It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03478cam a2200613Mi 4500
001 15078450
005 20220611231327.0
006 m o d
007 cr n||---|||||
008 100427s2003 xx ob 000 0 eng d
035 $a(OCoLC)ocn609842616
035 $a(NNC)15078450
040 $aEBLCP$beng$epn$cEBLCP$dMERUC$dIDEBK$dOCLCQ$dDEBSZ$dN$T$dOCLCF$dUKDOC$dOCLCQ$dOCLCO$dOCLCQ$dK6U$dOCLCO
019 $a466440956$a822565763
020 $a9781843924449$q(electronic bk.)
020 $a1843924447$q(electronic bk.)
020 $a9781135991951$q(electronic bk.)
020 $a1135991952$q(electronic bk.)
020 $z1843920018
020 $z9781843920014
020 $z184392000X
020 $z9781843920007
035 $a(OCoLC)609842616$z(OCoLC)466440956$z(OCoLC)822565763
050 4 $aHV6773
072 7 $aTRU$x005000$2bisacsh
082 04 $a364.168
049 $aZCUA
100 1 $aJewkes, Yvonne.
245 10 $aDot.cons :$bCrime, Deviance and Identity on the Internet.
260 $aCullompton :$bWillan Pub.,$c2003.
300 $a1 online resource (209 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
505 0 $aCover; Copyright Page; Contents; About the Authors; 1 Crime, deviance and the disembodied self: transcending the dangers of corporeality; 2 Policing the Net: crime, regulation and surveillance in cyberspace; 3 Cyberpunters and cyberwhores: prostitution on the Internet; 4 The electronic cloak: secret sexual deviance in cybersociety; 5 Cyber-chattels: buying brides and babies on the Net; 6 What a tangled web we weave: identity theft and the Internet; 7 Cyberstalking: an international perspective; 8 Maestros or misogynists? Gender and the social construction of hacking.
505 8 $a9 Digital counter-cultures and the nature of electronic social and political movements10 Investigating cybersociety: a consideration of the ethical and practical issues surrounding online research in chat rooms; References; Index.
520 $aCyberspace opens up infinitely new possibilities to the deviant imagination. With access to the Internet and sufficient know-how you can, if you are so inclined, buy a bride, cruise gay bars, go on a global shopping spree with someone else's credit card, break into a bank's security system, plan a demonstration in another country and hack into the Pentagon -- all on the same day. In more than any other medium, time and place are transcended, undermining the traditional relationship between physical context and social situation. This book crosses the boundaries of sociological, criminological a.
588 0 $aPrint version record.
504 $aIncludes bibliographical references.
650 0 $aComputer crimes.
650 0 $aCriminals$xIdentification.
650 0 $aInternet$xSocial aspects.
650 6 $aCriminalité informatique.
650 6 $aCriminels$xIdentification.
650 6 $aInternet$xAspect social.
650 7 $aTRUE CRIME$xWhite Collar Crime.$2bisacsh
650 7 $aComputer crimes.$2fast$0(OCoLC)fst00872063
650 7 $aCriminals$xIdentification.$2fast$0(OCoLC)fst00883530
650 7 $aInternet$xSocial aspects.$2fast$0(OCoLC)fst01766793
655 0 $aElectronic books.
655 4 $aElectronic books.
776 1 $z9781843920014
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15078450$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS