregory J. DeLone (2007), 'Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both?', Social Science Computer Review, 25, pp. 78-98.137
8 David S. Wall and Matthew Williams (2007), 'Policing Diversity in the Digital Age: Maintaining Order in Virtual Communities', Criminology and Criminal Justice, 7, pp. 391-415.159
PART Ⅲ THE CHANGING NATURE OF CYBERCRIME189
Computer Integrity Crime189
9 Helen Nissenbaum (2004), 'Hackers and the Contested Ontology of Cyberspace', New Media&Society, 6, pp. 195-217.189
10 Briavel Holcomb, Philip B. Bakelaar and Mark Zizzamia (2003), 'The Internet in the Aftermath of the World Trade Center Attack', Journal of Urban Technology, 10, pp. 111-28.213
Computer-assisted Crime233
11 Gregor Urbas (2006), 'Cross-National Investigation and Prosecution of Intellectual Property Crimes: The Example of"Operation Buccaneer"', Crime, Law antisocial Change, 46, pp. 207-21.233
12 Bert-Jaap Koops and Ronald Leenes (2006), 'Identity Theft, Identity Fraud, and/ or Identity-related Crime. Definitions Matter', Datenshutz und Datensicherheit, 30, pp. 553-56.249
Computer Content Crime255
13 Tony Krone (2005), 'International Police Operations Against Online Child Pornography', Crime and Justice International, 21, pp. 11-20.255
14 Barbara Hewson (2003), 'Fetishising Images', Spiked, January, pp. 1-8.265
15 Jonathan Clough (2008), 'Now you See it, Now you Don't: Digital Images and the Meaning of"Possession"', Criminal Law Forum, 19, pp. 205-39.273
16 Francesca Philips and Gabrielle Morrissey (2004), 'Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet', Convergence, 10, pp. 66-79.309
17 Giselinde Kuipers (2006), 'The Social Construction of Digital Danger: Debating, Defusing and Inflating the Moral Dangers of Online Humor and Pornography in the Netherlands and the United States', New Media&Society, 8, pp. 379-400.323
18 Jacqueline L. Schneider (2003), 'Hiding in Plain Sight: An Exploration of the Illegal(?) Activities of a Drugs Newsgroup', Howarddournal of Criminal Justice, 42, pp. 374-89.345
19 Jerry Finn (2004), 'A Survey of Online Harassment at a University Campus', Journal of Interpersonal Violence, 19, pp. 468-83.361
PART Ⅳ REGULATING CYBERCRIME379
20 Neal Kumar Katyal (2003), 'Digital Architecture as Crime Control', Yale Law Journal, 112, pp. 2261-89.379
21 Bruce Berkowitz and Robert W. Hahn (2003) 'Cybersecurity: Who's Watching the Store?', Issues in Science&Technology, 19, pp. 55-62.409
22 F. Gregory Lastowka and Dan Hunter (2005), 'Virtual Crimes', New York Law School Law Review, 49, pp. 293-316.417
23 Ronald V. Clarke (2004), 'Technology, Criminology and Crime Science', European Journal on Criminal Policy and Research, 10, pp. 55-63.441
24 Sam McQuade (2006), 'Technology-enabled Crime, Policing and Security', Journal of Technology Studies, 32, pp. 32-42.451
25 G.T. Marx (2001), 'Technology and Social Control', International Encyclopedia of the Social and Behavioral Sciences, pp. 15506-12.463
PART Ⅴ POLICING AND PREVENTING CYBERCRIME473
26 Kevin D. Haggerty and Amber Gazso (2005), 'Seeing Beyond the Ruins: Surveillance as a Response to Terrorist Threats', Canadian Journal of Sociology, 30, pp. 169-87.473
27 Yvonne Jewkes and Carol Andrews (2005), 'Policing the Filth: The Problems of Investigating Online Child Pornography in England and Wales', Policing and Society, 15, pp. 42-62.493
28 Roderic Broadhurst (2006) 'Developments in the Global Law Enforcement of Cyber-crime', Policing: A n International Journal of Police Strategies and Management, 29, pp. 408-33.515
29 Peter Sommer (2004), 'The Future for the Policing of Cybercrime', Computer Fraud&Security, 1, pp. 8-12, 12a.541
30 Peter Grabosky (2007), 'Requirements of Prosecution Services to Deal with Cyber Crime', Crime, Law andSocial Change, 47, pp. 201-23.547
31 Benoit Dupont (2004), 'Security in the Age of Networks', Policing and Society, 14, pp. 76-91.571
Name Index587