Linked e-resources
Details
Table of Contents
Dedication; Introduction; Contents; Contributors; About the Editor; Part I: Cybercrime; Chapter 1: Cybercrime: Definition, Typology, andßCriminalization; Defining Cybercrime; A Traditional View; Major Definitions ofßCybercrime; Cyber-Trespass; Cyber-Deception/Theft; Cyber-Pornography andßObscenity; Cyber-Violence; Legal Interests Protected by ICT andßCyber Criminal Law; General Aspects; Conventional Crimes "going digital"; New Offenses; Particular Interests; Interference withßICT systems; Hacking; Illegal Monitoring; Innovative Criminal Prohibitions.
Extent ofßCriminalization: Preparation andßPossession Preparation; Possession; Responsibility ofßProviders; Specific Sanctions; Challenges toßandßLimits ofßCriminal Legislation; Keeping Updated withßTechnological Progress; Respecting Constitutional Limits; Alternatives toßCriminalization; Administrative Measures; Civil Remedies; Aspects ofßInternationalization; Jurisdiction; International Harmonization; Shifting theßBurden ofßCrime Prevention toßtheßConsumer; Trends forßtheßFuture; Conclusion; References.
Chapter 2: Cyber-Grooming Young Women forßTerrorist Activity: Dominant andßSubjugated Explanatory Narratives Young Women, Schoolgirls andßIS/Daesh; Grooming inßCyber-Space forßTerrorist Recruitment; Grooming Young Women; Trafficking Young Women; Explaining Female Recruitment: Dominant andßSubjugated Discourses; Dominant Discourses; Conservative Families-Subjugated Lives; Pathological or "Nothing Exceptional"; Pathological Muslim Men; Devoutness andßExposure toßRadical Ideas; Subjugated Narratives; A Justified Sense ofßOutrage; Western Foreign Policy andßDomestic Policy.
When Hate Speech Hides Behind Satire Legal Responses inßCriminal andßFamily Law; Criminal Law andßPrevention andßPunishment; Family Law, Protection andßRehabilitation; Conclusion; References; Web References; Cases; Chapter 3: Understanding Attribution Bias andßReasons Behind Internet Infidelity inßIndia; Background; Introduction; Literature Review; Aims/Objective; Methodology; Participants' Profile; Study 1; Result andßDiscussion; Discussion; Study 2; Reasons andßCauses BehindßInvolvement ofßPeople inßInternet Infidelity; Result andßFindings; Discussion; Limitations ofßStudy.
ConclusionReferences; Chapter 4: Global Threats But National Legislations-How toßAdapt toßtheßNew Cyberspace Society; Introduction; Violence inßCyberspace; Fraud andßIdentity Theft; Fraud; Computer Fraud; Identity Theft; Is It Always aßFraud andßJust aßFraud?; Theft ofßVirtual Goods; Anonymity inßtheßNetwork-A Value or Problem?; Crimes ofßTerrorist Nature; Convergence ofßtheßLaw-A Necessity inßInformation Society; Conclusions; References; Chapter 5: Criminal Proceedings in Cyberspace: The Challenge of Digital Era; Introduction; Traditional Criminal Law inßCyber Environment.
Extent ofßCriminalization: Preparation andßPossession Preparation; Possession; Responsibility ofßProviders; Specific Sanctions; Challenges toßandßLimits ofßCriminal Legislation; Keeping Updated withßTechnological Progress; Respecting Constitutional Limits; Alternatives toßCriminalization; Administrative Measures; Civil Remedies; Aspects ofßInternationalization; Jurisdiction; International Harmonization; Shifting theßBurden ofßCrime Prevention toßtheßConsumer; Trends forßtheßFuture; Conclusion; References.
Chapter 2: Cyber-Grooming Young Women forßTerrorist Activity: Dominant andßSubjugated Explanatory Narratives Young Women, Schoolgirls andßIS/Daesh; Grooming inßCyber-Space forßTerrorist Recruitment; Grooming Young Women; Trafficking Young Women; Explaining Female Recruitment: Dominant andßSubjugated Discourses; Dominant Discourses; Conservative Families-Subjugated Lives; Pathological or "Nothing Exceptional"; Pathological Muslim Men; Devoutness andßExposure toßRadical Ideas; Subjugated Narratives; A Justified Sense ofßOutrage; Western Foreign Policy andßDomestic Policy.
When Hate Speech Hides Behind Satire Legal Responses inßCriminal andßFamily Law; Criminal Law andßPrevention andßPunishment; Family Law, Protection andßRehabilitation; Conclusion; References; Web References; Cases; Chapter 3: Understanding Attribution Bias andßReasons Behind Internet Infidelity inßIndia; Background; Introduction; Literature Review; Aims/Objective; Methodology; Participants' Profile; Study 1; Result andßDiscussion; Discussion; Study 2; Reasons andßCauses BehindßInvolvement ofßPeople inßInternet Infidelity; Result andßFindings; Discussion; Limitations ofßStudy.
ConclusionReferences; Chapter 4: Global Threats But National Legislations-How toßAdapt toßtheßNew Cyberspace Society; Introduction; Violence inßCyberspace; Fraud andßIdentity Theft; Fraud; Computer Fraud; Identity Theft; Is It Always aßFraud andßJust aßFraud?; Theft ofßVirtual Goods; Anonymity inßtheßNetwork-A Value or Problem?; Crimes ofßTerrorist Nature; Convergence ofßtheßLaw-A Necessity inßInformation Society; Conclusions; References; Chapter 5: Criminal Proceedings in Cyberspace: The Challenge of Digital Era; Introduction; Traditional Criminal Law inßCyber Environment.