Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Title Copyright Dedication Contents List of Figures List of Tables Foreword Acknowledgments Notes on Contributors 1. Introduction: Cybercrime Risks and Responses – Eastern and Western Perspectives Part I: Understanding Cybercrime Through Research
2. Trajectories of Cybercrime 3. Ethical, Legal, and Methodological Considerations in Cyber Research: Conducting a Cyber Ethnography of www.bullying.org 4. That Cyber Routine, That Cyber Victimization: Profiling Victims of Cybercrime
Part II: Contemporary Cybercrime Risks
5. Organized Cybercrime and National Security 6. Internet Fraud in Hong Kong: An Analysis of a Sample of Court Cases 7. The Role of Spam in Cybercrime: Data from the Australian Cybercrime Pilot Observatory 8. Quantifying Sexually Explicit Language 9. Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet 10. Criminals in the Cloud: Crime, Security Threats, and Prevention Measures
Part III: Industry, Criminal Justice, and Forensic Responses to Cybercrime
11. Hong Kong’s Experience in Strengthening the Security Measures of Retail Payment Services 12. Banking Security: A Hong Kong Perspective 13. Complicity in Cyberspace: Applying Doctrines of Accessorial Liability to Online Groups 14. Profiling Cybercrime Perpetrators in China and its Policy Countermeasures
Part IV: Privacy and Freedom Online
15. When Privacy Meets Social Networking Sites – with Special Reference to Facebook 16. An Introduction to Cyber Crowdsourcing (Human Flesh Search) in the Greater China Region 17. Hacktivism and Whistleblowing in the Era of Forced Transparency?
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion