Correlates, Causes, and Context, Third Edition
Read your book anywhere, on any device, through RedShelf's cloud based eReader.
Digital Notes and Study Tools
Built-in study tools include highlights, study guides, annotations, definitions, flashcards, and collaboration.
The publisher of this book allows a portion of the content to be used offline.
The publisher of this book allows a portion of the content to be printed.
Additional Book Details
The ubiquity of computers and the role of the Internet have drastically changed the landscape of crime and deviance. Computer technology enables offenders to anonymously target victims around the world, connect with others who share their interests, and participate in various crimes. The Internet and cellular telephony are increasingly incorporated into real world offenses, such as prostitution, where sex workers and clients can connect with minimal risk of detection. At the same time, new forms of offending have emerged as a direct consequence of technology, such as computer hacking, which can be used for both beneficial and illegal purposes. The Internet has also become an important environment for extremists and terror groups to communicate their beliefs globally in order to recruit others and generate funds.
In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime Online uses empirical tests and unique data to provide detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes. This text also includes a comprehensive exploration of cyberterrorism and activism in online environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level.
Specifically, the third edition includes updated sections on digital piracy and cyberterror. Three new chapters by well-known authors in the field include a qualitative assessment of computer hacking and fraud through a lens of criminological theory, an examination of experiences with the customers of prostitutes in an online review forum, and an overview of the state of cyberstalking research over the last decade. These revisions extend the scope of the third edition and make it an extremely valuable text for cybercrime scholars and students alike.
|Sold By||Carolina Academic Press|
|ISBNs||1611639204, 1611636779, 9781611636772, 978-1-61163-677-2, 9781611639209|