Description

Book Synopsis

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.

With insight from field experts, this book examines:

  • The history of social networking and the process of developing an online identity
  • Schools of criminological theory and how they relate to criminality on social networking websites
  • Forms of criminal behavior that can be performed utilizing social networking websites
  • Criminality via texting, identity theft, and hacking
  • Adolescents as offenders and victims in cyberbullying and digital piracy
  • Online sexual victimization, including child pornography and sexual solicitation of youth

The book concludes by discussing law enforcement's

Trade Review

"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
—G. Ernest Govea, in Security Management

"…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
—L. L. Hansen, Western New England University


"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
—G. Ernest Govea, in Security Management

"…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
—L. L. Hansen, Western New England University



Table of Contents

Understanding the Social Network. History of Social Networking. Creating Identity on Social Network Sites. Social Networks and Crime: Applying Criminological Theories. Types of Social Working Criminality. Texting and Social Networks. Identity Theft and Social Networks. Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media. Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach. Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites. Case Study: Advancing Research on Hackers Through Social Network Data. The Criminal Justice System and Social Networking. Further Examining Officer Perceptions and Support for Online Community Policing. Prosecution and Social Media. Corrections and Social Networking Websites. Index.

Social Networking as a Criminal Enterprise

Product form

£80.74

Includes FREE delivery

RRP £84.99 – you save £4.25 (5%)

Order before 4pm today for delivery by Thu 18 Dec 2025.

A Paperback / softback by Catherine D. Marcum

Out of stock


    View other formats and editions of Social Networking as a Criminal Enterprise by Catherine D. Marcum

    Publisher: Taylor & Francis Inc
    Publication Date: 28/04/2014
    ISBN13: 9781466589797, 978-1466589797
    ISBN10: 1466589795

    Description

    Book Synopsis

    As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.

    With insight from field experts, this book examines:

    • The history of social networking and the process of developing an online identity
    • Schools of criminological theory and how they relate to criminality on social networking websites
    • Forms of criminal behavior that can be performed utilizing social networking websites
    • Criminality via texting, identity theft, and hacking
    • Adolescents as offenders and victims in cyberbullying and digital piracy
    • Online sexual victimization, including child pornography and sexual solicitation of youth

    The book concludes by discussing law enforcement's

    Trade Review

    "The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
    —G. Ernest Govea, in Security Management

    "…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
    —L. L. Hansen, Western New England University


    "The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
    —G. Ernest Govea, in Security Management

    "…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
    —L. L. Hansen, Western New England University



    Table of Contents

    Understanding the Social Network. History of Social Networking. Creating Identity on Social Network Sites. Social Networks and Crime: Applying Criminological Theories. Types of Social Working Criminality. Texting and Social Networks. Identity Theft and Social Networks. Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media. Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach. Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites. Case Study: Advancing Research on Hackers Through Social Network Data. The Criminal Justice System and Social Networking. Further Examining Officer Perceptions and Support for Online Community Policing. Prosecution and Social Media. Corrections and Social Networking Websites. Index.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account