Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
48
result(s) for
"Computer crimes-Social aspects"
Sort by:
Hacked
2016
Inside the life of a hacker and cybercrime culture.
Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them?
InHacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of capitalism, crime, and control.This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy.Hackedthus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect the focus from the individual to corporations, governments, and broader social issues.A compelling study,Hackedhelps us understand not just the figure of the hacker, but also digital crime and social control in our high-tech society.
The human factor of cybercrime
\"This book focuses on the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It brings together leading criminologists from around the world to consider questions about the nature of of cybercrime, and examines all facets of victimization, offending, offender networks, and policy responses\"-- Provided by publisher.
The Human Factor of Cybercrime
by
Rutger Leukfeldt
,
Thomas J. Holt
in
Big Data
,
Computer crimes-Social aspects
,
Computer Fraud, Hacking & Viruses
2019,2020
Cybercrimes are often viewed as technical offences that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime.
The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.
Does the Internet increase crime?
by
Kiesbye, Stefan, edt
in
Computer crimes Juvenile literature.
,
Internet Social aspects Juvenile literature.
,
Computer crimes.
2010
Explores Internet-related sexual offenses, as well as cyberbullying, online gambling, and other manifestations of illegal activity conducted on the Internet.
Loving big brother : performance, privacy and surveillance space
by
McGrath, John E. (John Edward)
in
Electronic surveillance
,
Electronic surveillance -- Social aspects
,
Electronics in crime prevention -- Social aspects
2004
In Loving Big Brotherthe author tackles head on the overstated claims of the crime-prevention and anti-terrorism lobbies. But he also argues that we desire and enjoy surveillance, and that, if we can understand why this is, we may transform the effect it has on our lives. This book looks at a wide range of performance and visual artists, at popular TV shows and movies, and at our day-to-day encounters with surveillance, rooting its arguments in an accessible reading of cultural theory.
Constant scrutiny by surveillance cameras is usually seen as - at best - an invasion of privacy, and at worst an infringement of human rights. But in this radical new account of the uses of surveillance in art, performance and popular culture, John E McGrath sets out a surprizing alternative: a world where we have much to gain from the experience of being watched.
This iconoclastic book develops a notion of surveillance space - somewhere beyond the public and the private, somewhere we will all soon live. It's a place we're just beginning to understand.
Cybercrime and digital deviance
\"Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith's application of a digital environment and Wall's cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity\"-- Provided by publisher.
Routledge Handbook of Surveillance Studies
by
Kevin Haggerty
,
David Lyon
,
Kirstie Ball
in
Citizenship - Political Sociology
,
Crime Prevention
,
Electronic surveillance
2012
Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative Handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.
With a collection of over forty essays from the leading names in surveillance studies, the Handbook takes a truly multi-disciplinary approach to critically question issues of:
surveillance and population control
policing, intelligence and war
production and consumption
new media
security
identification
regulation and resistance.
The Routledge Handbook of Surveillance Studies is an international, accessible, definitive and comprehensive overview of the rapidly growing multi-disciplinary field of surveillance studies. The Handbook's direct, authoritative style will appeal to a wide range of scholars and students in the social sciences, arts and humanities.
Tools and weapons : the promise and the peril of the digital age /
\"In Tools and Weapons, Brad Smith and Carol Ann Browne take us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying \"Microsoft memoir,\" the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort\"-- Provided by publisher.
Cyberpsychology
by
Monica Therese Whitty
,
Garry Young
in
Communication in psychology
,
Computer crimes
,
Cyberspace
2017,2016
An important new BPS Textbook in Psychology exploring the interactions between individuals, societies, and digital technologies
Outlines key theories and empirical research within cyberpsychology and provides critical assessments of this rapidly changing field
Identifies areas in need of further research and ways to use digital technologies as a research tool
Covers topics such as online identity, online relationships and dating, pornography, children s use of the internet, cyberbullying, online games and gambling, and deception and online crime
Engaging and accessible for students at the undergraduate and graduate level with real life examples, activities, and discussion questions