LEADER 05826nam 22006015 450 001 9910349373303321 005 20200705030206.0 010 $a3-319-90307-1 024 7 $a10.1007/978-3-319-90307-1 035 $a(CKB)4100000008962964 035 $a(DE-He213)978-3-319-90307-1 035 $a(PPN)242842208 035 $a(EXLCZ)994100000008962964 100 $a20190617d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Palgrave Handbook of International Cybercrime and Cyberdeviance$b[electronic resource] 210 1$aCham :$cSpringer International Publishing :$cImprint: Palgrave Macmillan,$d2020. 215 $a1 online resource (Approx. 1225 p.) 327 $aFoundations of Technology Use/Abuse and the Criminal Justice System -- Defining cybercrime -- Historical evolutions of Cybercrime: From Computer Crime to Cybercrime -- Legislative frameworks in dealing with cybercrime -- The USA -- The UK -- The EU Convention on Cybercrime -- Asia -- Cybersecurity as an industry -- Technology use, abuse, and public perceptions of cybercrime -- Cyberwarfare and nation-state threats -- The interplay of police and extralegal organizations to combat cybecrime -- Forensic evidence and cybercrime -- Organized Crime and Cybercrime -- The Dark Web as a Platform For Crime -- Criminological Theory and Cybercrime -- Social Learning -- Subcultural Theory -- The General Theory of Crime -- General Strain Theory and Cybercrime -- Digital Drift -- Space Transition Theory -- Routine Activities -- Rational Choice -- Deterrence -- Psychological theories and cybercrime (Cyberpsychology) -- Internet Addiction and Cybercrime -- Critical Theories and Cybercrime -- Cyber-Tresspass -- Computer Hacking and the Hacker Subculture -- Insider Threats, Outsiders, and Nation-States -- Global Voices in Hacking (Multi-national views) -- Hactivism and Cause Based Hackers -- Malicious software threats -- Cybercrime as service operations -- Cyber-Deception and Theft -- Data Breaches and Carding -- Social Engineering -- Identity Theft and Identity Crimes: Global Perspectives -- Romance Scams -- Nigerian Email Schemes -- Phishing and Financial Manipulation -- Digital Piracy as a Social Problem -- Legal Responses to Piracy -- Counterfeiting Products Online -- Cyber-Porn/Obscenity -- Historical Challenges of Technology and Pornographic Content -- Sexual Subcultures and On-line Spaces -- Dating and sexual relationships in the age of the Internet -- Sexting and Social Concerns -- Zoophilia -- BDSM and the Internet Age -- Child Pornography and Child Sexual Exploitation Frameworks -- The Rise of Sex Trafficking On-Line -- Camming and Capping -- Cyber-Violence -- Cyberbulling -- Online Harassment -- Cyberstalking -- Intimate Partner Violence and the Internet: Perspectives -- Technological Facilitation of Gang Activity and Violence -- Hate Speech in Online Spaces -- The Role of Technology in Facilitating Terror and Extremism on and offline -- Suicidal Ideation and Online Platforms -- Cyberwarfare as realized conflict -- Theorizing The Future of Cybercrime -- Criminal Social Networks and the Internet -- Police Legitimacy in the Age of the Internet -- Transforming Punishment as a Function of Technology -- The Rise of Cyberwarriors in Nation-State Relationships -- The Future of Criminological Theory and Cybercrime -- Technological Adoption and Cybercrimes. 330 $aThis Major Reference Work synthesizes the global knowledge on cybercrime from the leading international criminologists and scholars across the social sciences. The constant evolution of technology and our relationship to devices and their misuse creates a complex challenge requiring interdisciplinary knowledge and exploration. This work addresses this need by bringing disparate areas of social science research on cybercrime together. It covers the foundations, history and theoretical aspects of cybercrime, followed by four key sections on the main types of cybercrime: cyber-tresspass, cyber-deception/theft, cyber-porn and obscenity, and cyber-violence, including policy responses to cybercrime. This work will not only demonstrate the current knowledge of cybercrime but also its limitations and directions for future study. . 606 $aComputer crimes 606 $aData protection 606 $aPublic safety 606 $aCriminal behavior 606 $aForensic psychology 606 $aTechnology?Sociological aspects 606 $aCybercrime$3https://scigraph.springernature.com/ontologies/product-market-codes/1B7000 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aCrime Control and Security$3https://scigraph.springernature.com/ontologies/product-market-codes/1BE000 606 $aCriminal Behavior$3https://scigraph.springernature.com/ontologies/product-market-codes/1BG000 606 $aForensic Psychology$3https://scigraph.springernature.com/ontologies/product-market-codes/Y20130 606 $aScience and Technology Studies$3https://scigraph.springernature.com/ontologies/product-market-codes/X22270 615 0$aComputer crimes. 615 0$aData protection. 615 0$aPublic safety. 615 0$aCriminal behavior. 615 0$aForensic psychology. 615 0$aTechnology?Sociological aspects. 615 14$aCybercrime. 615 24$aSecurity. 615 24$aCrime Control and Security. 615 24$aCriminal Behavior. 615 24$aForensic Psychology. 615 24$aScience and Technology Studies. 676 $a364.168 906 $aBOOK 912 $a9910349373303321 996 $aPalgrave Handbook of International Cybercrime and Cyberdeviance$91755154 997 $aUNINA