图书介绍
CYBER CRIMINOLOGY EXPLORING INTERNET CRIMES AND CRIMINAL BEHAVIOR2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- K.JAISHANKAR 著
- 出版社: CRC PRESS
- ISBN:1439829497
- 出版时间:2011
- 标注页数:425页
- 文件大小:20MB
- 文件页数:455页
- 主题词:
PDF下载
下载说明
CYBER CRIMINOLOGY EXPLORING INTERNET CRIMES AND CRIMINAL BEHAVIORPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Section Ⅰ DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE3
1 Cafe Culture and Heresy of Yahooboyism in Nigeria&ADEBUSUYII. ADENIRAN3
2 Internet Gambling&HENRY N. PONTELL, GILBERT GEIS, AND GREGORY C. BROWN13
Section Ⅱ PERPETRATORS' PERSPECTIVES AND OFFENDER USE OF THE INTERNET31
3 Identity Construction Among Hackers&ORLY TURGEMAN-GOLDSCHMIDT31
4 Virtual Sex Offenders: A Clinical Perspective&KIMBERLY YOUNG53
5 Self-Reported Internet Child Pornography Consumers: A Personality Assessment Using Bandura's Theory of Reciprocal Determinism&KATHRYN C. SEIGFRIED-SPELLAR, RICHARD W.LOVELY, AND MARCUS K. ROGERS65
6 Online Social Networking and Pedophilia: An Experimental Research "Sting"&RODERIC BROADHURST AND KASUN JAYAWARDENA79
7 Adult-Child Sex Advocacy Websites as Learning Environments for Crime&ROB D'OVIDIO, TYSON MITMAN, IMAANI JAMILLAH EL-BURKI, AND WESLEY SHUMAR103
8 The Internet as a Terrorist's Tool: A Social Learning Perspective&TINA FREIBURGER AND JEFFREY S. CRANE127
Section Ⅲ DIGITAL PIRACY141
9 Value and Choice: Examining Their Roles in Digital Piracy&GEORGE E. HIGGINS141
10 Suing the Genie Back in the Bottle: The Failed RIAA Strategy to Deter P2P Network Users&MICHAEL BACHMANN155
11 Criminological Predictors of Digital Piracy: A Path Analysis&WHITNEY D. GUNTER173
12 Change of Music Piracy and Neutralization: An Examination Using Short-Term Longitudinal Data&GEORGE E. HIGGINS, SCOTT E. WOLFE, AND CATHERINE D. MARCUM193
13 Digital File Sharing: An Examination of Neutralization and Rationalization Techniques Employed by Digital File Sharers&ROBERT MOORE209
Section Ⅳ CYBER VICTIMIZATION229
14 Cyber-Routine Activities: Empirical Examination of Online Lifestyle, Digital Guardians, and Computer-Crime Victimization&KYUNG-SHICK CHOI229
15 Adolescent Online Victimization and Constructs of Routine Activities Theory&CATHERINE D. MARCUM253
16 Cyber Stalking: Typology, Etiology, and Victims&MICHAEL L. PITTARO277
17 Online Social Networking and Women Victims&DEBARATI HALDER AND K. JAISHANKAR299
18 Malware Victimization: A Routine Activities Framework&ADAM M. BOSSLER AND THOMAS J. HOLT317
Section Ⅴ LEGAL AND POLICY ISSUES OF CYBER CRIMES347
19 Fatwas Chaos Ignites Cyber Vandalism: Does Islamic Criminal Law Prohibit Cyber Vandalism?&ALAELDIN MANSOUR MAGHAIREH347
20 Cyber Bullying: Legal Obligations and Educational Policy Vacuum&SHAHEEN SHARIFF AND DIANNE L. HOFF357
21 Human Rights Infringement in the Digital Age&RUSSELL G. SMITH393
Conclusion&K. JAISHANKAR411
Index415
热门推荐
- 343409.html
- 2388540.html
- 2952390.html
- 1564005.html
- 350159.html
- 3644322.html
- 192272.html
- 2597171.html
- 372692.html
- 399778.html
- http://www.ickdjs.cc/book_1185926.html
- http://www.ickdjs.cc/book_2305596.html
- http://www.ickdjs.cc/book_3594340.html
- http://www.ickdjs.cc/book_1140767.html
- http://www.ickdjs.cc/book_2938402.html
- http://www.ickdjs.cc/book_23462.html
- http://www.ickdjs.cc/book_3888382.html
- http://www.ickdjs.cc/book_169696.html
- http://www.ickdjs.cc/book_3012504.html
- http://www.ickdjs.cc/book_3210375.html