"Dieser Ratgeber stellt Besonderheiten, Funktionen, Auslöser und die Verbreitung von Cyber-Mobbing vor und behandelt das Thema Cyber-Mobbing in den Medien. Darüber hinaus wird erläutert, ob Cyber-Mobbing strafbar ist und wie man Cyber-Mobbing im schulischen und familiären Umfeld vorbeugen oder a
...
nhand bestimmter Warnzeichen so früh wie möglich erkennen kann. Im Kapitel „Was tun bei Cyber-Mobbing?“ werden Möglichkeiten vorgestellt, gegen Cyber-Mobbing vorzugehen. Die bei Cyber-Mobbing über Smartphones und Apps geltenden Besonderheiten werden ebenfalls vorgestellt. Drei Experteninterviews beleuchten die rechtlichen Möglichkeiten sowie die psychologischen Aspekte und Folgen von Cyber-Mobbing und geben Ratschläge für Betroffene und Angehörige." (Seite 3)
more
"En este estudio se analiza el acoso escolar y las graves consecuencias que está provocando a las víctimas de esta agresiva violencia en los centros educativos, que destruye la autoestima y la confianza de los menores acosados. En este trabajo de investigación también se abordael acoso escolar p
...
ero utilizando la tecnología de la información y la comunicación, es el denominado ciberbullying, cometiéndose la agresión en formato electrónico a través de medios de comunicación como el correo electrónico, mensajes de texto a través de teléfonos móviles o dispositivos móviles o la publicación de videos y fotografías en plataforma electrónica [...] Este trabajo tiene como finalidad concienciar a todos los operadores que intervienen en esta problemática social, teniendo como destinatario no sólo a los Jueces, Tribunales y abogados, sino también a los cuerpos y fuerzas de seguridad, padres de menores escolares, centros educativos, profesores, periodistas y políticos." (Descripción de la casa editorial)
more
"This paper does suggest that child abuse content is the most popular type of content on the Tor Dark Net. While law enforcement may crawl such sites, the number of requests that would be seen would be only a tiny fraction, and hence not skew the outline ratios. Similarly, denial of service attacks
...
were not observed and so are also unlikely to account for the high requests. The usage of Tor2Web may underrepresent some categories, but it is not currently clear whether, or why, such groups would exclusively use this tool." (Page 9)
more
"The scale of the Internet’s underworld is immense. The number of non-indexed web sites, known as the Deep Web, is estimated to be 400 to 500 times larger than the surface web of indexed, searchable web sites. And the Deep Web is where the dark side of the Internet flourishes. While there are plen
...
ty of law-abiding citizens and well-intentioned individuals (such as journalists, political dissidents, and whistleblowers) who conduct their online activities below the surface, the part of the Deep Web known as the Darknet has become a conduit for illegal and often dangerous activities. This policy brief outlines what the Deep Web and Darknet are, how they are accessed, and why we should care about them. For policymakers, the continuing growth of the Deep Web in general and the accelerated expansion of the Darknet in particular pose new policy challenges." (Summary)
more
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining
...
contributions from many of those who have established and developed cyber research over the past 25 years and who continue to shape it in its current phase, with more recent entrants to the field who are building on this tradition and breaking new ground. Contributions reflect both the global nature of cybercrime problems, and the international span of scholarship addressing its challenges." (Publisher description)
more
"The Guide contains six main chapters. After an Introduction (Chapter 1) the Guide provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and d
...
enial-of-service attacks. The Guide also provides an overview of the challenges as they relate to the investigation and prosecution of cybercrime (Chapters 3 and 4). After a summary of some of the activities undertaken by international and regional organizations in the fight against cybercrime (Chapter 5), the Guide continues with an analysis of different legal approaches with regard to substantive criminal law, procedural law, international cooperation and the responsibility of Internet Service Providers (Chapter 6), including examples of international approaches as well as good-practice examples from national solutions." (Introduction)
more
"This report is intended to provide a framework for promoting recognition and understanding of the real risks of violence for children and young people within cyberspace and through the use of new technologies, in particular the Internet and mobile phones. It identifies the harms confronted by child
...
ren and young people in this environment and uses the data available to assess current and emerging patterns. It raises concerns about new areas where harm may occur, which may be averted if early action is taken. Finally, it makes recommendations that may be enacted by a wide range of actors to serve the best interests of all children and young people, and thus the wider society." (Executive summary)
more