Victimization through the Internet is becoming more prevalent as cyber criminals have developed more effective ways to remain anonymous. This volume explores today’s interface of computer science, Internet science, and criminology. Topics discussed include the growing menace of cyber crime in Nigeri..
Cybercrime explains the basic issues surrounding cybercrime and its impact on society. It looks at: legislation, electronic criminal behaviour, privacy and liberty and the dangers of surveillance...
Cybercrime explains the basic issues surrounding cybercrime and its impact on society. It looks at: legislation, electronic criminal behaviour, privacy and liberty and the dangers of surveillance...
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physic..
Online Child Sexual Abuse: Grooming, Policing and Child Protection in a Multi-Media World addresses the complex, multi-faceted and, at times, counter-intuitive relationships between online grooming behaviours, risk assessment, police practices, and the actual danger of subsequent abuse in the physic..
Cybercrime is now regarded as a major threat to society, yet common understandings of the change are developing slowly. This book explores the challenges to policing created by the increased professionalism of criminals and (separately) the new forms of deviance brought by social network media._x000..
This is a pioneering book which advances our understanding of the relationship between crime and technology, drawing upon the disciplines of criminology, political science, sociology, psychology, anthropology, surveillance studies and cultural studies...
Presenting a broad-based analysis, this volume explores the many aspects of cybercrime, its investigation, and its prosecution. It begins with an overview of the use of computers and other digital devices to commit traditional computer crimes. Next, it examines cybercrimes against individuals, inclu..