This book has been replaced by a newer edition:

Crime Online cover

Crime Online: Correlates, Causes, and Context, Third Edition

Edited by: Thomas J. Holt

2016, 314 pp, paper, ISBN 978-1-61163-677-2

$45.00

Teacher's Manual available

Crime On-Line

Correlates, Causes, and Context

Second Edition

Edited by: Thomas J. Holt

Tags: Computer Crime/Cybercrime

Table of Contents (PDF)

Teacher's Manual available

268 pp  $35.00

ISBN 978-1-61163-105-0

The ubiquity of computers and the Internet have drastically changed the landscape of crime and deviance. Computer technology enables offenders to anonymously target victims around the world, connect with others who share their interests, and participate in various crimes. The Internet and cellular telephony are increasingly incorporated into real world offenses like prostitution in order to connect sex workers and clients with minimal risk of detection. At the same time, new forms of offending have emerged as a direct consequence of technology, such as computer hacking, which can be used for both beneficial and illegal purposes. The Internet has also become an important environment for extremists and terror groups to communicate their beliefs globally in order to recruit others and generate funds.

In light of the increasing adoption of technology, it is critical that researchers explore the complex effects of computer technology on human behavior and the intersection of real world and virtual experiences. Crime On-Line provides detailed criminological explorations of multiple forms of cybercrime, including phishing, hacking, and sex crimes using empirical tests and unique data. This text also includes a comprehensive exploration of cyberterrorism and activism in on-line environments. The law enforcement and policy responses to cybercrimes at the local, state, and federal level are also discussed in detail. This work provides practical policy discussions that will benefit academics, law enforcement, legal counsel, and students at the undergraduate and graduate level.

Specifically, the second edition includes updated sections on child pornography, cyberbullying, and cyberterrorism. There are also four new chapters by well known authors in the field including:

• A qualitative exploration of the computer hacker subculture

• A content analysis of spam based work at home schemes

• An assessment of the tactics employed to combat music piracy over the last two decades

• A exploration of vulnerabilities in and attacks against SCADA systems and critical infrastructure on-line

These revisions expand the scope of the second edition and make it an extremely valuable text for cybercrime scholars and students alike.

"A useful overview of the terrain as well as the challenges involved in addressing cybercrime. Summing Up: Highly recommended. All levels/libraries." — Choice Magazine (on the first edition)

"[A]n excellent compilation of brilliant research works by 19 dedicated authors. . . . This book will adorn almost all of the libraries of major universities and colleges that deal with criminology and law. . . . Considering the price of it, this book should find a place in every college/university student's library. The book is a must read for the police personnel, lawyers and cyber crime data and security professionals, as this will help them to understand traditional as well [as] new trends of online crimes. The book will be immensely useful for researches as well. Any researcher of digital communication, law and criminology would love to know about the recent trends of crimes that are happening online, the past and present scenario and the future impacts of the same." — International Journal of Cyber Criminology (on the first edition)

The Teacher's Manual is available electronically on a CD or via email. Please contact Beth Hall at bhall@cap-press.com to request a copy. PowerPoint slides are available upon adoption. Sample slides from the full, 101-slide presentation are available to view here. Email bhall@cap-press.com for more information.