Marie-Helen Maras
Cybercriminology
Marie-Helen Maras
Cybercriminology
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A unique and comprehensive overview of the field and its current issues, Cybercriminology analyzes cybercrimes through the lens of criminology. Featuring an accessible, conversational writing style, it first discusses traditional criminological theories of criminal behavior and then analyzes how these theories--the existing literature and empirical studies--can be applied to explain cybercrimes. The text also introduces students to types of cybercrime, the nature and extent of cybercrime in the U.S. and abroad, and victim and offender behavior in the online environment. FEATURES * Real-world…mehr
Andere Kunden interessierten sich auch für
Robert F. KilfeatherManaging and Coordinating Major Criminal Investigations126,99 €
John OlssonForensic Linguistics51,99 €
Forensic DNA Analysis134,99 €
Routledge Handbook of Homicide Studies67,99 €
Kedar PrasadRadiation Injury Prevention and Mitigation in Humans82,99 €
Victor E. KappelerCommunity Policing143,99 €
American College of Forensic Examiners ICertified Forensic Consultant Body of Knowledge55,99 €-
-
-
A unique and comprehensive overview of the field and its current issues, Cybercriminology analyzes cybercrimes through the lens of criminology. Featuring an accessible, conversational writing style, it first discusses traditional criminological theories of criminal behavior and then analyzes how these theories--the existing literature and empirical studies--can be applied to explain cybercrimes. The text also introduces students to types of cybercrime, the nature and extent of cybercrime in the U.S. and abroad, and victim and offender behavior in the online environment. FEATURES * Real-world case studies and examples demonstrate the extent and complexity of cybercriminology * Boxed features present compelling research topics and scenarios * Review questions stimulate classroom discussions * An Ancillary Resource Center contains an Instructor's Manual, a Test Bank, and PowerPoint lecture outlines
Produktdetails
- Produktdetails
- Verlag: OXFORD UNIV PR
- Seitenzahl: 444
- Erscheinungstermin: 18. November 2016
- Englisch
- Abmessung: 235mm x 191mm x 24mm
- Gewicht: 823g
- ISBN-13: 9780190278441
- ISBN-10: 0190278447
- Artikelnr.: 47868095
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: OXFORD UNIV PR
- Seitenzahl: 444
- Erscheinungstermin: 18. November 2016
- Englisch
- Abmessung: 235mm x 191mm x 24mm
- Gewicht: 823g
- ISBN-13: 9780190278441
- ISBN-10: 0190278447
- Artikelnr.: 47868095
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Marie-Helen Maras is an Associate Professor at John Jay College of Criminal Justice.
*
* PART 1. THE NATURE AND EXTENT OF CYBERCRIME
* Chapter 1. Cybercrime and Cybercriminals: The Development of
Cybercriminology
* Cybercrime: The Basics
* Cybercrime Categories
* Cybertrespass and Cybervandalism
* Cybertheft
* Interpersonal Cybercrime
* Cyberdeviance and Public Order Cybercrimes
* Organized Cybercrime
* Political Cybercrime
* The Field of Cybercriminology
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 2. Measuring Cybercrime
* Uniform Crime Reporting Program
* National Incident-Based Reporting System
* Underreporting of Cybercrime
* National Crime Victimization Survey
* Other National Victimization Surveys
* Self-Report Survey
* National Computer Security Survey
* Other Business Surveys
* International Measurements of Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 3. Cybervictimization
* Being a Cybervictim and All That It Entails
* The Profile of a Cybervictim
* Victimization Theories
* Victim Precipitation Theory
* Lifestyle Exposure Theory
* Routine Activities Theory
* Case Study
* Review Questions
* Definitions
* Endnotes
* PART 2. CYBERCRIME CAUSATION AND REDUCTION
* Chapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and
Reduction of Cyberoffending
* The Reasoning Cybercriminal
* Seductions and Repulsions of Cybercrime
* Punishing Cybercriminals
* Retributive Perspective
*
* Utilitarian Perspective
*
*
* Reducing Cybercrime
* Cybercrime Laws
* Cybercrime Enforcement
* Situational Crime Prevention
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 5. Cybercrime and the Propensity to Offend
* The Positivist School and Trait Theories
* Cybercriminals: Born That Way
*
*
*
* The Intelligence of Cybercriminals and the Psychology of Cybercrime:
The New Positivists
* Intelligence
* Mental Disorders
* Personality Theories
* Psychoanalytical Theories
* Attachment Theory
* Internet Addiction and Cybercrime
* Measuring Internet Addiction
* Treatment
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 6. Cybercrime, Culture, and Inequality
* Chicago School of Criminology
* Social Disorganization Theory
*
* --Cyberspace: Applying the Broken Windows Theory
* Anomie Theory
* Institutional Anomie Theory
* Relative Deprivation Theory
* General Strain Theory
* Cultural Deviance Theories
* Delinquent Subculture Theory
* Differential Opportunity Theory
* Subcultures in the Virtual Environment
* Case Study
* Review Questions
* Definitions
* Endnotes
* Chapter 7. Conformity, Learning, and Sources of Social Control
* Controlling Cybercriminality
* Learning Cybercriminality
* Neutralizing Cyberoffenses
* Moral Disengagement
* Disinhibition, Deindividuation, and Anonymity
* Developmental and Life-Course Cybercriminology
* Latent Trait Perspective
*
* Life-Course Perspective
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 8. Constructing and Reacting to Cybercrime: Labeling and
Moral Panics
* Labeling Cybercriminals
* Shaming, Censorship, and Defiance
* Cybercriminals as "The Others"
* Moral Panics
*
*
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender
* Marxist Criminology
* Left Realism
* Peacemaking Criminology
* Feminist Criminology
* Variations in Cybercriminality: Mind the Gender Gap
* Cyberfeminism
* #GamerGate
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* PART 3. CYBERCRIME TYPOLOGIES
* Chapter 10. Interpersonal Cybercrime
* Internet Trolls
* Cyberstalking
* Criminalizing and Responding to Cyberstalking
* Cyberharassment
* Criminalizing and Responding to Cyberharassment
* Revenge Porn as Cyberharassment
* Cyberbullying
* Criminalizing and Responding to Cyberbullying
* Sextortion
* Online Child Sexual Predation
* Online Child Grooming
* Criminalizing and Responding to Internet Sex Offenders and Child
Pornography
* Sexting
* Controlling Interpersonal Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 11. Cybertrespass, Cybervandalism, and Cybertheft
* Cybertrespass and Cybervandalism
* Hacking
* Malware
* Denial of Service and Distributed Denial of Service Attacks
* Website Defacement
* Cybertheft
* Cyberidentity Theft
*
*
*
* Intellectual Property Theft
* Controlling Cybertrespass, Cybervandalism, and Cybertheft
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 12. Deviant Cyberacts and Public Order Cybercrimes:
Paraphilia, Prostitution, Substance Abuse, and Gambling
* The Relationship Between Law and Morality
* Cyberdeviance
* Paraphilia Online
* Public Order Cybercrimes
* Prostitution
*
* --Can a Website Be a House of Prostitution?
* --Prostitution: There Is An App for That
*
*
*
* Substance Abuse and Drugs Online
*
* --Differentiating Licit, Illicit, and Fake Online Pharmacies
* Internet Gambling
*
*
* Controlling Cyberdeviance and Public Order Cybercrimes
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 13. Organized Cybercrime
* Organized Cybercrime: An Introduction
* Activities of Organized Cybercriminals
* Crime as a Service
* Money Laundering
* Drug Trafficking
* Surface Web vs. Deep Web
*
* --Silk Road
* Human Trafficking
* Nature and Extent of Human Trafficking
* Human Traffickers: Targets and Tactics of Control
* Human Traffickers: Online Tactics
* Organ Trafficking
* Firearms Trafficking
* Cigarette Trafficking
* Wildlife Trafficking
* Controlling Organized Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 14. Political Cybercrime
* Types of Political Cybercrime
* Hacktivism
* Cyberespionage
* Cyberterrorism
* Cyberwarfare
*
* Controlling Political Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
*
*
* PART 1. THE NATURE AND EXTENT OF CYBERCRIME
* Chapter 1. Cybercrime and Cybercriminals: The Development of
Cybercriminology
* Cybercrime: The Basics
* Cybercrime Categories
* Cybertrespass and Cybervandalism
* Cybertheft
* Interpersonal Cybercrime
* Cyberdeviance and Public Order Cybercrimes
* Organized Cybercrime
* Political Cybercrime
* The Field of Cybercriminology
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 2. Measuring Cybercrime
* Uniform Crime Reporting Program
* National Incident-Based Reporting System
* Underreporting of Cybercrime
* National Crime Victimization Survey
* Other National Victimization Surveys
* Self-Report Survey
* National Computer Security Survey
* Other Business Surveys
* International Measurements of Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 3. Cybervictimization
* Being a Cybervictim and All That It Entails
* The Profile of a Cybervictim
* Victimization Theories
* Victim Precipitation Theory
* Lifestyle Exposure Theory
* Routine Activities Theory
* Case Study
* Review Questions
* Definitions
* Endnotes
* PART 2. CYBERCRIME CAUSATION AND REDUCTION
* Chapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and
Reduction of Cyberoffending
* The Reasoning Cybercriminal
* Seductions and Repulsions of Cybercrime
* Punishing Cybercriminals
* Retributive Perspective
*
* Utilitarian Perspective
*
*
* Reducing Cybercrime
* Cybercrime Laws
* Cybercrime Enforcement
* Situational Crime Prevention
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 5. Cybercrime and the Propensity to Offend
* The Positivist School and Trait Theories
* Cybercriminals: Born That Way
*
*
*
* The Intelligence of Cybercriminals and the Psychology of Cybercrime:
The New Positivists
* Intelligence
* Mental Disorders
* Personality Theories
* Psychoanalytical Theories
* Attachment Theory
* Internet Addiction and Cybercrime
* Measuring Internet Addiction
* Treatment
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 6. Cybercrime, Culture, and Inequality
* Chicago School of Criminology
* Social Disorganization Theory
*
* --Cyberspace: Applying the Broken Windows Theory
* Anomie Theory
* Institutional Anomie Theory
* Relative Deprivation Theory
* General Strain Theory
* Cultural Deviance Theories
* Delinquent Subculture Theory
* Differential Opportunity Theory
* Subcultures in the Virtual Environment
* Case Study
* Review Questions
* Definitions
* Endnotes
* Chapter 7. Conformity, Learning, and Sources of Social Control
* Controlling Cybercriminality
* Learning Cybercriminality
* Neutralizing Cyberoffenses
* Moral Disengagement
* Disinhibition, Deindividuation, and Anonymity
* Developmental and Life-Course Cybercriminology
* Latent Trait Perspective
*
* Life-Course Perspective
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 8. Constructing and Reacting to Cybercrime: Labeling and
Moral Panics
* Labeling Cybercriminals
* Shaming, Censorship, and Defiance
* Cybercriminals as "The Others"
* Moral Panics
*
*
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender
* Marxist Criminology
* Left Realism
* Peacemaking Criminology
* Feminist Criminology
* Variations in Cybercriminality: Mind the Gender Gap
* Cyberfeminism
* #GamerGate
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* PART 3. CYBERCRIME TYPOLOGIES
* Chapter 10. Interpersonal Cybercrime
* Internet Trolls
* Cyberstalking
* Criminalizing and Responding to Cyberstalking
* Cyberharassment
* Criminalizing and Responding to Cyberharassment
* Revenge Porn as Cyberharassment
* Cyberbullying
* Criminalizing and Responding to Cyberbullying
* Sextortion
* Online Child Sexual Predation
* Online Child Grooming
* Criminalizing and Responding to Internet Sex Offenders and Child
Pornography
* Sexting
* Controlling Interpersonal Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 11. Cybertrespass, Cybervandalism, and Cybertheft
* Cybertrespass and Cybervandalism
* Hacking
* Malware
* Denial of Service and Distributed Denial of Service Attacks
* Website Defacement
* Cybertheft
* Cyberidentity Theft
*
*
*
* Intellectual Property Theft
* Controlling Cybertrespass, Cybervandalism, and Cybertheft
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 12. Deviant Cyberacts and Public Order Cybercrimes:
Paraphilia, Prostitution, Substance Abuse, and Gambling
* The Relationship Between Law and Morality
* Cyberdeviance
* Paraphilia Online
* Public Order Cybercrimes
* Prostitution
*
* --Can a Website Be a House of Prostitution?
* --Prostitution: There Is An App for That
*
*
*
* Substance Abuse and Drugs Online
*
* --Differentiating Licit, Illicit, and Fake Online Pharmacies
* Internet Gambling
*
*
* Controlling Cyberdeviance and Public Order Cybercrimes
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 13. Organized Cybercrime
* Organized Cybercrime: An Introduction
* Activities of Organized Cybercriminals
* Crime as a Service
* Money Laundering
* Drug Trafficking
* Surface Web vs. Deep Web
*
* --Silk Road
* Human Trafficking
* Nature and Extent of Human Trafficking
* Human Traffickers: Targets and Tactics of Control
* Human Traffickers: Online Tactics
* Organ Trafficking
* Firearms Trafficking
* Cigarette Trafficking
* Wildlife Trafficking
* Controlling Organized Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 14. Political Cybercrime
* Types of Political Cybercrime
* Hacktivism
* Cyberespionage
* Cyberterrorism
* Cyberwarfare
*
* Controlling Political Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
*
*
*
* PART 1. THE NATURE AND EXTENT OF CYBERCRIME
* Chapter 1. Cybercrime and Cybercriminals: The Development of
Cybercriminology
* Cybercrime: The Basics
* Cybercrime Categories
* Cybertrespass and Cybervandalism
* Cybertheft
* Interpersonal Cybercrime
* Cyberdeviance and Public Order Cybercrimes
* Organized Cybercrime
* Political Cybercrime
* The Field of Cybercriminology
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 2. Measuring Cybercrime
* Uniform Crime Reporting Program
* National Incident-Based Reporting System
* Underreporting of Cybercrime
* National Crime Victimization Survey
* Other National Victimization Surveys
* Self-Report Survey
* National Computer Security Survey
* Other Business Surveys
* International Measurements of Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 3. Cybervictimization
* Being a Cybervictim and All That It Entails
* The Profile of a Cybervictim
* Victimization Theories
* Victim Precipitation Theory
* Lifestyle Exposure Theory
* Routine Activities Theory
* Case Study
* Review Questions
* Definitions
* Endnotes
* PART 2. CYBERCRIME CAUSATION AND REDUCTION
* Chapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and
Reduction of Cyberoffending
* The Reasoning Cybercriminal
* Seductions and Repulsions of Cybercrime
* Punishing Cybercriminals
* Retributive Perspective
*
* Utilitarian Perspective
*
*
* Reducing Cybercrime
* Cybercrime Laws
* Cybercrime Enforcement
* Situational Crime Prevention
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 5. Cybercrime and the Propensity to Offend
* The Positivist School and Trait Theories
* Cybercriminals: Born That Way
*
*
*
* The Intelligence of Cybercriminals and the Psychology of Cybercrime:
The New Positivists
* Intelligence
* Mental Disorders
* Personality Theories
* Psychoanalytical Theories
* Attachment Theory
* Internet Addiction and Cybercrime
* Measuring Internet Addiction
* Treatment
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 6. Cybercrime, Culture, and Inequality
* Chicago School of Criminology
* Social Disorganization Theory
*
* --Cyberspace: Applying the Broken Windows Theory
* Anomie Theory
* Institutional Anomie Theory
* Relative Deprivation Theory
* General Strain Theory
* Cultural Deviance Theories
* Delinquent Subculture Theory
* Differential Opportunity Theory
* Subcultures in the Virtual Environment
* Case Study
* Review Questions
* Definitions
* Endnotes
* Chapter 7. Conformity, Learning, and Sources of Social Control
* Controlling Cybercriminality
* Learning Cybercriminality
* Neutralizing Cyberoffenses
* Moral Disengagement
* Disinhibition, Deindividuation, and Anonymity
* Developmental and Life-Course Cybercriminology
* Latent Trait Perspective
*
* Life-Course Perspective
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 8. Constructing and Reacting to Cybercrime: Labeling and
Moral Panics
* Labeling Cybercriminals
* Shaming, Censorship, and Defiance
* Cybercriminals as "The Others"
* Moral Panics
*
*
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender
* Marxist Criminology
* Left Realism
* Peacemaking Criminology
* Feminist Criminology
* Variations in Cybercriminality: Mind the Gender Gap
* Cyberfeminism
* #GamerGate
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* PART 3. CYBERCRIME TYPOLOGIES
* Chapter 10. Interpersonal Cybercrime
* Internet Trolls
* Cyberstalking
* Criminalizing and Responding to Cyberstalking
* Cyberharassment
* Criminalizing and Responding to Cyberharassment
* Revenge Porn as Cyberharassment
* Cyberbullying
* Criminalizing and Responding to Cyberbullying
* Sextortion
* Online Child Sexual Predation
* Online Child Grooming
* Criminalizing and Responding to Internet Sex Offenders and Child
Pornography
* Sexting
* Controlling Interpersonal Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 11. Cybertrespass, Cybervandalism, and Cybertheft
* Cybertrespass and Cybervandalism
* Hacking
* Malware
* Denial of Service and Distributed Denial of Service Attacks
* Website Defacement
* Cybertheft
* Cyberidentity Theft
*
*
*
* Intellectual Property Theft
* Controlling Cybertrespass, Cybervandalism, and Cybertheft
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 12. Deviant Cyberacts and Public Order Cybercrimes:
Paraphilia, Prostitution, Substance Abuse, and Gambling
* The Relationship Between Law and Morality
* Cyberdeviance
* Paraphilia Online
* Public Order Cybercrimes
* Prostitution
*
* --Can a Website Be a House of Prostitution?
* --Prostitution: There Is An App for That
*
*
*
* Substance Abuse and Drugs Online
*
* --Differentiating Licit, Illicit, and Fake Online Pharmacies
* Internet Gambling
*
*
* Controlling Cyberdeviance and Public Order Cybercrimes
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 13. Organized Cybercrime
* Organized Cybercrime: An Introduction
* Activities of Organized Cybercriminals
* Crime as a Service
* Money Laundering
* Drug Trafficking
* Surface Web vs. Deep Web
*
* --Silk Road
* Human Trafficking
* Nature and Extent of Human Trafficking
* Human Traffickers: Targets and Tactics of Control
* Human Traffickers: Online Tactics
* Organ Trafficking
* Firearms Trafficking
* Cigarette Trafficking
* Wildlife Trafficking
* Controlling Organized Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 14. Political Cybercrime
* Types of Political Cybercrime
* Hacktivism
* Cyberespionage
* Cyberterrorism
* Cyberwarfare
*
* Controlling Political Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
*
*
* PART 1. THE NATURE AND EXTENT OF CYBERCRIME
* Chapter 1. Cybercrime and Cybercriminals: The Development of
Cybercriminology
* Cybercrime: The Basics
* Cybercrime Categories
* Cybertrespass and Cybervandalism
* Cybertheft
* Interpersonal Cybercrime
* Cyberdeviance and Public Order Cybercrimes
* Organized Cybercrime
* Political Cybercrime
* The Field of Cybercriminology
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 2. Measuring Cybercrime
* Uniform Crime Reporting Program
* National Incident-Based Reporting System
* Underreporting of Cybercrime
* National Crime Victimization Survey
* Other National Victimization Surveys
* Self-Report Survey
* National Computer Security Survey
* Other Business Surveys
* International Measurements of Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 3. Cybervictimization
* Being a Cybervictim and All That It Entails
* The Profile of a Cybervictim
* Victimization Theories
* Victim Precipitation Theory
* Lifestyle Exposure Theory
* Routine Activities Theory
* Case Study
* Review Questions
* Definitions
* Endnotes
* PART 2. CYBERCRIME CAUSATION AND REDUCTION
* Chapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and
Reduction of Cyberoffending
* The Reasoning Cybercriminal
* Seductions and Repulsions of Cybercrime
* Punishing Cybercriminals
* Retributive Perspective
*
* Utilitarian Perspective
*
*
* Reducing Cybercrime
* Cybercrime Laws
* Cybercrime Enforcement
* Situational Crime Prevention
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 5. Cybercrime and the Propensity to Offend
* The Positivist School and Trait Theories
* Cybercriminals: Born That Way
*
*
*
* The Intelligence of Cybercriminals and the Psychology of Cybercrime:
The New Positivists
* Intelligence
* Mental Disorders
* Personality Theories
* Psychoanalytical Theories
* Attachment Theory
* Internet Addiction and Cybercrime
* Measuring Internet Addiction
* Treatment
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 6. Cybercrime, Culture, and Inequality
* Chicago School of Criminology
* Social Disorganization Theory
*
* --Cyberspace: Applying the Broken Windows Theory
* Anomie Theory
* Institutional Anomie Theory
* Relative Deprivation Theory
* General Strain Theory
* Cultural Deviance Theories
* Delinquent Subculture Theory
* Differential Opportunity Theory
* Subcultures in the Virtual Environment
* Case Study
* Review Questions
* Definitions
* Endnotes
* Chapter 7. Conformity, Learning, and Sources of Social Control
* Controlling Cybercriminality
* Learning Cybercriminality
* Neutralizing Cyberoffenses
* Moral Disengagement
* Disinhibition, Deindividuation, and Anonymity
* Developmental and Life-Course Cybercriminology
* Latent Trait Perspective
*
* Life-Course Perspective
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 8. Constructing and Reacting to Cybercrime: Labeling and
Moral Panics
* Labeling Cybercriminals
* Shaming, Censorship, and Defiance
* Cybercriminals as "The Others"
* Moral Panics
*
*
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender
* Marxist Criminology
* Left Realism
* Peacemaking Criminology
* Feminist Criminology
* Variations in Cybercriminality: Mind the Gender Gap
* Cyberfeminism
* #GamerGate
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* PART 3. CYBERCRIME TYPOLOGIES
* Chapter 10. Interpersonal Cybercrime
* Internet Trolls
* Cyberstalking
* Criminalizing and Responding to Cyberstalking
* Cyberharassment
* Criminalizing and Responding to Cyberharassment
* Revenge Porn as Cyberharassment
* Cyberbullying
* Criminalizing and Responding to Cyberbullying
* Sextortion
* Online Child Sexual Predation
* Online Child Grooming
* Criminalizing and Responding to Internet Sex Offenders and Child
Pornography
* Sexting
* Controlling Interpersonal Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 11. Cybertrespass, Cybervandalism, and Cybertheft
* Cybertrespass and Cybervandalism
* Hacking
* Malware
* Denial of Service and Distributed Denial of Service Attacks
* Website Defacement
* Cybertheft
* Cyberidentity Theft
*
*
*
* Intellectual Property Theft
* Controlling Cybertrespass, Cybervandalism, and Cybertheft
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 12. Deviant Cyberacts and Public Order Cybercrimes:
Paraphilia, Prostitution, Substance Abuse, and Gambling
* The Relationship Between Law and Morality
* Cyberdeviance
* Paraphilia Online
* Public Order Cybercrimes
* Prostitution
*
* --Can a Website Be a House of Prostitution?
* --Prostitution: There Is An App for That
*
*
*
* Substance Abuse and Drugs Online
*
* --Differentiating Licit, Illicit, and Fake Online Pharmacies
* Internet Gambling
*
*
* Controlling Cyberdeviance and Public Order Cybercrimes
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 13. Organized Cybercrime
* Organized Cybercrime: An Introduction
* Activities of Organized Cybercriminals
* Crime as a Service
* Money Laundering
* Drug Trafficking
* Surface Web vs. Deep Web
*
* --Silk Road
* Human Trafficking
* Nature and Extent of Human Trafficking
* Human Traffickers: Targets and Tactics of Control
* Human Traffickers: Online Tactics
* Organ Trafficking
* Firearms Trafficking
* Cigarette Trafficking
* Wildlife Trafficking
* Controlling Organized Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
* Chapter 14. Political Cybercrime
* Types of Political Cybercrime
* Hacktivism
* Cyberespionage
* Cyberterrorism
* Cyberwarfare
*
* Controlling Political Cybercrime
* Case Study
* Review Questions
* Laws
* Definitions
* Endnotes
*
*







