This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade. The texts are organised into three parts. The first contains a number of viewpoints and perspectives that facilitate our broader understanding of cyberspace crime/ cybercrimes. The second part addresses each of the major types of cybercrime - trespass/ hacking/cracking, thefts/ deceptions, obscenities/ pornography, violence - and illustrate their associated problems of definition and resolution. The third and final part contains a selection of texts that each deal with the impact of cyberspace crime upon specific criminal justice processes: the police and the trial process.
This book was published in 2003.This book is a collection of key texts that have contributed towards, or have reflected, the various debates that have taken place over crime and the internet during that past decade.
Introduction PART I THEORETICAL PERSPECTIVES AND VIEWPOINTS 1 David S. Wall (1999), 'Cybercrimes: New Wine, No Bottles?', 2 P.N. Grabosky and Russell G. Smith (2001), 'Digital Crime in the Twenty-First Century', 3 Alan Norrie (2001), 'Dialogue and Debate: The Nature of Virtual Criminality', 4 Wanda Capeller (2001), 'Not Such a Neat Net: Some Comments on Virtual Criminality', 5 Peter N. Grabosky (2001), 'Virtual Criminality: Old Wine in New Bottles?', 6 Francis Snyder (2001), 'Sites of Criminality and Sites of Governance', 7 Graham Greenleaf (1998), 'An Endnote on Regulating Cyberspace: Architecture vs Law?', PART II CYBERCRIMES 8 Amanda Chandler (1996), 'The Changing Definition and Image of Hackers in Popular Discourse', 9 Liz Duff and Simon Gardiner (1996), 'Computer Crime in the Global Village: Strategies for Control and Regulation - in Defence of the Hacker', 10 Tim Jordan and Paul Taylor (1998), 'A Sociology of Hackers', 11 David Mann and Mike Sutton (1998), 'Netcrime: More Change in the Organization of Thieving', 12 Dorothy E. Denning (2000), 'Cyberterrorism: The Logic Bomb versus the Truck Bomb'. 13 David L. Speer (2000), 'Redefining Borders: The Challenges of Cybercrime', VI Cyberspace Crime 14 George Smith (1998), 'An Electronic Pearl Harbor? Not Likely', 15 Hedieh Nasheri and Timothy J. O'Hearn (1999), The Worldwide Search for Techno-thieves: International Competition v. International Co-operation', 16 C. David Freedman (1999), The Extension of the Criminal Law to Protecting Confidential Commercial Information: Comments on the Issues and the Cyber-Context', 17 Louise Ellison and Yaman Akdeniz (1998), 'Cyberstalking: The Regulation of Harassment on the Internet', 18 Matthew Williams (2000), 'Virtually Criminal: Discourse, Deviance and Anxiety within Virtual Communities', 19 Nadine Strossen (2000), 'Cybercrimes v. Cyberliberties', 20 Clive Walker and Yaman Akdeniz (1998), The Governance of the Internet in Europe with Special Reference to Illegal and Harmful Content', 21 Marty Rimm (1995), 'Marketing Pornography on the Information Superhighway: A Survey of 917,410 Images, Descriptions, Short Stories, and Animations Downloaded 8.5 Million Times by Consumers in Over 2000 Cities in Forty Countries, Provinces, and Territories', 22 Catharine A. MacKinnon (1995), 'Vindication and Resistance: A Response to the Carnegie Mellon Study of Pornography in Cyberspace', 23 Donna L. Hoffman and Thomas P. Novak (1995), 'A Detailed Analysis of the Conceptual, Logical, and Methodological Flaws in the Article: "Marketing Pornography on the Information Superhighway'", 24 Jon Spencer (1999), 'Crime on the Internet: Its Presentation and Representation', PART HI CRIMINAL JUSTICE PROCESSES 25 Marc D. Goodman (1997), 'Why the Police Don't Care About Computer Crime', 26 David S. Wall (1998), 'Policing and the Regulation of the Internet', 27 P.K. Manning (2001), 'Technology's Ways: Information Technology, Crime Analysis and the Rationalizing of Policing', 28 Janet B.L. Chan (2001), The Technological Game: How Information Technology is Transforming Police Practice', 29 Peter Sommer (1998), 'Digital Footprints: Assessing Computer Evidence', 30 Clive Walker (1996), 'Fundamental Rights, Fair Trials and the New Audio-Visual Sector