Reference Hub26
Indices2
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

Copyright: © 2012 |Pages: 264
ISBN13: 9781609608309|ISBN10: 1609608305|EISBN13: 9781609608316
DOI: 10.4018/978-1-60960-830-9
Cite Book Cite Book

MLA

Halder, Debarati, and K. Jaishankar. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. IGI Global, 2012. https://doi.org/10.4018/978-1-60960-830-9

APA

Halder, D. & Jaishankar, K. (2012). Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. IGI Global. https://doi.org/10.4018/978-1-60960-830-9

Chicago

Halder, Debarati, and K. Jaishankar. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-830-9

Export Reference

Mendeley
Favorite Full-Book Download

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization.

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Appendix 1
This content has been removed at the discretion of the publisher and the editors.
Appendix 2
This content has been removed at the discretion of the publisher and the editors.
Appendix 3
This content has been removed at the discretion of the publisher and the editors.
Appendix 4
This content has been removed at the discretion of the publisher and the editors.
Appendix 5
This content has been removed at the discretion of the publisher and the editors.
Appendix 6
This content has been removed at the discretion of the publisher and the editors.
Appendix 7
This content has been removed at the discretion of the publisher and the editors.
Appendix 8
This content has been removed at the discretion of the publisher and the editors.
Appendix 9
This content has been removed at the discretion of the publisher and the editors.
Appendix 10
This content has been removed at the discretion of the publisher and the editors.
About the Authors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.