| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
About the Editors | |
| |
| |
| |
Online Predatory Child Victimization and Exploitation | |
| |
| |
| |
Sexual Addiction to the Internet: From Curiosity to Compulsive Behavior (Pittaro) | |
| |
| |
| |
Pedophilia, Pornography, and Stalking: Analyzing Child Victimization on the Internet (Jaishankar/Halder/Ramdoss) | |
| |
| |
| |
Internet Child Sexual Exploitation: Offenses, Offenders, and Victims (Huang/Leopard/Brockman) | |
| |
| |
| |
Cyber Bullying: A Transnational Perspective (Jaishankar/Shariff) | |
| |
| |
| |
Internet Crimes: Youth and Children (Raghavan/Ranjan/Reddy) | |
| |
| |
| |
Emerging Global Crimes of the Internet | |
| |
| |
| |
Online Pharmaceutical Sales and the Challenge for Law Enforcement (Finley) | |
| |
| |
| |
Charges Without Borders: Consumer Credit Card Fraud in Ghana (Davison) | |
| |
| |
| |
Regulating Cyberstalking (Basu/Jones) | |
| |
| |
| |
Internet Gambling (Geis/Brown/Pontell) | |
| |
| |
| |
Nature and Distribution of Phishing (Stroik/Huang) | |
| |
| |
| |
You Can't Cheat an Honest Man: Making ($$$s and) Sense of the Nigerian E-mail Scams (King/Thomas) | |
| |
| |
| |
Identity Theft Causes, Correlates, and Factors: A Content Analysis (Berg) | |
| |
| |
| |
Internet Fraud and Cyber Crime (Cukier/Levin) | |
| |
| |
| |
Criminological Perspectives on Cyber Crime | |
| |
| |
| |
Space Transition Theory of Cyber Crimes (Jaishankar) | |
| |
| |
| |
Routine Activity Theory and Internet Crime (Cox/Johnson/Richards) | |
| |
| |
| |
The Rhetoric of Hackers' Neutralizations (Turgeman-Goldschmidt) | |
| |
| |
| |
Lone Hacks or Group Cracks: Examining the Social Organization of Computer Hackers (Holt) | |
| |
| |
| |
"It's like Printing Money": Piracy on the Internet (Nhan) | |
| |
| |
| |
The Warez Scene: Digital Piracy in the Online World (Ponte) | |
| |
| |
| |
Internet and Crime Trends (Ouimet) | |
| |
| |
| |
Internet Gambling: The Birth of a Victimless Crime? (Giacopassi/Pitts) | |
| |
| |
| |
Investigating and Prosecuting Cyber Crimes | |
| |
| |
| |
Investigating Computer Crime (Hinduja) | |
| |
| |
| |
Criminal Profiling and Cyber Criminal Investigations (Shoemaker/Kennedy) | |
| |
| |
| |
Digital Evidence (Scarborough/Rogers/Frakes/Martin) | |
| |
| |
| |
The Dateline Effect: Internet Stings (Rubenser/Orvis/Rush) | |
| |
| |
| |
Evidence Issues Involved in Prosecuting Internet Crime (Roberson) | |
| |
| |
| |
The Politics of Internet Crimes (Marion) | |
| |
| |
| |
The Fourth Amendment Impact on Electronic Evidence (Obinyan/Ikegwuonu/Vanderpuye) | |
| |
| |
| |
Cyber Terrorism: The "New" Face of Terrorism | |
| |
| |
| |
The Dark Side of the Web: Terrorists' Use of the Internet (Damphousse) | |
| |
| |
| |
Cyber Terrorism: Problems, Perspectives, and Prescription (Soma Sundaram/Jaishankar) | |
| |
| |
| |
Cyber Terrorism and the Law (Walker) | |
| |
| |
Index | |