Hate Crimes in Cyberspace / / Danielle Keats Citron.
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifyi...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter EBOOK PACKAGE Complete Package 2014 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Cambridge, MA : : Harvard University Press, , [2014] ©2014 |
Year of Publication: | 2014 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (310 p.) :; 1 graph, 2 tables |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780674735613 |
---|---|
ctrlnum |
(DE-B1597)427380 (OCoLC)891397038 |
collection |
bib_alma |
record_format |
marc |
spelling |
Citron, Danielle Keats, author. aut http://id.loc.gov/vocabulary/relators/aut Hate Crimes in Cyberspace / Danielle Keats Citron. Cambridge, MA : Harvard University Press, [2014] ©2014 1 online resource (310 p.) : 1 graph, 2 tables text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Introduction -- Part One: Understanding Cyber Harassment -- one. Digital Hate -- two. How the Internet’s Virtues Fuel Its Vices -- three. The Problem of Social Attitudes -- Part Two: Moving Forward -- four. Civil Rights Movements, Past and Present -- five. What Law Can and Should Do Now -- six. Updating the Law: The Harassers -- seven. Legal Reform for Site Operators and Employers -- eight. “Don’t Break the Internet” and Other Free Speech Challenges -- nine. Silicon Valley, Parents, and Schools -- Conclusion -- Notes -- Acknowledgments -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker’s “revenge porn” were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022) Computer crimes. Cyberbullying. Cyberstalking. Hate crimes. LAW / Computer & Internet. bisacsh Title is part of eBook package: De Gruyter EBOOK PACKAGE Complete Package 2014 9783110369526 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Law 2014 9783110370232 ZDB-23-DGC Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2014-2015 9783110665901 print 9780674368293 https://doi.org/10.4159/harvard.9780674735613 https://www.degruyter.com/isbn/9780674735613 Cover https://www.degruyter.com/document/cover/isbn/9780674735613/original |
language |
English |
format |
eBook |
author |
Citron, Danielle Keats, Citron, Danielle Keats, |
spellingShingle |
Citron, Danielle Keats, Citron, Danielle Keats, Hate Crimes in Cyberspace / Frontmatter -- Contents -- Introduction -- Part One: Understanding Cyber Harassment -- one. Digital Hate -- two. How the Internet’s Virtues Fuel Its Vices -- three. The Problem of Social Attitudes -- Part Two: Moving Forward -- four. Civil Rights Movements, Past and Present -- five. What Law Can and Should Do Now -- six. Updating the Law: The Harassers -- seven. Legal Reform for Site Operators and Employers -- eight. “Don’t Break the Internet” and Other Free Speech Challenges -- nine. Silicon Valley, Parents, and Schools -- Conclusion -- Notes -- Acknowledgments -- Index |
author_facet |
Citron, Danielle Keats, Citron, Danielle Keats, |
author_variant |
d k c dk dkc d k c dk dkc |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Citron, Danielle Keats, |
title |
Hate Crimes in Cyberspace / |
title_full |
Hate Crimes in Cyberspace / Danielle Keats Citron. |
title_fullStr |
Hate Crimes in Cyberspace / Danielle Keats Citron. |
title_full_unstemmed |
Hate Crimes in Cyberspace / Danielle Keats Citron. |
title_auth |
Hate Crimes in Cyberspace / |
title_alt |
Frontmatter -- Contents -- Introduction -- Part One: Understanding Cyber Harassment -- one. Digital Hate -- two. How the Internet’s Virtues Fuel Its Vices -- three. The Problem of Social Attitudes -- Part Two: Moving Forward -- four. Civil Rights Movements, Past and Present -- five. What Law Can and Should Do Now -- six. Updating the Law: The Harassers -- seven. Legal Reform for Site Operators and Employers -- eight. “Don’t Break the Internet” and Other Free Speech Challenges -- nine. Silicon Valley, Parents, and Schools -- Conclusion -- Notes -- Acknowledgments -- Index |
title_new |
Hate Crimes in Cyberspace / |
title_sort |
hate crimes in cyberspace / |
publisher |
Harvard University Press, |
publishDate |
2014 |
physical |
1 online resource (310 p.) : 1 graph, 2 tables |
contents |
Frontmatter -- Contents -- Introduction -- Part One: Understanding Cyber Harassment -- one. Digital Hate -- two. How the Internet’s Virtues Fuel Its Vices -- three. The Problem of Social Attitudes -- Part Two: Moving Forward -- four. Civil Rights Movements, Past and Present -- five. What Law Can and Should Do Now -- six. Updating the Law: The Harassers -- seven. Legal Reform for Site Operators and Employers -- eight. “Don’t Break the Internet” and Other Free Speech Challenges -- nine. Silicon Valley, Parents, and Schools -- Conclusion -- Notes -- Acknowledgments -- Index |
isbn |
9780674735613 9783110369526 9783110370232 9783110665901 9780674368293 |
url |
https://doi.org/10.4159/harvard.9780674735613 https://www.degruyter.com/isbn/9780674735613 https://www.degruyter.com/document/cover/isbn/9780674735613/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
364 - Criminology |
dewey-full |
364.150285/4678 |
dewey-sort |
3364.150285 44678 |
dewey-raw |
364.150285/4678 |
dewey-search |
364.150285/4678 |
doi_str_mv |
10.4159/harvard.9780674735613 |
oclc_num |
891397038 |
work_keys_str_mv |
AT citrondaniellekeats hatecrimesincyberspace |
status_str |
n |
ids_txt_mv |
(DE-B1597)427380 (OCoLC)891397038 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE Complete Package 2014 Title is part of eBook package: De Gruyter EBOOK PACKAGE Law 2014 Title is part of eBook package: De Gruyter Harvard University Press Complete eBook-Package 2014-2015 |
is_hierarchy_title |
Hate Crimes in Cyberspace / |
container_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE Complete Package 2014 |
_version_ |
1770176280191303680 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05313nam a22008775i 4500</leader><controlfield tag="001">9780674735613</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20221201113901.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">221201t20142014mau fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013946363</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1029810381</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1032676840</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037980205</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1041973947</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1046621172</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047010468</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979576600</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674735613</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4159/harvard.9780674735613</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)427380</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891397038</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">mau</subfield><subfield code="c">US-MA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">364.150285/4678</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Citron, Danielle Keats, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hate Crimes in Cyberspace /</subfield><subfield code="c">Danielle Keats Citron.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA : </subfield><subfield code="b">Harvard University Press, </subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (310 p.) :</subfield><subfield code="b"> 1 graph, 2 tables</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Part One: Understanding Cyber Harassment -- </subfield><subfield code="t">one. Digital Hate -- </subfield><subfield code="t">two. How the Internet’s Virtues Fuel Its Vices -- </subfield><subfield code="t">three. The Problem of Social Attitudes -- </subfield><subfield code="t">Part Two: Moving Forward -- </subfield><subfield code="t">four. Civil Rights Movements, Past and Present -- </subfield><subfield code="t">five. What Law Can and Should Do Now -- </subfield><subfield code="t">six. Updating the Law: The Harassers -- </subfield><subfield code="t">seven. Legal Reform for Site Operators and Employers -- </subfield><subfield code="t">eight. “Don’t Break the Internet” and Other Free Speech Challenges -- </subfield><subfield code="t">nine. Silicon Valley, Parents, and Schools -- </subfield><subfield code="t">Conclusion -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker’s “revenge porn” were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberbullying.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberstalking.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hate crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Computer & Internet.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Complete Package 2014</subfield><subfield code="z">9783110369526</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Law 2014</subfield><subfield code="z">9783110370232</subfield><subfield code="o">ZDB-23-DGC</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Harvard University Press Complete eBook-Package 2014-2015</subfield><subfield code="z">9783110665901</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780674368293</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4159/harvard.9780674735613</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780674735613</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780674735613/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-066590-1 Harvard University Press Complete eBook-Package 2014-2015</subfield><subfield code="c">2014</subfield><subfield code="d">2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_LAEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_LAEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGC</subfield><subfield code="b">2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2014</subfield></datafield></record></collection> |