Description
Book SynopsisAs social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system.
With insight from field experts, this book examines:
- The history of social networking and the process of developing an online identity
- Schools of criminological theory and how they relate to criminality on social networking websites
- Forms of criminal behavior that can be performed utilizing social networking websites
- Criminality via texting, identity theft, and hacking
- Adolescents as offenders and victims in cyberbullying and digital piracy
- Online sexual victimization, including child pornography and sexual solicitation of youth
The book concludes by discussing law enforcement's
Trade Review
"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
—G. Ernest Govea, in Security Management
"…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
—L. L. Hansen, Western New England University
"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives."
—G. Ernest Govea, in Security Management
"…for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals.
—L. L. Hansen, Western New England University
Table of ContentsUnderstanding the Social Network. History of Social Networking. Creating Identity on Social Network Sites. Social Networks and Crime: Applying Criminological Theories. Types of Social Working Criminality. Texting and Social Networks. Identity Theft and Social Networks. Wall Posts and Tweets and Blogs, Oh My! A Look at Cyberbullying via Social Media. Understanding Digital Piracy Using Social Networks: An Integrated Theory Approach. Patterns of Sexual Victimization of Children and Women in the Multipurpose Social Networking Sites. Case Study: Advancing Research on Hackers Through Social Network Data. The Criminal Justice System and Social Networking. Further Examining Officer Perceptions and Support for Online Community Policing. Prosecution and Social Media. Corrections and Social Networking Websites. Index.