Cyber Criminology: Exploring Internet Crimes and Criminal Behavior
by Jaishankar; K.-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Buy New
Rent Textbook
Rent Digital
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Foreword | p. xi |
| Acknowledgments | p. xiii |
| Editor | p. xv |
| Contributors | p. xvii |
| Introduction: Expanding Cyber Criminology With an Avant-Garde Anthology | p. xxvii |
| Deviance and Criminal Subculture in Cyberspace | |
| Café Culture and Heresy of Yahooboyism in Nigeria | p. 3 |
| Internet Gambling | p. 13 |
| Perpetrators' Perspectives and Offender Use of the Internet | |
| Identity Construction Among Hackers | p. 31 |
| Virtual Sex Offenders: A Clinical Perspective | p. 53 |
| Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism | p. 65 |
| Online Social Networking and Pedophilia: An Experimental Research ôStingö | p. 79 |
| Adult-Child Sex Advocacy Websites as Learning Environments for Crime | p. 103 |
| The Internet as a Terrorist's Tool: A Social Learning Perspective | p. 127 |
| Digital Piracy | |
| Value and Choice: Examining Their Roles in Digital Piracy | p. 141 |
| Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users | p. 155 |
| Criminological Predictors of Digital Piracy: A Path Analysis | p. 173 |
| Change of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data | p. 193 |
| Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers | p. 209 |
| Cyber Victimization | |
| Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization | p. 229 |
| Adolescent Online Victimization and Constructs of Routine Activities Theory | p. 253 |
| Cyber Stalking: Typology, Etiology, and Victims | p. 277 |
| Online Social Networking and Women Victims | p. 299 |
| Malware Victimization: A Routine Activities Framework | p. 317 |
| Legal and Policy Issues of Cyber Crimes | |
| Fatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism? | p. 347 |
| Cyber Bullying: Legal Obligations and Educational Policy Vacuum | p. 359 |
| Human Rights Infringement in the Digital Age | p. 393 |
| Conclusion | p. 411 |
| Index | p. 415 |
| Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.