Cyber crime and the victimization of women laws, rights and regulations

"This book investigates cyber crime, exploring gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing"--Provided by publisher.

Bibliographic Details
Main Author: Halder, Debarati, 1975-
Other Authors: Jaishankar, K.
Format: Electronic
Published: Hershey, PA Information Science Reference, 2012.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 01716cam a2200265 a 4500
001 25481
003 DLC
005 20110822110528.0
008 110426s2012 paua b 001 0 eng
020 # # |a 9781609608316 (ebk.) 
040 # # |a LC  |c DLC  |d DLC 
100 # # |a Halder, Debarati,  |d 1975- 
245 1 0 |a Cyber crime and the victimization of women  |b laws, rights and regulations  |c by Debarati Halder and K. Jaishankar.  |h [electronic resource] 
260 # # |a Hershey, PA  |b Information Science Reference,  |c 2012. 
300 # # |a 1 online resource (xii, 267 p. )  |b ill. ;  |c 29 cm. 
500 # # |a "Premier reference source"--Cover. 
504 # # |a Includes bibliographical references and index. 
505 # # |a Introduction -- Definition, typology and patterns of victimization -- Etiology, motives, and crime hubs -- Women's rights in the cyber space and the related duties -- Legal treatment of cyber crimes against women in USA -- Cyber crimes for preventing cyber crimes against women in Canada -- Cyber space regulations for protecting women in UK -- Cyber crime against women and regulations in Australia -- Cyber victimization of women and cyber laws in India -- Model charter and conclusion. 
520 # # |a "This book investigates cyber crime, exploring gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing"--Provided by publisher. 
650 # # |a Sex crimes. 
650 # # |a Computer crimes. 
650 # # |a Women  |x Crimes against. 
700 # # |a Jaishankar, K. 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-830-9  |z View fulltext via EzAccess