De Gruyter Handbook of Digital Criminology
-
Herausgegeben von:
Mareile Kaufmann
und Heidi Mork Lomell
Über dieses Buch
The De Gruyter Handbook of Digital Criminology examines how digital devices spread and cut across all fields of crime and control. Providing a glossary of key theoretical, methodological and criminological concepts, the book defines and further establishes a vibrant and rapidly developing field. At the same time, Digital Criminology is not only presented as a novelty, but also as a continuation of the discipline's history.
Each chapter can be read as a free-standing contribution or texts can be combined to gain a more holistic understanding of Digital Criminology or to design a research project. Expert contributions vary from Criminology, Sociology, Law, Science and Technology Studies, to Information Science and Digital Humanities. Together, these supply readers with rich and original perspectives on the digitization of crime and control.
All contents of the De Gruyter Handbook of Digital Criminology are openly accessible. Open access has been funded by the European Research Council, as outlined in the respective chapters, and by the Department of Criminology and Sociology of Law at the University of Oslo.
Mareile and Heidi would like to thank Vilde B. Winge for her commitment and excellent research assistance in the realization of this book project. Thanks are also due to Gerhard Boomgaarden and his team at De Gruyter who saw this book through to production.
- First handbook of Digital Criminology on the market
- Detailed thematic overview of the ways in which crime and control have become integrated with digital technologies
- Covers the entire research process
Information zu Autoren / Herausgebern
Mareile Kaufmann, Universität Oslo, Oslo, Norwegen.
Heidi Mork Lomell, Universität Oslo, Oslo, Norwegen.
Fachgebiete
-
PDF downloadenOpen Access
Frontmatter
I -
PDF downloadenOpen Access
Table of Content
V -
PDF downloadenOpen Access
An introduction to digital criminology
1 -
PDF downloadenOpen Access
1 Abuse
21 -
PDF downloadenOpen Access
2 Accessing online communities
29 -
PDF downloadenOpen Access
3 Affordances
37 -
PDF downloadenOpen Access
4 Agency
45 -
PDF downloadenOpen Access
5 Algorithm
53 -
PDF downloadenOpen Access
6 App-based textual interviews
61 -
PDF downloadenOpen Access
7 Archives
69 -
PDF downloadenOpen Access
8 Art as method
79 -
PDF downloadenOpen Access
9 Artificial intelligence
83 -
PDF downloadenOpen Access
10 Automation
91 -
PDF downloadenOpen Access
11 Bias
99 -
PDF downloadenOpen Access
12 Big data
107 -
PDF downloadenOpen Access
13 Biometric failure
115 -
PDF downloadenOpen Access
14 Borders and border control
123 -
PDF downloadenOpen Access
15 Categorization and sorting
133 -
PDF downloadenOpen Access
16 Computation
141 -
PDF downloadenOpen Access
17 Cybercrime
149 -
PDF downloadenOpen Access
18 Darknet
157 -
PDF downloadenOpen Access
19 Data justice
165 -
PDF downloadenOpen Access
20 Databases
173 -
PDF downloadenOpen Access
21 Datafication
181 -
PDF downloadenOpen Access
22 Digilantism
189 -
PDF downloadenOpen Access
23 Digital
197 -
PDF downloadenOpen Access
24 DNA / big genome data
205 -
PDF downloadenOpen Access
25 Error
215 -
PDF downloadenOpen Access
26 Ethics
223 -
PDF downloadenOpen Access
27 Facial recognition
233 -
PDF downloadenOpen Access
28 Financial crime and surveillance
243 -
PDF downloadenOpen Access
29 Hacking
251 -
PDF downloadenOpen Access
30 Hate crime and networked hate
261 -
PDF downloadenOpen Access
31 Identify theft
269 -
PDF downloadenOpen Access
32 Infrastructures
279 -
PDF downloadenOpen Access
33 Intelligence
287 -
PDF downloadenOpen Access
34 Internet of things
297 -
PDF downloadenOpen Access
35 Interviews with digital objects
305 -
PDF downloadenOpen Access
36 Labs
315 -
PDF downloadenOpen Access
37 Low-tech
323 -
PDF downloadenOpen Access
38 Online courts
333 -
PDF downloadenOpen Access
39 Online ethnography
343 -
PDF downloadenOpen Access
40 Platforms
353 -
PDF downloadenOpen Access
41 Policing
363 -
PDF downloadenOpen Access
42 Prediction
371 -
PDF downloadenOpen Access
43 Privacy and data protection
381 -
PDF downloadenOpen Access
44 Privatization
389 -
PDF downloadenOpen Access
45 Punishment
399 -
PDF downloadenOpen Access
46 Recruitment via social media
409 -
PDF downloadenOpen Access
47 Researching online forums
419 -
PDF downloadenOpen Access
48 Robots
427 -
PDF downloadenOpen Access
49 Sentencing and risk assessment algorithms
435 -
PDF downloadenOpen Access
50 Sex work
445 -
PDF downloadenOpen Access
51 Smart city
453 -
PDF downloadenOpen Access
52 Social media
461 -
PDF downloadenOpen Access
53 Surveillance
469 -
PDF downloadenOpen Access
54 Synthetic data and generative machine learning
483 -
PDF downloadenOpen Access
55 Translation
493 -
PDF downloadenOpen Access
56 Victimization
501 -
PDF downloadenOpen Access
57 Vulnerability
509 -
PDF downloadenOpen Access
List of contributors
519
-
Herstellerinformationen:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com