Cybercriminology by Marie-helen MarasCybercriminology by Marie-helen Maras

Cybercriminology

byMarie-helen Maras

Paperback | December 2, 2016

Pricing and Purchase Info

$49.97 online 
$99.95 list price save 50%
Earn 250 plum® points
Quantity:

Ships within 1-3 weeks

Ships free on orders over $25

Not available in stores

about

A unique and comprehensive overview of the field and its current issues, Cybercriminology analyzes cybercrimes through the lens of criminology. Featuring an accessible, conversational writing style, it first discusses traditional criminological theories of criminal behavior and then analyzeshow these theories - the existing literature and empirical studies - can be applied to explain cybercrimes. The text also introduces students to types of cybercrime, the nature and extent of cybercrime in the U.S. and abroad, and victim and offender behavior in the online environment.
Marie-Helen Maras is an Associate Professor at John Jay College of Criminal Justice.
Loading
Title:CybercriminologyFormat:PaperbackDimensions:448 pages, 9.09 × 7.52 × 0.71 inPublished:December 2, 2016Publisher:Oxford University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0190278447

ISBN - 13:9780190278441

Look for similar items by category:

Reviews

Table of Contents

PrefacePART 1. THE NATURE AND EXTENT OF CYBERCRIME1. Cybercrime and Cybercriminals: The Development of Cybercriminology1. Cybercrime: The Basics2. Cybercrime CategoriesA. Cybertrespass and CybervandalismB. CybertheftC. Interpersonal CybercrimeD. Cyberdeviance and Public Order CybercrimesE. Organized CybercrimeF. Political Cybercrime3. The Field of Cybercriminology4. Case Study5. Review Questions6. Laws7. Definitions8. Endnotes2. Measuring Cybercrime1. Uniform Crime Reporting Program2. National Incident Based Reporting SystemA. Underreporting of Cybercrime3. National Crime Victimization SurveyA. Other National Victimization Surveys4. Self-Report Survey5. National Computer Security SurveyA. Other Business Surveys6. International Measurements of Cybercrime7. Case Study8. Review Questions9. Laws10. Definitions11. Endnotes3. Cybervictimization1. Being a Cybervictim and All That it EntailsA. The Profile of a Cybervictim2. Victimization TheoriesA. Victim Precipitation TheoryB. Lifestyle Exposure TheoryC. Routine Activities Theory3. Case Study4. Review Questions5. Laws6. Definitions7. EndnotesPART 2. CYBERCRIME CAUSATION AND REDUCTION4. Cybercrime, Rational Choice, and Emotions: Punishment and Reduction of Cyberoffending1. The Reasoning Cybercriminal2. Seductions and Repulsions of Cybercrime3. Punishing CybercriminalsA. Retributive Perspectivei. Cybercriminals Getting their "Just Deserts"B. Utilitarian Perspectivei. Incapacitation and RehabilitationC. Deterrence4. Reducing CybercrimeA. Cybercrime LawsB. Cybercrime EnforcementC. Situational Crime Prevention5. Case Study6. Review Questions7. Laws8. Definitions9. Endnotes5. Cybercrime and the Propensity to Offend1. The Positivist School and Trait TheoriesA. Cybercriminals: Born That Wayi. Physiological Characteristicsii. Brain Abnormalitiesiii. Hormones2. The Intelligence of Cybercriminals and Psychology of Cybercrime: The New PositivistsA. IntelligenceB. Mental DisordersC. Personality TheoriesD. Psychoanalytical TheoriesE. Attachment Theory3. Internet Addiction and CybercrimeA. Measuring Internet AddictionB. Treatment4. Case Study5. Review Questions6. Laws7. Definitions8. Endnotes6. Cybercrime, Culture, and Inequality1. Chicago School of CriminologyA. Social Disorganization Theoryi. Social Capital and Collective Efficacya. Cyberspace: Applying the Broken Windows Theory2. Anomie Theory3. Institutional Anomie Theory4. Relative Deprivation Theory5. A General Strain Theory of Cybercrime6. Cultural Deviance TheoriesA. Delinquent Subculture TheoryB. Differential Opportunity Theoryi. Subcultures in the Virtual Environment7. Case Study8. Review Questions9. Laws10. Definitions11. Endnotes7. Conformity, Learning, and Sources of Social Control1. Controlling Cybercriminality2. Learning Cybercriminality3. Neutralizing CyberoffensesA. Moral Disengagementi. Disinhibition, Deindividuation, and Anonymity4. Developmental and Life Course CybercriminologyA. Latent Trait Perspectivei. A General Theory of CybercrimeB. Life Course Perspective5. Case Study6. Review Questions7. Laws8. Definitions9. Endnotes8. Constructing and Reacting to Cybercrime: Labels and Moral Panics1. Labeling CybercriminalsA. Shaming, Censorship, and Defiance2. Cybercriminals as the "Others"A. Moral Panicsi. The Internet Gaming Moral Panic3. Case Study4. Review Questions5. Laws6. Definitions7. Endnotes9. Conflict Cybercriminology: Cybercrime, Power, and Gender1. Marxist Criminology2. Left Realism3. Peacemaking Criminology4. Feminist CriminologyA. Variations in Cybercriminality: Mind the Gender GapB. Cyberfeminism5. #GamerGate6. Case Study7. Review Questions8. Laws9. Definitions10. EndnotesPART 3. CYBERCRIME TYPOLOGIES10. Interpersonal Cybercrime1. Internet Trolls2. CyberstalkingA. Criminalizing and Responding to Cyberstalking3. CyberharassmentA. Criminalizing and Responding to CyberharassmentB. Revenge Porn as Cyberharassment4. CyberbullyingA. Criminalizing and Responding to Cyberbullying5. Sextortion6. Online Child Sexual PredationA. Online Child GroomingB. Criminalizing and Responding to Internet Sex Offenders and Child Pornography7. Sexting8. Controlling Interpersonal Cybercrime9. Case Study10. Review Questions11. Laws12. Definitions13. Endnotes11. Cybertrespass, Cybervandalism, and Cybertheft1. Cybertrespass and CybervandalismA. HackingB. MalwareC. Denial of Service and Distributed Denial of Service AttacksD. Website Defacement2. CybertheftA. Cyberidentity thefti. Data Breachesii. Medical Identity Theftiii. Internet of ThingsB. Intellectual Property Theft3. Controlling Cybertrespass, Cybervandalism, and Cybertheft4. Case Study5. Review Questions6. Laws7. Definitions8. Endnotes12. Deviant Cyberacts and Public Order Cybercrimes: Prostitution, Gambling and Substance Abuse1. The Relationship Between Law and Morality2. CyberdevianceA. Paraphilia Online3. Public Order CybercrimesA. Cyberprostitutioni. The Facilitation of Prostitution via the Interneta. Can a Website Be a House of Prostitution?b. Prostitution: There is An App for Thatii. Escorts: Prostitutes with a Different Name?iii. Juvenile Prostitutioniv. Cyberprostitution, Cybersex, and CyberpornographyB. Substance Abuse and Drugs Onlinei. Online Pharmaciesa. Differentiating Licit, Illicit, and Fake Online PharmaciesC. Internet Gamblingi. Licit and Illicit Online Gambling Sitesii. Regulating Internet Gambling4. Controlling Cyberdeviance and Public Order Cybercrimes5. Case Study6. Review Questions7. Laws8. Definitions9. Endnotes13. Organized Cybercrime1. Organized Cybercrime: An Introduction2. Activities of Organized CybercriminalsA. Crime as a ServiceB. Money Laundering3. Online Drug TraffickingA. Surface Web vs. Deep Webi. Darknet: The Underworld of Cyberspace4. Human TraffickingA. Nature and Extent of Human TraffickingB. Human Traffickers: Targets and Tactics of Controli. Human Traffickers: Online TacticsC. Organ Trafficking5. Firearms Trafficking6. Cigarette Trafficking7. Wildlife Trafficking8. Controlling Organized Cybercrime9. Case Study10. Review Questions11. Laws12. Definitions13. Endnotes14. Political Cybercrime1. Types of Political CybercrimeA. HacktivismB. CyberespionageC. CyberterrorismD. Cyberwarfarei. Laws of War: Can They be Applied to Cyberspace?2. Combating Political Cybercrime3. Case Study4. Review Questions5. Laws6. Definitions7. Endnotes

Editorial Reviews

"This text is an important framing of the emerging work in the criminology of cybercrime, using the traditional criminological tradition." --Timothy Buzzell, Baker University