000 | 05613 a2200265 4500 | ||
---|---|---|---|
999 |
_c33018 _d33018 |
||
001 | nam a22 7a 4500 | ||
020 | _a9781138417861 | ||
082 | _a364.168 SO CI | ||
245 |
_aSocial Networking as a Criminal Enterprise _cEdited by Catherine D. Marcum, George E. Higgins |
||
260 |
_aBoca Raton : _bCRC Press, _cc2014. |
||
300 |
_axviii, 235 p. : _bill. ; _c25 cm. |
||
500 | _aDescription based upon print version of record. English. Includes bibliographical references and index. | ||
505 | _aMachine generated contents note: SECTION I UNDERSTANDING THE SOCIAL NETWORK 1.History of Social Networking / Catherine D. Marcum 2.Creating Identity on Social Network Sites / Tina L. Freiburger 3.Social Networks and Crime: Applying Criminological Theories / Brian P. Schaefer SECTION II TYPES OF SOCIAL NETWORKING CRIMINALITY 4.Texting and Social Networks / Cynthia Koller 5.Identity Theft and Social Networks / Jana L. Jasinski 6.Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media / Gary W. Giumetti 7.Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach / George E. Higgins 8.Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites / K. Jaishankar 9.Case Study: Advancing Research on Hackers Through Social Network Data / Max Kilger SECTION III THE CRIMINAL JUSTICE SYSTEM AND SOCIAL NETWORKING Contents note continued: 10.Further Examining Officer Perceptions and Support for Online Community Policing / Thomas J. Holt 11.Prosecution and Social Media / Michael M. Losavio 12.Corrections and Social Networking Websites / George E. Higgins. Front Cover; Contents; Preface; Acknowledgments; About the Editors; List of Contributors; Chapter 1: History of Social Networking; Chapter 2: Creating Identity on Social Network Sites; Chapter 3: Social Networks and Crime : Applying Criminological Theories; Chapter 4: Texting and Social Networks; Chapter 5: Identity Theft and Social Networks; Chapter 6: Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media; Chapter 7: Understanding Digital Piracy Using Social Networks : An Integrated Theory Approach. Chapter 8: Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking SitesChapter 9: Case Study : Advancing Research on Hackers Through Social Network Data; Chapter 10: Further Examining Officer Perceptions and Support for Online Community Policing; Chapter 11: Prosecution and Social Media; Chapter 12: Corrections and Social Networking Websites; Back Cover. | ||
520 | _a"This text explores how social networking has become a huge matter of contention in the criminal justice system and how the justice system is currently attempting to handle the issue. Designed for courses in undergraduate and graduate criminal justice, criminology, and information technology, the book is written by experts in this emerging area and focuses on criminal and deviant behavior as it affects and relates to social networking. It is also ideal as an instruction guide for practitioners in the criminal justice field and for trainees at law enforcement training academies"-- "Preface The birth of social networking did not originate with MySpace or Facebook. In fact, social networking websites began in 1978 based on the innovation of an IBM employee. Since that time, the appearance and use of social networking is changing on a daily basis. The ability to share ideas and communicate is one of the many uses of social networking websites, and it is continuing to evolve in appearance and purpose. With that said, with innovation comes deviance, and the social networking phenomenon has skyrocketed the ability to commit crime online. The purpose of this book is to provide the reader a thorough examination of how social networking criminality has affected our criminal justice system. Experts in the field have provided a comprehensive overview of the emergence of social networking, the types of crimes committed, and how the system is handling these offenders. Key concepts, statistics, and legislative histories are discussed in every chapter. It is the desire of the editors to educate and enlighten a wide audience, from those who are completely unfamiliar with the topic as an entirety to individuals who need more specific information on a particular type of social networking criminality. This text should be a useful guide to students, academics, and practitioners alike"-- As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines:The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websitesForms of criminal behavior that c. | ||
650 |
_aComputer crimes _912332 |
||
650 |
_aOnline social networks _xSafety measures _916560 |
||
650 |
_aCriminals _xSocial networks _916561 |
||
650 |
_aLAW / Criminal Law / General _916562 |
||
650 |
_aLAW / Forensic Science _916563 |
||
650 |
_aSOCIAL SCIENCE _xCriminology _916564 |
||
700 |
_aMarcum, Catherine Davis, _d1980-, _eEdited by _955066 |
||
700 |
_aHiggins, George E., _eEdited by _955067 |
||
856 |
_uhttps://uowd.box.com/s/90z38a4n05g6hz1hq9d5myqrd3wywrsw _zLocation Map |
||
942 | _cREGULAR |