Carolina Academic Press
CAP Home
View shopping cart
Criminal Justice
Crime Online, Fourth Edition View Table of Contents and Introductory Material
Crime Online: Correlates, Causes, and Context, Fourth Edition

Crime Online

Correlates, Causes, and Context

Fourth Edition

$49.00 308 pp paper

Tags: Computer Crime/Cybercrime

Teacher's Manual available

Available on Kindle  Available on Kindle

Available on Redshelf  Available on Redshelf

Available on VitalSource

To access bonus chapters:

"Examining State and Local Law Enforcement Perceptions of Computer Crime", click here.

"Industrial Control Systems and Cybercrime", click here.

The ubiquity of computers and the role of the Internet have drastically changed the landscape of crime and deviance. Computer technology enables offenders to anonymously target victims around the world, connect with others who share their interests, and participate in various crimes. The Internet and cellular telephony are increasingly incorporated into real world offenses, such as prostitution, where sex workers and clients can connect with minimal risk of detection. At the same time, new forms of offending have emerged as a direct consequence of technology, such as computer hacking, which can be used for both beneficial and illegal purposes. The Internet has also become an important environment for extremists and terror groups to communicate their beliefs globally in order to recruit others and generate funds.

In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime Online uses empirical tests and unique data to provide detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes. This text also includes a comprehensive exploration of cyberterrorism and activism in online environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level.

Specifically, the fourth edition includes four new chapters on the role, one of which examines the history of social engineering in fraud. Another explores online intimate partner violence and targeted violence. There is also a new chapter exploring the role of technology in extremist activities, as well as a chapter exploring the use of Tor and cryptomarkets by criminals to engage in various forms of crime. These revisions extend the scope of the fourth edition and make it an extremely valuable text for cybercrime scholars and students alike.

There is a set of 188 PowerPoint slides available upon adoption. Click here to view a sample presentation. If you are a professor using this book for a class, please contact Beth Hall at to request your slides.

Complimentary Copy RequestIf you are a professor teaching in this field you may request a complimentary copy.

700 Kent St, Durham NC 27701(919) 489-7486Fax (919) 493-5668
About Us | Comp Copy Information | Contact Us | Order Status | Returns Policy | © CAP 2022