You are previewing Cyber Crime and the Victimization of Women.
O'Reilly logo
Cyber Crime and the Victimization of Women

Book Description

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Foreword
  6. Preface
  7. Acknowledgment
  8. Chapter 1: Introduction
    1. Chapter Overview
    2. 1.1 Introduction
    3. 1.2 Why did we focus only on women?
    4. 1.3 The structure and methodology
    5. 1.4 Aims and Audience
    6. 1.5 Scope and expected implications
  9. Chapter 2: Definition, Typology and Patterns of Victimization
    1. Chapter Overview
    2. 2.1 Introduction
    3. 2.2 Changing Definitions of Cyber Crime
    4. 2.3 Issues in defining cyber crimes against women
    5. 2.4 Why do we need to have a separate definition?
    6. 2.5 Towards an operational definition of cyber crime against women
    7. 2.6 Typology and Patterns of Victimization
    8. 2.7. Conclusion
  10. Chapter 3: Etiology, Motives, and Crime Hubs
    1. Chapter Overview
    2. 3.1. Introduction
    3. 3.2. Etiology
    4. 3.3 Motives
    5. 3.4 Crime Hubs
    6. 3.5 Characteristics of Victims and Perpetrators
    7. 3.6 Conclusion
  11. Chapter 4: Women’s Rights in the Cyber Space and the Related Duties
    1. Chapter Overview
    2. 4.1. Introduction
    3. 4.2 Role of Conventions for Establishing Women’s Rights in the Cyber Space
    4. 4.3 Expanding the Aims of the Conventions to the Cyber Space
    5. 4.4 Women’s Rights in the Cyber Space: An Illusion?
    6. 4.5 Duties of Netizens
    7. 4.6 Conclusion
  12. Chapter 5: Legal Treatment of Cyber Crimes Against Women in USA
    1. Chapter Overview
    2. 5.1 Introduction
    3. 5.2 Regulations for modification of contents and related activities
    4. 5.3 Regulations for Stalking
    5. 5.4 Regulations for cyber bullying, hate speech and cyber defamation of women
    6. 5.5 Regulations for online pornography, obscenity and related issues against women
    7. 5.6 Issues of cyber privacy and related problems for women
    8. 5.7 The tortuous liabilities
    9. 5.8 Conclusion
  13. Chapter 6: Cyber Laws for Preventing Cyber Crimes Against Women in Canada
    1. Chapter Overview
    2. 6.1 Introduction
    3. 6.2 Cyber nonsexual offences against women and regulation of laws
    4. 6.3 Cyber privacy and related offences against women
    5. 6.4 Regulating cyber sexual offences
    6. 6.5 Obscenity and regulations
    7. 6.6 Conclusion
  14. Chapter 7: Cyber Space Regulations for Protecting Women in UK
    1. Chapter Overview
    2. 7.1 Introduction
    3. 7.2 Unauthorized access and related activities
    4. 7.3 Stalking and stalking related activities
    5. 7.4 Gender based offensive communications
    6. 7.5 Sexual offences
    7. 7.6 Conclusion
  15. Chapter 8: Cyber Crime Against Women and Regulations in Australia
    1. Chapter Overview
    2. 8.1 Introduction
    3. 8.2. Cyber harassments
    4. 8.3 Stalking
    5. 8.4 Harassments, threatening, blackmailing, and defamation
    6. 8.5 Forced pornography and obscenity
    7. 8.6 Liability of the ISP’s
    8. 8.7 Conclusion
  16. Chapter 9: Cyber Victimization of Women and Cyber Laws in India
    1. Chapter Overview
    2. 9.1 Introduction
    3. Part I: Situational analysis of cyber victimization of women
    4. Part II: Legal protections to women cyber victims
    5. Part III: Lacunas in the Cyber Laws
  17. Chapter 10: Model Charter and Conclusion
    1. Chapter Overview
    2. 10.1 Introduction
    3. 10.2 Model Charter
  18. About the Contributors
  19. Appendices
    1. APPENDIX 1
    2. APPENDIX 2
    3. APPENDIX 3
    4. APPENDIX 4
    5. APPENDIX 5
    6. APPENDIX 6
    7. APPENDIX 7
    8. APPENDIX 8
    9. APPENDIX 9
    10. APPENDIX 10
  20. Index