Für diesen Artikel ist leider kein Bild verfügbar.

Cyberspace Crime

D.S. Wall (Herausgeber)

Buch | Hardcover
608 Seiten
2003
Ashgate Publishing Limited (Verlag)
978-0-7546-2190-4 (ISBN)
209,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Separating the rhetoric from the reality this collection of readings explores the phenomenon of crimes committed using computer networks. The contributors represent a truly eclectic and international section of the online community.
This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.

Theoretical Perspectives and Viewpoints: David Wall (1999) "Cybercrimes" - new wine, no bottles?; P.N. Grabosky and Russell G. Smith (2001) "Digital Crime in the 21st Century"; Alan Norrie (2001) "Dialogue and Debate" - the nature of virtual criminality; Wanda Capeller (2001) "Not Such a Neat Net: Some Comments on Virtual Criminality"; Peter N. Grabosky (2001) "Virtual Criminality: Old Wine in New Bottles?"; Francis Snyder (2001) "Sites of Criminality and Sites of Governance"; Graham Greenleaf (1998) "An Endnote on Regulating Cyberspace" - architecture vs law?. Cybercrimes: Amanda Chandler (1996) "The Changing Definition and Image of Hackers in Popular Discourse"; Liz Duff and Simon Gardiner (1996) "Computer Crime in the Global Village" - strategies for control and regulation - in defence of the hacker; Tim Jordan and Paul Taylor (1998) "A Sociology of Hackers"; David Mann and Mike Sutton (1998) "Netcrime" - more change in the organization of thieving; Dorothy E. Denning (2000) "Cyberterrorism" - the logic bomb versus the truck bomb; David L. Speer (2000) "Redefining Borders" - the challenges of cybercrime; George Smith (1998) "An Electronic Pearl Harbour? Not Likely"; Hedieh Nasheri and Timothy O'Hearn (1999) "The Worldwide Search for Techno-thieves" - international competition v. international co-operation; C. David Freedman (1999) "The Extension of the Criminal Law to Protecting Confidential Commercial Information" - comments on the issues and the cyber-context; Louise Ellison and Yaman Akdeniz (1998) "Cyberstalking" - the regulation of harassment on the internet; Matthew Williams (2000) "Virtually Criminal: Discourse, Deviance and Anxiety within Virtual Communities"; Nadine Strossen (2000) "Cybercrimes vs. Cyberliberties"; Clive Walker and Yaman Akdeniz (1998) "The Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content"; Marty Rimm (1995) "Marketing Pornography on the Information Superhighway" - a survey of 917,410 images, descriptions, short stories, and animations downloaded 8.5 million times by consumers in over 2000 cities in forty countries, provinces, and territories; Catharine MacKinnon (1995) "Vindication and resistance" - a response to the Carnegie Mellon study of pornography in cyberspace; Donna Hoffman and Thomas Novak (1995) A detailed analysis of the conceptual, logical, and methodological flaws in the article - "Marketing Pornography on the Information Superhighway"; Jon Spencer (1999) "Crime on the Internet: Its Presentation and Representation". Criminal Justice Processes: Marc D. Goodman (1997) "Why the Police Don't Care about Computer Crime"; David S. Wall (1998) "Policing and the Regulation of the Internet"; P.K. Manning (2001) "Technology's Ways: Information Technology, Crime Analysis and the Rationalizing of Policing"; Janet B.L. Chan (2001) "The Technological Game: How Information Technology is Transforming Police Practice"; Peter Sommer (1998) "Digital Footprints: Computer Evidence".

Erscheint lt. Verlag 21.5.2003
Reihe/Serie International Library of Criminology, Criminal Justice & Penology
Zusatzinfo index
Sprache englisch
Maße 250 x 175 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Strafrecht Kriminologie
ISBN-10 0-7546-2190-1 / 0754621901
ISBN-13 978-0-7546-2190-4 / 9780754621904
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00