| 000 | 03749cam a22003738i 4500 | ||
|---|---|---|---|
| 999 |
_c211289 _d211289 |
||
| 001 | 22013987 | ||
| 003 | OSt | ||
| 005 | 20220429160131.0 | ||
| 008 | 210428s2022 nyu b 001 0 eng | ||
| 010 | _a 2021020202 | ||
| 020 |
_a9781498784894 _q(hbk) |
||
| 020 |
_a9781032107523 _q(pbk) |
||
| 020 |
_z9781315155685 _q(ebk) |
||
| 040 |
_aDLC _beng _erda _cDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aHV6773 _b.H34 2022 |
| 082 | 0 | 0 |
_a362.88 HAL _223 |
| 100 | 1 |
_aHalder, Debarati, _d1975- _eauthor. |
|
| 245 | 1 | 0 |
_aCyber Victimology : _bDecoding Cyber Crime Victimization / _cDebarati Halder. |
| 263 | _a2111 | ||
| 264 | 1 |
_aNew York, NY : _bRoutledge, _c2022. |
|
| 300 | _apages cm | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 505 | _aTable of Contents Chapter 1: Introduction: From Victimology to Cyber Victimology ; 1. Background; 2. Why Cyber Victimology?; Chapter 2: Patterns of Cyber Victimisation and Role of Victims and Perpetrators; 2.1 General Patterns of Cyber-Crime Victimisation; 2.2 Profiling Victims of Cyber-Crimes; Chapter 3: Victims’ Rights in Cyberspace; 3.1 Introduction; 3.2 Freedom of Speech and Expression on the Internet; 3.3 Right to Privacy; 3.4. The Right to be Protected Against Online Sexual Offences; 3.5. Right to Equal Access to Justice and Fair Trial; Chapter 4: Issues and Challenges in Policing Cyber-Crimes; 4.1 Policing New Patterns of Cyber-Crimes; 4.2 Jurisdiction as the Biggest Challenge for Policing Cyber-Crimes; Chapter 5: Assistance for Cyber-Crime Victimisation; 5.1 International Instruments for Victim Assistance and Their Application for Victims of Cyber-Crimes; 5.2 Victim Assistance from Non-Governmental Stakeholders; 5.3 Victim Assistance from Intermediaries; 5.4 Victim Assistance from the Criminal Justice Machinery; Chapter 6: Penology for Cyber Victimisation: Criminal Justice and Societal Responses; 6.1. The Ever-Expanding Dimension of Penology; 6.2. Critical Analysis of Punishments Prescribed by Different Jurisdictions in Cyber Offences; 6.3. Reformative and Therapeutic Jurisprudential Approaches to Cyber Penology; Chapter 7: Conclusion; Glossary | ||
| 520 |
_a"Cyber Victimology provides a global socio-legal-victimological perspective on victimization online, written in clear, non-technical terms, and presents practical solutions for the problem. Halder qualitatively analyzes the contemporary dimensions of cyber-crime victimization, aiming to fill the gap in the existing literature on this topic. A literature review and case studies allow the author to analyze the current situation of cyber-crime victimization. A profile of victims of cybercrimes has been developed on the basis of different groups of victims and new policy guidelines on the basis of UN documents on cyber-crimes and victim-justice are proposed to prevent such victimization as well as for restitution of justice for cyber-crime victimisation cases. This book shows how the effects of cyber victimization in one sector can affect others. This book also highlights why the perpetrators chose to attack their victim/s in specific ways to create larger harm in unexpected ways. This book is suitable for use as a textbook in cyber victimology courses and will be of interest to policy makers and activists working in this area"-- _cProvided by publisher. |
||
| 650 | 0 | _aComputer crimes. | |
| 650 | 0 | _aVictims of crimes. | |
| 776 | 0 | 8 |
_iOnline version: _aHalder, Debarati. _tCyber victimology _dNew York : Routledge, 2021 _z9781315155685 _w(DLC) 2021020203 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||