Encyclopedia of Criminal Activities and the Deep Web最新文献

筛选
英文 中文
Regulating the Internet 规管互联网
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch026
David T. A. Wesley
{"title":"Regulating the Internet","authors":"David T. A. Wesley","doi":"10.4018/978-1-5225-9715-5.ch026","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch026","url":null,"abstract":"Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Necessity of Paradigm Shift in Criminological Theorizing 犯罪学理论化范式转换的必要性
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch014
A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi
{"title":"Necessity of Paradigm Shift in Criminological Theorizing","authors":"A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi","doi":"10.4018/978-1-5225-9715-5.ch014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch014","url":null,"abstract":"The traditional linkage of defective educational acquisition and the propensity to engage in anti-social behaviours has been accentuated in criminological theory. However, current development in ICT environment preferred for spacelessness, timelessness with its unchanging requirement for ingenuity in the use and mastery of e-interaction has consistently queried the veracity of defective education and crime participation. A survey on cyber fraud conducted in Nigeria found out that the acquisition of requisite education is central to technology-driven crime participation and guarantees continual survival and career longevity in crime business. Consequently, this article analyses the necessity of educational acquisition for crime participation and further advocated for a paradigm shift to accommodate the changing trends in the education-crime symbiotic relationship in the ICT age. This is germane to criminology of ICT in capturing and mitigating the victimization that are contactable through participation in e-relationship.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unveiling Cybercrime in a Developing Country 揭露发展中国家的网络犯罪
Encyclopedia of Criminal Activities and the Deep Web Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch005
R. Boateng, Jonathan Nii Barnor Barnor
{"title":"Unveiling Cybercrime in a Developing Country","authors":"R. Boateng, Jonathan Nii Barnor Barnor","doi":"10.4018/978-1-5225-9715-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch005","url":null,"abstract":"This article unveils the pervasiveness of cybercriminal activities in Ghana from the point of view of key stakeholders in the fight against the crime. From a critical realist's perspective, the authors employed a qualitative approach to understand cybercrime from the point of view of different key players—four cybercriminals, eight lawyers, eight bankers, six café operators and personnel from the cybercrime unit of the Ghana Police—for the study. Findings from the article pointed out that cybercrime has gained ground among Ghanaian youth between the ages of 12 and 35, mostly males with female decoys. The findings of the article also suggested lack of confidence in the Ghana Police service to crackdown on cybercriminal activities in Ghana. The research finally suggested that there seem to be the nonexistence of cybercrime policies and laws for lawyers to arraign or defend suspected criminals in Ghanaian courts of law.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信