首页 > 最新文献

Encyclopedia of Criminal Activities and the Deep Web最新文献

英文 中文
Regulating the Internet 规管互联网
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch026
David T. A. Wesley
Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.
长期以来,美国法律一直认为计算机代码是一种语言,就像任何其他语言一样,因此受到美国宪法第一修正案规定的与其他形式的言论一样的言论自由保护。计算机代码还通过加密保护言论自由,使双方或多方之间的通信受到保护。本文将考虑计算机代码作为言论自由的法律历史,以及如何通过密码学和安全通信来促进其他形式的言论自由。它将进一步论证深网和暗网是这些先例的直接结果,尽管它们可能被网络犯罪分子和恶意国家行为者滥用,但它们在促进言论自由和人权方面也是不可或缺的。
{"title":"Regulating the Internet","authors":"David T. A. Wesley","doi":"10.4018/978-1-5225-9715-5.ch026","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch026","url":null,"abstract":"Established U.S. law has long held that computer code is a language, like any other language, and is therefore subject to same free speech protections afforded other forms of speech under the First Amendment of the United States Constitution. Computer code also protects free speech through cryptography that enables protected communication between two or more parties. This article will consider the legal history of computer code as free speech and how it can be used to promote other forms of free speech through cryptography and secure communications. It will further argue that the deep web and dark web are direct results of these precedents, and while they can be abused by cybercriminals and malicious state actors, they are also indispensable in promoting free speech and human rights.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Necessity of Paradigm Shift in Criminological Theorizing 犯罪学理论化范式转换的必要性
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch014
A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi
The traditional linkage of defective educational acquisition and the propensity to engage in anti-social behaviours has been accentuated in criminological theory. However, current development in ICT environment preferred for spacelessness, timelessness with its unchanging requirement for ingenuity in the use and mastery of e-interaction has consistently queried the veracity of defective education and crime participation. A survey on cyber fraud conducted in Nigeria found out that the acquisition of requisite education is central to technology-driven crime participation and guarantees continual survival and career longevity in crime business. Consequently, this article analyses the necessity of educational acquisition for crime participation and further advocated for a paradigm shift to accommodate the changing trends in the education-crime symbiotic relationship in the ICT age. This is germane to criminology of ICT in capturing and mitigating the victimization that are contactable through participation in e-relationship.
犯罪学理论强调了教育习得缺陷与反社会行为倾向之间的传统联系。然而,当前ICT环境的发展更倾向于无空间性,无时间性及其对使用和掌握电子交互的独创性的不变要求不断质疑有缺陷的教育和犯罪参与的真实性。在尼日利亚进行的一项关于网络欺诈的调查发现,获得必要的教育是技术驱动型犯罪参与的核心,并保证在犯罪业务中持续生存和职业寿命。因此,本文分析了教育习得对犯罪参与的必要性,并进一步提出了一种范式转换,以适应信息通信技术时代教育-犯罪共生关系的变化趋势。这与信息通信技术的犯罪学密切相关,因为它可以通过参与电子关系来捕捉和减轻受害者。
{"title":"Necessity of Paradigm Shift in Criminological Theorizing","authors":"A. Jegede, Olusola Oyero, N. Okorie, C. Ayedun, M. Ajayi","doi":"10.4018/978-1-5225-9715-5.ch014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch014","url":null,"abstract":"The traditional linkage of defective educational acquisition and the propensity to engage in anti-social behaviours has been accentuated in criminological theory. However, current development in ICT environment preferred for spacelessness, timelessness with its unchanging requirement for ingenuity in the use and mastery of e-interaction has consistently queried the veracity of defective education and crime participation. A survey on cyber fraud conducted in Nigeria found out that the acquisition of requisite education is central to technology-driven crime participation and guarantees continual survival and career longevity in crime business. Consequently, this article analyses the necessity of educational acquisition for crime participation and further advocated for a paradigm shift to accommodate the changing trends in the education-crime symbiotic relationship in the ICT age. This is germane to criminology of ICT in capturing and mitigating the victimization that are contactable through participation in e-relationship.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unveiling Cybercrime in a Developing Country 揭露发展中国家的网络犯罪
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9715-5.ch005
R. Boateng, Jonathan Nii Barnor Barnor
This article unveils the pervasiveness of cybercriminal activities in Ghana from the point of view of key stakeholders in the fight against the crime. From a critical realist's perspective, the authors employed a qualitative approach to understand cybercrime from the point of view of different key players—four cybercriminals, eight lawyers, eight bankers, six café operators and personnel from the cybercrime unit of the Ghana Police—for the study. Findings from the article pointed out that cybercrime has gained ground among Ghanaian youth between the ages of 12 and 35, mostly males with female decoys. The findings of the article also suggested lack of confidence in the Ghana Police service to crackdown on cybercriminal activities in Ghana. The research finally suggested that there seem to be the nonexistence of cybercrime policies and laws for lawyers to arraign or defend suspected criminals in Ghanaian courts of law.
本文从打击犯罪的关键利益相关者的角度,揭示了加纳网络犯罪活动的普遍性。从批判现实主义的角度来看,作者采用定性方法从不同关键参与者的角度来理解网络犯罪——四名网络罪犯、八名律师、八名银行家、六名咖啡馆经营者和加纳警方网络犯罪部门的人员——进行研究。这篇文章的调查结果指出,网络犯罪在加纳12岁至35岁的年轻人中越来越流行,其中大多数是有女性诱饵的男性。这篇文章的调查结果还表明,人们对加纳警方打击网络犯罪活动缺乏信心。该研究最后表明,加纳法院似乎不存在网络犯罪政策和法律,以供律师起诉或辩护犯罪嫌疑人。
{"title":"Unveiling Cybercrime in a Developing Country","authors":"R. Boateng, Jonathan Nii Barnor Barnor","doi":"10.4018/978-1-5225-9715-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-5225-9715-5.ch005","url":null,"abstract":"This article unveils the pervasiveness of cybercriminal activities in Ghana from the point of view of key stakeholders in the fight against the crime. From a critical realist's perspective, the authors employed a qualitative approach to understand cybercrime from the point of view of different key players—four cybercriminals, eight lawyers, eight bankers, six café operators and personnel from the cybercrime unit of the Ghana Police—for the study. Findings from the article pointed out that cybercrime has gained ground among Ghanaian youth between the ages of 12 and 35, mostly males with female decoys. The findings of the article also suggested lack of confidence in the Ghana Police service to crackdown on cybercriminal activities in Ghana. The research finally suggested that there seem to be the nonexistence of cybercrime policies and laws for lawyers to arraign or defend suspected criminals in Ghanaian courts of law.","PeriodicalId":186733,"journal":{"name":"Encyclopedia of Criminal Activities and the Deep Web","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Encyclopedia of Criminal Activities and the Deep Web
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1