"Bringing together perspectives from academia and practice, this second edition Research Handbook provides fresh insights into debates surrounding digital technology and how to respect and protect human rights in an increasingly digital world. New and updated chapters cover the issues posed by the m
...
anagement of key internet resources, the governance of its architecture and the role of different stakeholders." (Publisher description)
more
"Cybercrime has been on the rise since the 1990s, and so is the need for researchers and public administrations to better estimate its prevalence, incidence, distribution and nature. The limitations of police statistics as measures of crime are widely known and seem even more severe—in terms of th
...
e volume of unrecorded offenses—in the case of cybercrimes. The problem of under-recording may be even more acute for crimes suffered by organizations. From that perspective, victimization surveys with national representative samples are seen as the main alternative to obtain more valid and reliable estimates of cybercrime and cyberdeviance. Self-reported delinquency studies can provide information on juvenile cybercrime and cyberdeviance from the point of view of the offenders and, if accompanied by a victimization module, on the incidents suffered by the younger generations. Surveys also provide information on many other variables that are absent from police or court recorded crimes, related to the personal characteristics of individuals, their everyday activities, cybersecurity practices and so on, which allow identifying key risk factors and testing different theories of online crime and deviance. In addition, surveys conducted regularly can also be key to assessing temporal changes in overall criminal behavior. While we have seen a rapid increase in the number of crime surveys that include measures of cybercrime since the early 2010s, our scoping review has identified a series of practices that could be refined to better measure online victimization and offending, and to enable cross-national and temporal comparisons. Overall, it seems reasonable to state that cybercrime and cyberdeviance is measured less adequately than more traditional crime types. This might be in part due to the ever-changing nature of cyberspace." (Ways forward and conclusions, pages 65-66)
more
"Die Reichweite der Cybercrime-Branche hat einen neuen Höhepunkt erreicht. 72% aller Organisationen weltweit berichten vom steigenden Cyberrisiko. Der Schaden durch Cybercrime betrug 2024 allein in Deutschland 178,6 Mrd. Euro. Das sind 20% mehr als im Vorjahr. Cyberkriminelle hängen Organisatione
...
n bei der Nutzung von KI ab: 91 % der Sicherheitsbeauftragten weltweit erwarten in den nächsten drei Jahren einen deutlichen Anstieg KI-getriebener Angriffe. Und obwohl sich 96% der Sicherheitsexperten einig sind, dass es wichtig ist, KI-basierte Angriffe zu erkennen, schätzen nur 26 % ihre eigene Fähigkeit diesbezüglich als hoch ein. Angreifende nutzen jeden verfügbaren Kanal als mögliches Eintrittstor: 56% der Sicherheitsbeauftragten in der DACH-Region zufolge ist E-Mail immer noch der primäre Angriffskanal. 98% der Organisationen in Deutschland, Österreich und der Schweiz berichten von einem Anstieg bei Multi-Channel-Angriffen via E-Mail, Messaging-Apps, Social Media und Deepfake-Sprachanrufen.." (Executive Summary)
more
"Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance. Understanding deviance broadly, the handbook acknowledges both
...
an objective normative approach and a subjective, reactivist approach to the topic, putting into sharp relief the distinctions between cybercrime and online deviance on the one hand, and wider concerns of online communities related to online deviance on the other. Divided into five sections, the first section is devoted primarily to scholarship about the theories and methods foundational to exploring online deviance. The second section, "Gender, Sex, and Sexuality", presents empirical research on expressions of gender, sex, and sexuality in online spaces considered deviant. The third section, "Violence and Aggression," highlights scholarship on types of violent communications such as hate speech and cyberstalking. The fourth section, "Communities and Culture," describes empirical research on online communities and networks that can be described as deviant by wider society. Lastly, the fifth section, "Regional Perspectives," highlights research in which a terrestrial location is impactful to the online phenomena studied." (Publisher description)
more
"In 2023, Advancing Rights in Southern Africa (ARISA) through its consortium partner, Internews, undertook the most comprehensive review yet of laws affecting media practice and the freedom of expression, including cyber laws, penal codes, constitutions and acts of parliament, in the sixteen Souther
...
n African Development Community (SADC) countries. The Information Ecosystem Analysis (IEA) provides an in-depth overview of the legal provisions that have been enacted or are in various stages of becoming laws in the region, and are being used by SADC governments to stifle and limit press freedom and public debate. Each of the sixteen SADC countries are included as individual country chapters in this report, providing country-specific legal analyses of the relevant Cyber security and related laws used by the respective country’s governments to stifle freedom of expression. The approach used by the researchers considered the legislative environment together with literature on the relevant topics, court cases and media reports about the application of specific laws and focused on incidents of where laws were used, dating from 2020 to present. The respective country analyses have been informed by extensive virtual interviews conducted with journalists, civil society representatives and academics in the region. Attention was also given to countries holding elections in 2023 and 2024." (Executive summary)
more
"Das Internet hat in den vergangenen Jahrzehnten einen historisch einzigartigen globalen Kommunikationsraum geschaffen. Doch zunehmend zeigen sich nicht nur die Möglichkeiten, sondern auch die Gefahren dieser Vernetzung: Kriminelle Hacker nutzen aktiv Sicherheitslücken aus, um Privatpersonen oder
...
Unternehmen zu erpressen oder zu berauben. Staatliche Akteure und Sicherheitsdienste setzen ausgeklügelte, im Geheimen entwickelte Software zu Spionagezwecken ein. Seit 2010 sei ein Trend hin zur digitalen Kriegsführung zu beobachten, so die Journalistin Eva Wolfangel: Hacker greifen, wie aktuell beim russischen Angriffskrieg gegen die Ukraine zu beobachten sei, im staatlichen Auftrag gezielt die kritische Infrastruktur anderer Staaten an, etwa Kraftwerke oder Kliniken. Anhand zahlreicher Beispiele veranschaulicht die Autorin die Gefahren der digitalen Welt und zeigt das Vorgehen der beteiligten Akteure auf. Sie zeichnet die größten „Coups“ der jüngeren Vergangenheit und damit die Entwicklung von Cyberkriminalität und Cyberkriegsführung bis heute nach. Wolfangel macht deutlich, dass potenziell jede und jeder von Cyberkriminalität bedroht sei und legt dar, was Unternehmen, Behörden und Einzelpersonen zum eigenen Schutz tun können." (Verlagsbeschriebung)
more
"Cyber-deviance has been studied extensively over the past two decades, though owing to the elusive nature of cyberspace and the anonymity it affords its users, research has yet to paint a clear picture of the risk factors that predict online deviance. Early identification of these factors is critic
...
al to the development of effective crime prevention strategies. To date, a comprehensive review of the longitudinal risk factors associated with juvenile cyber-deviance, in all its forms, has yet to be examined. This study aims to address this research gap by conducting an exploratory systematic literature review appraising current knowledge on the risk factors associated with juvenile cyber-deviance. Various databases were systematically searched for relevant English-language journal articles comprising longitudinal studies on young people aged 12–17 years. Eligible studies included an outcome measure of any distinct form of deviance perpetrated using digital devices and/or the Internet, potential risk and/or protective factors, and quantitative analyses. This search yielded 26,926 studies, of which 38 met the inclusion criteria. Most of the studies found examined the longitudinal risk factors associated with cyberbullying, followed by studies on sexting, cyber dating abuse, and general cyber-delinquency. Results indicated several longitudinal factors were consistently associated with cyber-deviance (e.g., gender, physical bullying, low self-control, child-rearing, parental attachment, and deviant peers). Physical bullying had the most consistent and pronounced association with cyber-deviance. Most studies had a relatively sound methodological quality; however, the small number of studies and their concentration on cyberbullying requires that the findings be interpreted with caution. Additional high-quality research is needed examining the longitudinal risk factors associated with all types of cyber-deviance to identify vulnerable young people and prioritise them for intervention prospectively." (Abstract)
more
"Pour faciliter le travail des journalistes, il importe de s’assurer que leur droit de rechercher, d’accéder à l’information, de produire et de publier du contenu d’intérêt public n’est pas restreint. Pour l’avenir de la démocratie et de la presse qui lui est congénitale, il est im
...
portant de procéder à une analyse sur les potentiels conflits juridiques qui peuvent découler de l’application de ces nouvelles lois, une fois qu’elles sont confrontées aux législations existantes ou aux normes et bonnes pratiques internationales en la matière. C’est pour procéder à un tel exercice qu’International Media Support (IMS), partenaire de l’étude, dans le cadre de son Programme Sahel (avec le soutien de Danida/la coopération danoise), a confié à l’École Supérieure de Journalisme, des Métiers de l’Internet et de la Communication (E-jicom) la mission de procéder à cette analyse." (Introducion, page 7)
more
"The book compares six different areas of law that have been particularly exposed to global digitality, namely laws regulating consumer contracts, data protection, the media, fnancial markets, criminal activity and intellectual property law. Comparing how these very different areas of law have evolv
...
ed with regard to cross-border online situations, the book considers whether cyberlaw is little more than “the law of the horse”, or whether the law of global digitality is indeed special and, if so, what its characteristics across various areas of law are. The book brings together legal academics with expertise in how law has both reacted to and shaped cross-border, global Internet communication and their contributions consider whether it is possible to identify a particular mediality of law in the digital age." (Publisher description)
more
"In sub-Saharan Africa, 495 million people (46 percent of the population) subscribed to mobile phones in 2020, however, the cost of accessing the internet is very high and many African Governments are renowned for restricting access to the internet to limit critics and their opposition through inter
...
net shutdowns, especially ahead of elections. There is widespread government surveillance in many countries in Africa without sufficient legal basis. In Zimbabwe, for example, the interception of private communications is permitted without a warrant issued by a court; instead, the Minister of Transport and Communication has the power to order such surveillance. Many countries in Africa and around the world have passed cybercrime legislation in recent years or are about to do so. There is great concern that many of these laws over-reach their legitimate aim, lack clear definitions and are susceptible to being used for regulating online content and restricting freedom of expression." (Page 1)
more
"Im Januar 2022 werden die UN-Mitgliedstaaten Verhandlungen über ein globales Abkommen zur Bekämpfung der Cyberkriminalität aufnehmen. Mehr internationale Zusammenarbeit in diesem Bereich ist dringend geboten. Doch es gibt auch Risiken. So könnten vage Verpflichtungen, etwa zur Überwachung des
...
Internetverkehrs, von autoritären Regimen missbraucht werden, um unter dem Deckmantel der Kriminalitätsbekämpfung gegen Aktivisten und Oppositionelle vorzugehen. Um dies zu verhindern, müssen die Menschenrechte als Referenzrahmen gestärkt werden, fordert Mischa Hansel im Global Governance Spotlight 5-2021." (Verlagsbeschreibung)
more
"The internet brought new opportunities for Pakistan to develop into a progressive society and a more democratic country, and it opened doors for more forms of criminal activity (like fraud, child pornography, etc.), more intimidation and the spreading extremism, and more information gathering on ci
...
tizens by business and state agents. It will be highly important to Pakistan to more actively and more successfully develop the positive sides of IT technology, internet services, and the social media, while at the same time check its excesses, problems and abuses. FES Pakistan is delighted to present the report “Internet Landscape 2020” It is providing an excellent overview of internet usage, and on its dangers and opportunities. We hope, the report will facilitate a broad discussion about the use and further development of the internet in Pakistan, to fully tun it into another means for Pakistan to utilize its full potential and develop into a more progressive, citizen-oriented country." (Preface, page 4)
more
"Die britische Mathematikerin Hannah Fry stellt Algorithmen als schrittweise Verfahren vor, die dazu dienen, Probleme zu lösen oder ein Ziel zu erreichen. Für Medizin, Polizei, Justiz, Verkehr oder Handel könne das äußert fortschrittlich sein. Doch die bahnbrechende Technik habe ihren Preis - A
...
lgorithmen beruhen nicht zuletzt auf großen Mengen auch privater Daten und können Nutzer fehlleiten oder gar manipulieren. Sie suggerieren Objektivität und Autorität und sind zugleich hoch anfällig für den Missbrauch durch Partikularinteressen. Fry erklärt, wie Algorithmen funktionieren, was ihre Stärken ausmacht und wo ihre Grenzen liegen. Sie plädiert für einen bewussten, weitsichtigen Umgang mit dieser Technik und möchte solche Modelle fördern, die humanen Anforderungen gerecht werden und uns auf ebenso demokratische wie transparente Weise bei Entscheidungsfindungen unterstützen." (Klappentext)
more
"This book explores a wide range of cyberpsychological processes and activities through the research and writings of some of the world’s leading cyberpsychology experts. The book covers a broad range of topics spanning the key areas of research interest in this emerging field of enquiry and will b
...
e of interest to those who have only recently discovered the discipline as well as more seasoned cyberpsychology researchers and teachers. The book contains eight sections, and includes contributions spanning the breadth of current academic and public interest. Topics include: online research methods, self-presentation and impression management, technology across the lifespan, interaction and interactivity, online groups and communities, social media, health and technology, video gaming, and cybercrime and cybersecurity." (Publisher description)
more
"While cyberviolence may be targeted at any individual or group and may entail a wide range of acts, this mapping study focuses in particular on children and women, who are often the victims of cyberviolence. The experience and solutions with regard to these victims should modus modendi be applicabl
...
e to other categories of victims while taking into account the specificities of violence against different categories of victims. The present study is thus aimed at mapping acts that constitute cyberviolence and drawing conclusions as to typologies and concepts; providing examples of national experiences and responses to such acts (including policies, strategies, legislation, cases and case law); discussing international responses under the Budapest Convention and other treaties (in particular the Istanbul and Lanzarote Conventions of the Council of Europe); developing recommendations as to the further course of action." (Page 2)
more
"Al reconocer que estructural y socialmente la enunciación y la sistematización de los saberes comunes y comunitarios es contestatario y disruptivo, apelamos a la sabiduría ancestral y la infalible innovación contemporánea de las colectivas, de las mujeres tecnólogas, de las ciberfeministas y
...
de las activistas a favor de los derechos de las mujeres y las entrevistamos. Quisimos saber qué es violencia para ellas y cómo la viven cuando les es narrada por otras que la padecen. Cómo llevan esos primeros momentos de atención, contención y diagnósticos. De qué forma ayudan a las mujeres enfrentando violencias y qué aprendizajes recogen de esos acompañamientos. Y a la par de que compartieran con nosotras algún hack, su noción de límites y las estrategias que han elaborado para difundir su trabajo y sus conocimientos sin poner en peligro a sus pares y aliadas. En el transcurso de escuchar testimonios de más de 20 mujeres provenientes de casi todos los países de América Latina encontramos reflexiones profundas sobre el ser y el hacer de las mujeres y bases sólidas para el fortalecimiento de redes de apoyo, educación y autodefensa." (Introducción)
more
"Das Werk vermittelt verständlich und anschaulich den aktuellen Stand des Wissens zum Einsatz neuer Medien in der Klinischen Psychologie und Psychotherapie. Neben dem Wandel psychologischen und psychotherapeutischen Denkens und Handelns beleuchten die AutorInnen auch die daraus entstehenden ethisch
...
en und rechtlichen Rahmenbedingungen. Ein weiterer Schwerpunkt liegt auf der Diskussion jener Veränderungen, die durch die Digitalisierung im therapeutischen Behandlungsalltag entstanden sind. Fallbeispiele veranschaulichen die konkreten Chancen und Herausforderungen der psychologischen und psychotherapeutischen Arbeit. Zuletzt werden auch Problemfelder wie die problematische Internetnutzung, Cybermobbing und Extremismus im Internet dargestellt und diskutiert. Am Ende jedes Kapitels finden sich Take-Home-Messages, welche zentrale Punkte zusammenfassen und eine Handlungsorientierung bieten." (Verlagsbeschreibung)
more
"This study assesses the Cybercrime Act 2015 and its implications for online press freedom in the liberal authoritarian state of Nigeria. Specifically, the study examines how the character of political leadership in Nigeria leads to wrongful application of the act to undermine the independence of th
...
e press. The study shows that Nigeria’s online press freedom index has consistently worsened since the introduction of the Cybercrime Act in 2015, and it recommends the promotion of a holistic democratic project that recognises economic and political freedom as being inextricably linked." (Abstract)
more