Muutke küpsiste eelistusi

Cyberpredators and Their Prey [Pehme köide]

(John Jay College, New York, USA)
  • Formaat: Paperback / softback, 366 pages, kõrgus x laius: 234x156 mm, kaal: 480 g, 48 Tables, black and white; 20 Line drawings, black and white; 12 Halftones, black and white; 32 Illustrations, black and white
  • Ilmumisaeg: 13-Sep-2022
  • Kirjastus: CRC Press
  • ISBN-10: 0367551691
  • ISBN-13: 9780367551698
Teised raamatud teemal:
  • Formaat: Paperback / softback, 366 pages, kõrgus x laius: 234x156 mm, kaal: 480 g, 48 Tables, black and white; 20 Line drawings, black and white; 12 Halftones, black and white; 32 Illustrations, black and white
  • Ilmumisaeg: 13-Sep-2022
  • Kirjastus: CRC Press
  • ISBN-10: 0367551691
  • ISBN-13: 9780367551698
Teised raamatud teemal:
The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online servicessocial network platforms, online groups and organizations, smart phone apps, bulletin board systems, online forums, websites, internet relay chat channelsto locate and harm victims of all ages through attacking, exploiting, humiliating, bullying, harassing, threatening, defrauding, and extorting.

Cyberpredators and Their Prey describes non-sexual and sexual interpersonal crimesonline romance scam, swatting, trolling, stalking, bullying, harassment, minor sexting, sexual trafficking, child sexual abuse material, sextortion, and image-based sexual abuse offenses. Each chapter contains: crime definition and relevant issues; typical cyberpredator, motives, and methods; typical victims and behaviors that make them targets; current criminal laws for prosecuting cybercrimes and assessment of their applicability and effectiveness as deterrents; the crimes impact on individual victims and society in general; and cybersecurity prevention and intervention strategies. Also covered are the unique challenges that the regulation, investigation, and prosecution of these cybercrimes pose to criminal justice and private security agents worldwide; the need for society to hold companies operating online responsible for their role in cybercrime; and how aspects of the online environment (i.e., anonymity, toxic disinhibition, de-individuation, inculpability) contribute to harmful and abusive interpersonal interaction, particularly when enacted by perpetrators as part of a group attack.

Key features:





Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

Cyberpredators and Their Prey will prove essential reading to those who are studying to become, or are currently, security professionals; law enforcement personnel and investigators; intelligence agents; private investigators; lawyers; compliance officers; social service workers; and other professionals who deal with interpersonal cybercrime through the lens of social science.
Preface xi
Acknowledgments xiii
Author xv
1 Introduction: The Internet as a Criminal Enabler
1(16)
Interpersonal Cybercrime vs. Traditional Crime
3(1)
Concepts and Organization of the Book
3(1)
Types of Abuse
4(3)
Qualities of the Online Environment
7(1)
Social Engineering Techniques
7(1)
Cyber Intimate Partner Violence
8(3)
Sexual Abuse and Exploitation Online
11(2)
References
13(4)
2 Online Romance Scammers
17(26)
Defining Online Romance Scams
17(3)
Typical Online Romance Scammers
20(1)
Online Romance Scammers' Motives and Methods
21(3)
Typical Online Romance Scam Victims
24(3)
Laws for Prosecuting Online Romance Scams
27(4)
Impact of Online Romance Scams on Society and Victims
31(2)
Cybersecurity Tactics
33(3)
References
36(7)
3 Online Swatters
43(30)
Defining Online Swatting
43(3)
Typical Online Swatters
46(2)
Online Swatters' Motives and Methods
48(1)
Typical Online Swatting Victims
49(1)
Laws for Prosecuting Online Swatting
50(6)
Impact of Online Swatting on Society and Victims
56(1)
Cybersecurity Tactics
56(2)
References
58(3)
Cases
61(1)
Appendix: Dataset of Known Swatters
62(11)
4 Internet Trolls
73(20)
Defining Internet Trolling
73(2)
Typical Internet Trolls
75(1)
Internet Trolls' Motives and Methods
76(3)
Typical Internet Troll Victims
79(1)
Laws for Prosecuting Internet Trolling
80(2)
Impact of Internet Trolling on Society and Victims
82(2)
Cybersecurity Tactics
84(2)
References
86(5)
Cases
91(2)
5 Cyberstalkers
93(28)
Defining Cyberstalking
93(3)
Typical Cyberstalkers
96(1)
Cyberstalkers' Motives and Methods
97(4)
Typical Cyberstalking Victims
101(3)
Laws for Prosecuting Cyberstalking
104(4)
Impact of Cyberstalking on Society and Victims
108(2)
Cybersecurity Tactics
110(2)
References
112(7)
Cases
119(2)
6 Cyberbullies and Cyber Harassers
121(30)
Defining Cyberbullying and Cyber Harassment
121(4)
Typical Cyberbullies and Harassers
125(1)
Cyberbullies' and Harassers' Motives and Methods
125(1)
Typical Cyberbully and Harasser Victims
126(6)
Laws for Prosecuting Cyberbullying/Harassment
132(3)
Impact of Cyberbullying and Harassment on Society and Victims
135(3)
Cybersecurity Tactics
138(3)
References
141(10)
7 Minor Online Sexual Activity Offenders
151(42)
Defining Illegal Online Sexual Activity
151(6)
Typical Minor OSA Offenders
157(3)
Minor OSA Offenders' Motives and Methods
160(2)
Laws for Prosecuting Online Sexual Activity Offenses
162(6)
Impact of Minor Online Sexual Activity on Society and Sending/Receiving Parties
168(4)
Cybersecurity Tactics
172(1)
References
173(10)
Cases
183(1)
Appendix A Studies Examining Sent and Received Sexts
184(9)
8 Online Domestic Commercial Sexual Traffickers
193(46)
Defining Online Domestic Commercial Sex Trafficking
193(4)
Typical Online Domestic Commercial Sexual Trafficking Offenders
197(6)
Online Domestic Commercial Sexual Traffickers' Motives and Methods
203(6)
Typical Online Domestic Commercial Sexual Trafficking Victims
209(3)
Laws for Prosecuting Online Domestic Commercial Sexual Trafficking
212(10)
Impact of Online Domestic Commercial Sexual Trafficking on Society and Victims
222(2)
Cybersecurity Tactics
224(3)
References
227(10)
Cases
237(2)
9 Online Child Sexual Abuse Material Offenders
239(34)
Defining Online Child Sexual Abuse Material (Aka Child Pornography) Offenses
239(6)
Typical Online CSAM Offenders
245(2)
Online CSAM Offenders' Motives and Methods
247(3)
Typical Online CSAM Victims
250(1)
Laws for Prosecuting Online CSAM Offenses
251(8)
Impact of Online CSAM on Society and Victims
259(2)
Cybersecurity Tactics
261(4)
References
265(5)
Acts and Laws
270(1)
Cases
271(2)
10 Cyber Sextortionists
273(22)
Defining Cyber Sextortion
273(3)
Typical Cyber Sextortionists
276(1)
Cyber Sextortionists' Motives and Methods
276(5)
Typical Cyber Sextortion Victims
281(1)
Laws for Prosecuting Cyber Sextortion
282(6)
Impact of Cyber Sextortion on Society and Victims
288(1)
Cybersecurity Tactics
288(2)
References
290(2)
Cases
292(3)
11 Online Image-Based Sexual Abusers
295(40)
Defining Online Image-Based Sexual Abuse
295(3)
Typical Online Image-Based Sexual Abusers
298(5)
Motives and Methods of Online Image-Based Sexual Abusers
303(2)
Typical IBSA Victim
305(1)
Laws for Prosecuting 1BSA Offenses
306(17)
Impact of IBSA Offenses on Society and Victims
323(3)
Cybersecurity Tactics
326(3)
References
329(4)
Cases
333(2)
12 Combating Cyberpredators through Education
335(18)
Routine Activity Theory
338(1)
Digital Divide
339(2)
21st Century Digital Skills
341(6)
Challenges of the Internet
347(1)
Navigating the Internet Safely and Civilly
348(5)
Conclusion 353(1)
References 354(7)
Index 361
Dr. Lauren R. Shapiro is an Associate Professor at the John Jay College in New York. She has degrees in Psychology (B.A., M.S., Ph.D.) and Criminal Justice (M.S. specializing in Law Enforcement); postdoctoral research (Fellow in the Carolina Consortium on Human Development at UNC/CH; Associate and Project Coordinator at Rutgers University); and legal work experience (Extern with the Honorable Ralph Erickson in the U.S. District Court of North Dakota; Intern with the Fargo North Dakota Police Department). Dr. Shapiro focuses on physical security, cybersecurity, and private investigation. She co-authored, Multidisciplinary Investigation of Child Maltreatment (Jones & Bartlett Learning, 2016), and co-edited, Encyclopedia of Security and Emergency Management (Springer, 2021), with Dr. Marie-Helen Maras.