Preface |
|
xi | |
Acknowledgments |
|
xiii | |
Author |
|
xv | |
|
1 Introduction: The Internet as a Criminal Enabler |
|
|
1 | (16) |
|
Interpersonal Cybercrime vs. Traditional Crime |
|
|
3 | (1) |
|
Concepts and Organization of the Book |
|
|
3 | (1) |
|
|
4 | (3) |
|
Qualities of the Online Environment |
|
|
7 | (1) |
|
Social Engineering Techniques |
|
|
7 | (1) |
|
Cyber Intimate Partner Violence |
|
|
8 | (3) |
|
Sexual Abuse and Exploitation Online |
|
|
11 | (2) |
|
|
13 | (4) |
|
2 Online Romance Scammers |
|
|
17 | (26) |
|
Defining Online Romance Scams |
|
|
17 | (3) |
|
Typical Online Romance Scammers |
|
|
20 | (1) |
|
Online Romance Scammers' Motives and Methods |
|
|
21 | (3) |
|
Typical Online Romance Scam Victims |
|
|
24 | (3) |
|
Laws for Prosecuting Online Romance Scams |
|
|
27 | (4) |
|
Impact of Online Romance Scams on Society and Victims |
|
|
31 | (2) |
|
|
33 | (3) |
|
|
36 | (7) |
|
|
43 | (30) |
|
|
43 | (3) |
|
|
46 | (2) |
|
Online Swatters' Motives and Methods |
|
|
48 | (1) |
|
Typical Online Swatting Victims |
|
|
49 | (1) |
|
Laws for Prosecuting Online Swatting |
|
|
50 | (6) |
|
Impact of Online Swatting on Society and Victims |
|
|
56 | (1) |
|
|
56 | (2) |
|
|
58 | (3) |
|
|
61 | (1) |
|
Appendix: Dataset of Known Swatters |
|
|
62 | (11) |
|
|
73 | (20) |
|
Defining Internet Trolling |
|
|
73 | (2) |
|
|
75 | (1) |
|
Internet Trolls' Motives and Methods |
|
|
76 | (3) |
|
Typical Internet Troll Victims |
|
|
79 | (1) |
|
Laws for Prosecuting Internet Trolling |
|
|
80 | (2) |
|
Impact of Internet Trolling on Society and Victims |
|
|
82 | (2) |
|
|
84 | (2) |
|
|
86 | (5) |
|
|
91 | (2) |
|
|
93 | (28) |
|
|
93 | (3) |
|
|
96 | (1) |
|
Cyberstalkers' Motives and Methods |
|
|
97 | (4) |
|
Typical Cyberstalking Victims |
|
|
101 | (3) |
|
Laws for Prosecuting Cyberstalking |
|
|
104 | (4) |
|
Impact of Cyberstalking on Society and Victims |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (7) |
|
|
119 | (2) |
|
6 Cyberbullies and Cyber Harassers |
|
|
121 | (30) |
|
Defining Cyberbullying and Cyber Harassment |
|
|
121 | (4) |
|
Typical Cyberbullies and Harassers |
|
|
125 | (1) |
|
Cyberbullies' and Harassers' Motives and Methods |
|
|
125 | (1) |
|
Typical Cyberbully and Harasser Victims |
|
|
126 | (6) |
|
Laws for Prosecuting Cyberbullying/Harassment |
|
|
132 | (3) |
|
Impact of Cyberbullying and Harassment on Society and Victims |
|
|
135 | (3) |
|
|
138 | (3) |
|
|
141 | (10) |
|
7 Minor Online Sexual Activity Offenders |
|
|
151 | (42) |
|
Defining Illegal Online Sexual Activity |
|
|
151 | (6) |
|
Typical Minor OSA Offenders |
|
|
157 | (3) |
|
Minor OSA Offenders' Motives and Methods |
|
|
160 | (2) |
|
Laws for Prosecuting Online Sexual Activity Offenses |
|
|
162 | (6) |
|
Impact of Minor Online Sexual Activity on Society and Sending/Receiving Parties |
|
|
168 | (4) |
|
|
172 | (1) |
|
|
173 | (10) |
|
|
183 | (1) |
|
Appendix A Studies Examining Sent and Received Sexts |
|
|
184 | (9) |
|
8 Online Domestic Commercial Sexual Traffickers |
|
|
193 | (46) |
|
Defining Online Domestic Commercial Sex Trafficking |
|
|
193 | (4) |
|
Typical Online Domestic Commercial Sexual Trafficking Offenders |
|
|
197 | (6) |
|
Online Domestic Commercial Sexual Traffickers' Motives and Methods |
|
|
203 | (6) |
|
Typical Online Domestic Commercial Sexual Trafficking Victims |
|
|
209 | (3) |
|
Laws for Prosecuting Online Domestic Commercial Sexual Trafficking |
|
|
212 | (10) |
|
Impact of Online Domestic Commercial Sexual Trafficking on Society and Victims |
|
|
222 | (2) |
|
|
224 | (3) |
|
|
227 | (10) |
|
|
237 | (2) |
|
9 Online Child Sexual Abuse Material Offenders |
|
|
239 | (34) |
|
Defining Online Child Sexual Abuse Material (Aka Child Pornography) Offenses |
|
|
239 | (6) |
|
Typical Online CSAM Offenders |
|
|
245 | (2) |
|
Online CSAM Offenders' Motives and Methods |
|
|
247 | (3) |
|
Typical Online CSAM Victims |
|
|
250 | (1) |
|
Laws for Prosecuting Online CSAM Offenses |
|
|
251 | (8) |
|
Impact of Online CSAM on Society and Victims |
|
|
259 | (2) |
|
|
261 | (4) |
|
|
265 | (5) |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
273 | (22) |
|
Defining Cyber Sextortion |
|
|
273 | (3) |
|
Typical Cyber Sextortionists |
|
|
276 | (1) |
|
Cyber Sextortionists' Motives and Methods |
|
|
276 | (5) |
|
Typical Cyber Sextortion Victims |
|
|
281 | (1) |
|
Laws for Prosecuting Cyber Sextortion |
|
|
282 | (6) |
|
Impact of Cyber Sextortion on Society and Victims |
|
|
288 | (1) |
|
|
288 | (2) |
|
|
290 | (2) |
|
|
292 | (3) |
|
11 Online Image-Based Sexual Abusers |
|
|
295 | (40) |
|
Defining Online Image-Based Sexual Abuse |
|
|
295 | (3) |
|
Typical Online Image-Based Sexual Abusers |
|
|
298 | (5) |
|
Motives and Methods of Online Image-Based Sexual Abusers |
|
|
303 | (2) |
|
|
305 | (1) |
|
Laws for Prosecuting 1BSA Offenses |
|
|
306 | (17) |
|
Impact of IBSA Offenses on Society and Victims |
|
|
323 | (3) |
|
|
326 | (3) |
|
|
329 | (4) |
|
|
333 | (2) |
|
12 Combating Cyberpredators through Education |
|
|
335 | (18) |
|
|
338 | (1) |
|
|
339 | (2) |
|
21st Century Digital Skills |
|
|
341 | (6) |
|
Challenges of the Internet |
|
|
347 | (1) |
|
Navigating the Internet Safely and Civilly |
|
|
348 | (5) |
Conclusion |
|
353 | (1) |
References |
|
354 | (7) |
Index |
|
361 | |