{"title":"Regulating the Internet","authors":"David T. A. Wesley","doi":"10.4018/978-1-5225-9715-5.ch026","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch026","url":null,"abstract":"Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi
{"title":"Necessity of Paradigm Shift in Criminological Theorizing","authors":"A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi","doi":"10.4018/978-1-5225-9715-5.ch014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch014","url":null,"abstract":"The traditional linkage of defective educational acquisition and the propensity to engage in anti-social behaviours has been accentuated in criminological theory. However, current development in ICT environment preferred for spacelessness, timelessness with its unchanging requirement for ingenuity in the use and mastery of e-interaction has consistently queried the veracity of defective education and crime participation. A survey on cyber fraud conducted in Nigeria found out that the acquisition of requisite education is central to technology-driven crime participation and guarantees continual survival and career longevity in crime business. Consequently, this article analyses the necessity of educational acquisition for crime participation and further advocated for a paradigm shift to accommodate the changing trends in the education-crime symbiotic relationship in the ICT age. This is germane to criminology of ICT in capturing and mitigating the victimization that are contactable through participation in e-relationship.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unveiling Cybercrime in a Developing Country","authors":"R. Boateng, Jonathan Nii Barnor Barnor","doi":"10.4018/978-1-5225-9715-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch005","url":null,"abstract":"This article unveils the pervasiveness of cybercriminal activities in Ghana from the point of view of key stakeholders in the fight against the crime. From a critical realist's perspective, the authors employed a qualitative approach to understand cybercrime from the point of view of different key players—four cybercriminals, eight lawyers, eight bankers, six café operators and personnel from the cybercrime unit of the Ghana Police—for the study. Findings from the article pointed out that cybercrime has gained ground among Ghanaian youth between the ages of 12 and 35, mostly males with female decoys. The findings of the article also suggested lack of confidence in the Ghana Police service to crackdown on cybercriminal activities in Ghana. The research finally suggested that there seem to be the nonexistence of cybercrime policies and laws for lawyers to arraign or defend suspected criminals in Ghanaian courts of law.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}