Dot.cons


Book Description

Cyberspace opens up infinitely new possibilities to the deviant imagination. With access to the Internet and sufficient know-how you can, if you are so inclined, buy a bride, cruise gay bars, go on a global shopping spree with someone else's credit card, break into a bank's security system, plan a demonstration in another country and hack into the Pentagon − all on the same day. In more than any other medium, time and place are transcended, undermining the traditional relationship between physical context and social situation. This book crosses the boundaries of sociological, criminological and cultural discourse in order to explore the implications of these massive transformations in information and communication technologies for the growth of criminal and deviant identities and behaviour on the Internet. This is a book not about computers, nor about legal controversies over the regulation of cyberspace, but about people and the new patterns of human identity, behaviour and association that are emerging as a result of the communications revolution.




Dot.cons


Book Description

This book crosses the boundaries of sociological, criminological and cultural discourse in order to explore the implications of recent massive transformations in information and communication technologies for the growth of criminal and deviant identities and behaviour on the Internet.




Dot.cons


Book Description




Dot Con


Book Description

From viral comedy sensation James Veitch (as seen on TED, Conan, and The Tonight Show with Jimmy Fallon) comes a collection of laugh-out-loud funny exchanges with email scammers. The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love . . . they spam our inboxes with their hapless pleas for help, money, and your social security number. In Dot Con, Veitch finally answers the question: what would happen if you replied? Suspicious emails pop up in our inboxes and our first instinct is to delete unopened. But what if you responded to the deposed princess begging for money in your Gmail? Veitch dives into the underbelly of our absurd email scam culture, playing the scammers at their own game, and these are the surprising, bizarre, and hilarious results.




Dot Cons


Book Description




Media and Crime in the U.S.


Book Description

The rise of mobile and social media means that everyday crime news is now more immediate, more visual, and more democratically produced than ever. Offering new and innovative ways of understanding the relationship between media and crime, Media and Crime in the U.S. critically examines the influence of media coverage of crimes on culture and identity in the United States and across the globe. With comprehensive coverage of the theories, research, and key issues, acclaimed author Yvonne Jewkes and award-winning professor Travis Linnemann have come together to shed light on some of the most troubling questions surrounding media and crime today. The free open-access Student Study site at study.sagepub.com/jewkesus features web quizzes, web resources, and more. Instructors, sign in at study.sagepub.com/jewkesus for additional resources!




Common LISP


Book Description

Highly accessible treatment covers cons cell structures, evaluation rules, programs as data, recursive and applicable programming styles. Nearly 400 illustrations, answers to exercises, "toolkit" sections, and a variety of complete programs. 1990 edition.




Crime Online


Book Description

This text provides an account and an analysis of key issues within the field of cybercrime. It focuses on different constructions and manifestations of cybercrime and diverse responses to its regulation.




Crime and Deviance in Cyberspace


Book Description

This volume presents the reader with an interesting and, at times, provocative selection of contemporary thinking about cybercrimes and their regulation. The contributions cover the years 2002-2007, during which period internet service delivery speeds increased a thousand-fold from 56kb to 56mb per second. When combined with advances in networked technology, these faster internet speeds not only made new digital environments more easily accessible, but they also helped give birth to a completely new generation of purely internet-related cybercrimes ranging from spamming, phishing and other automated frauds to automated crimes against the integrity of the systems and their content. In order to understand these developments, the volume introduces new cybercrime viewpoints and issues, but also a critical edge supported by some of the new research that is beginning to challenge and surpass the hitherto journalistically-driven news stories that were once the sole source of information about cybercrimes.




Dot.con


Book Description

This is a sceptical history of the internet/stock market boom. John Cassidy argues that what we have just witnessed wasn't simply a stock market bubble; it was a social and cultural phenomenon driven by broad historical forces. Cassidy explains how these forces combined to produce the buying hysteria that drove the prices of loss-making companies into the stratosphere. Much has been made of Alan Greenspan's phrase irrational exuberance, but Cassidy shows that there was nothing irrational about what happened. The people involved - fund managers, stock analysts, journalists and pundits - were simply acting in their own self-interest.