rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780190278441

Cybercriminology

by
  • ISBN13:

    9780190278441

  • ISBN10:

    0190278447

  • Format: Paperback
  • Copyright: 2016-11-18
  • Publisher: Oxford University Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Buyback Icon We Buy This Book Back!
    In-Store Credit: $14.60
    Check/Direct Deposit: $13.90
    PayPal: $13.90
List Price: $147.19 Save up to $92.20
  • Rent Book $76.90
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Cybercriminology [ISBN: 9780190278441] for the semester, quarter, and short term or search our site for other textbooks by Maras, Marie-Helen. Renting a textbook can save you up to 90% from the cost of buying.

Summary

A unique and comprehensive overview of the field and its current issues, Cybercriminology analyzes cybercrimes through the lens of criminology. Featuring an accessible, conversational writing style, it first discusses traditional criminological theories of criminal behavior and then analyzes how these theories--the existing literature and empirical studies--can be applied to explain cybercrimes. The text also introduces students to types of cybercrime, the nature and extent of cybercrime in the U.S. and abroad, and victim and offender behavior in the online environment.

FEATURES

* Real-world case studies and examples demonstrate the extent and complexity of cybercriminology

* Boxed features present compelling research topics and scenarios

* Review questions stimulate classroom discussions

* An Ancillary Resource Center contains an Instructor's Manual, a Test Bank, and PowerPoint lecture outlines

Author Biography


Marie-Helen Maras is an Associate Professor at John Jay College of Criminal Justice.

Table of Contents


Preface
PART 1. THE NATURE AND EXTENT OF CYBERCRIME
Chapter 1. Cybercrime and Cybercriminals: The Development of Cybercriminology
1. Cybercrime: The Basics
2. Cybercrime Categories
A. Cybertrespass and Cybervandalism
B. Cybertheft
C. Interpersonal Cybercrime
D. Cyberdeviance and Public Order Cybercrimes
E. Organized Cybercrime
F. Political Cybercrime
3. The Field of Cybercriminology
4. Case Study
5. Review Questions
6. Laws
7. Definitions
8. Endnotes
Chapter 2. Measuring Cybercrime
1. Uniform Crime Reporting Program
2. National Incident Based Reporting System
A. Underreporting of Cybercrime
3. National Crime Victimization Survey
A. Other National Victimization Surveys
4. Self-Report Survey
5. National Computer Security Survey
A. Other Business Surveys
6. International Measurements of Cybercrime
7. Case Study
8. Review Questions
9. Laws
10. Definitions
11. Endnotes
Chapter 3. Cybervictimization
1. Being a Cybervictim and All That it Entails
A. The Profile of a Cybervictim
2. Victimization Theories
A. Victim Precipitation Theory
B. Lifestyle Exposure Theory
C. Routine Activities Theory
3. Case Study
4. Review Questions
5. Laws
6. Definitions
7. Endnotes
PART 2. CYBERCRIME CAUSATION AND REDUCTION
Chapter 4. Cybercrime, Rational Choice, and Emotions: Punishment and Reduction of Cyberoffending
1. The Reasoning Cybercriminal
2. Seductions and Repulsions of Cybercrime
3. Punishing Cybercriminals
A. Retributive Perspective
i. Cybercriminals Getting their "Just Deserts"
B. Utilitarian Perspective
i. Incapacitation and Rehabilitation
C. Deterrence
4. Reducing Cybercrime
A. Cybercrime Laws
B. Cybercrime Enforcement
C. Situational Crime Prevention
5. Case Study
6. Review Questions
7. Laws
8. Definitions
9. Endnotes
Chapter 5. Cybercrime and the Propensity to Offend
1. The Positivist School and Trait Theories
A. Cybercriminals: Born That Way
i. Physiological Characteristics
ii. Brain Abnormalities
iii. Hormones
2. The Intelligence of Cybercriminals and Psychology of Cybercrime: The New Positivists
A. Intelligence
B. Mental Disorders
C. Personality Theories
D. Psychoanalytical Theories
E. Attachment Theory
3. Internet Addiction and Cybercrime
A. Measuring Internet Addiction
B. Treatment
4. Case Study
5. Review Questions
6. Laws
7. Definitions
8. Endnotes
Chapter 6. Cybercrime, Culture, and Inequality
1. Chicago School of Criminology
A. Social Disorganization Theory
i. Social Capital and Collective Efficacy
a. Cyberspace: Applying the Broken Windows Theory
2. Anomie Theory
3. Institutional Anomie Theory
4. Relative Deprivation Theory
5. A General Strain Theory of Cybercrime
6. Cultural Deviance Theories
A. Delinquent Subculture Theory
B. Differential Opportunity Theory
i. Subcultures in the Virtual Environment
7. Case Study
8. Review Questions
9. Laws
10. Definitions
11. Endnotes
Chapter 7. Conformity, Learning, and Sources of Social Control
1. Controlling Cybercriminality
2. Learning Cybercriminality
3. Neutralizing Cyberoffenses
A. Moral Disengagement
i. Disinhibition, Deindividuation, and Anonymity
4. Developmental and Life Course Cybercriminology
A. Latent Trait Perspective
i. A General Theory of Cybercrime
B. Life Course Perspective
5. Case Study
6. Review Questions
7. Laws
8. Definitions
9. Endnotes
Chapter 8. Constructing and Reacting to Cybercrime: Labels and Moral Panics
1. Labeling Cybercriminals
A. Shaming, Censorship, and Defiance
2. Cybercriminals as the "Others"
A. Moral Panics
i. The Internet Gaming Moral Panic
3. Case Study
4. Review Questions
5. Laws
6. Definitions
7. Endnotes
Chapter 9. Conflict Cybercriminology: Cybercrime, Power, and Gender
1. Marxist Criminology
2. Left Realism
3. Peacemaking Criminology
4. Feminist Criminology
A. Variations in Cybercriminality: Mind the Gender Gap
B. Cyberfeminism
5. #GamerGate
6. Case Study
7. Review Questions
8. Laws
9. Definitions
10. Endnotes
PART 3. CYBERCRIME TYPOLOGIES
Chapter 10. Interpersonal Cybercrime
1. Internet Trolls
2. Cyberstalking
A. Criminalizing and Responding to Cyberstalking
3. Cyberharassment
A. Criminalizing and Responding to Cyberharassment
B. Revenge Porn as Cyberharassment
4. Cyberbullying
A. Criminalizing and Responding to Cyberbullying
5. Sextortion
6. Online Child Sexual Predation
A. Online Child Grooming
B. Criminalizing and Responding to Internet Sex Offenders and Child Pornography
7. Sexting
8. Controlling Interpersonal Cybercrime
9. Case Study
10. Review Questions
11. Laws
12. Definitions
13. Endnotes
Chapter 11. Cybertrespass, Cybervandalism, and Cybertheft
1. Cybertrespass and Cybervandalism
A. Hacking
B. Malware
C. Denial of Service and Distributed Denial of Service Attacks
D. Website Defacement
2. Cybertheft
A. Cyberidentity theft
i. Data Breaches
ii. Medical Identity Theft
iii. Internet of Things
B. Intellectual Property Theft
3. Controlling Cybertrespass, Cybervandalism, and Cybertheft
4. Case Study
5. Review Questions
6. Laws
7. Definitions
8. Endnotes
Chapter 12. Deviant Cyberacts and Public Order Cybercrimes: Prostitution, Gambling and Substance Abuse
1. The Relationship Between Law and Morality
2. Cyberdeviance
A. Paraphilia Online
3. Public Order Cybercrimes
A. Cyberprostitution
i. The Facilitation of Prostitution via the Internet
a. Can a Website Be a House of Prostitution?
b. Prostitution: There is An App for That
ii. Escorts: Prostitutes with a Different Name?
iii. Juvenile Prostitution
iv. Cyberprostitution, Cybersex, and Cyberpornography
B. Substance Abuse and Drugs Online
i. Online Pharmacies
a. Differentiating Licit, Illicit, and Fake Online Pharmacies
C. Internet Gambling
i. Licit and Illicit Online Gambling Sites
ii. Regulating Internet Gambling
4. Controlling Cyberdeviance and Public Order Cybercrimes
5. Case Study
6. Review Questions
7. Laws
8. Definitions
9. Endnotes
Chapter 13. Organized Cybercrime
1. Organized Cybercrime: An Introduction
2. Activities of Organized Cybercriminals
A. Crime as a Service
B. Money Laundering
3. Online Drug Trafficking
A. Surface Web vs. Deep Web
i. Darknet: The Underworld of Cyberspace
4. Human Trafficking
A. Nature and Extent of Human Trafficking
B. Human Traffickers: Targets and Tactics of Control
i. Human Traffickers: Online Tactics
C. Organ Trafficking
5. Firearms Trafficking
6. Cigarette Trafficking
7. Wildlife Trafficking
8. Controlling Organized Cybercrime
9. Case Study
10. Review Questions
11. Laws
12. Definitions
13. Endnotes
Chapter 14. Political Cybercrime
1. Types of Political Cybercrime
A. Hacktivism
B. Cyberespionage
C. Cyberterrorism
D. Cyberwarfare
i. Laws of War: Can They be Applied to Cyberspace?
2. Combating Political Cybercrime
3. Case Study
4. Review Questions
5. Laws
6. Definitions
7. Endnotes

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program