Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
18
views
40
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,737
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
The Palgrave Handbook of International Cybercrime and Cyberdeviance
Hate Speech in Online Spaces
other
Author(s):
Matthew Costello
,
James Hawdon
Publication date
(Online):
June 18 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Online interactive cancer simulations and demos
Most cited references
40
Record
: found
Abstract
: not found
Article
: not found
Mechanisms of Political Radicalization: Pathways Toward Terrorism
Clark McCauley
,
Sophia Moskalenko
(2008)
0
comments
Cited
189
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Assessing Macro-Level Predictors and Theories of Crime: A Meta-Analysis
Travis Pratt
,
Francis T. Cullen
(2005)
0
comments
Cited
143
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Far Right Parties in Europe
Matt Golder
(2016)
0
comments
Cited
120
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
June 18 2019
Pages
: 1-20
DOI:
10.1007/978-3-319-90307-1_60-1
SO-VID:
26ac2541-f156-4412-8b5a-1f14755cb772
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
The Past, Present, and Future of Online Child Sexual Exploitation: Summarizing the Evolution of Production, Distribution, and Detection
pp. 1
Cyberstalking
pp. 1
General Strain Theory and Cybercrime
pp. 1
Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature
pp. 1
Surveillance, Surveillance Studies, and Cyber Criminality
pp. 1
Sexting and Social Concerns
pp. 1
The General Theory of Crime
pp. 1
Child Sexual Exploitation: Introduction to a Global Problem
pp. 1
Cybercrime and Legislation in an African Context
pp. 1
Biosocial theories
pp. 1
Social Media, Strain, and Technologically Facilitated Gang Violence
pp. 1
Revenge Pornography
pp. 1
Data Breaches and Carding
pp. 1
Technology as a Means of Rehabilitation: A Measurable Impact on Reducing Crime
pp. 1
Internet Addiction and Cybercrime
pp. 1
Applying the Techniques of Neutralization to the Study of Cybercrime
pp. 1
Cybercrime-as-a-Service Operations
pp. 1
Police and Extralegal Structures to Combat Cybercrime
pp. 1
Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime
pp. 1
Phishing and Financial Manipulation
pp. 1
Technology Use, Abuse, and Public Perceptions of Cybercrime
pp. 1
Negative Emotions Set in Motion: The Continued Relevance of #GamerGate
pp. 1
Risk and Protective Factors for Cyberbullying Perpetration and Victimization
pp. 1
Identity Theft: Nature, Extent, and Global Response
pp. 1
The Legislative Framework of the European Union (EU) Convention on Cybercrime
pp. 1
Race, Social Media, and Deviance
pp. 1
The Dark Web as a Platform for Crime: An Exploration of Illicit Drug, Firearm, CSAM, and Cybercrime Markets
pp. 1
Prostitution and Sex Work in an Online Context
pp. 1
Legislative Frameworks Against Cybercrime: The Budapest Convention and Asia
pp. 1
Routine Activities
pp. 1
Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective
pp. 1
Police Legitimacy in the Age of Social Media
pp. 1
Datasets for Analysis of Cybercrime
pp. 1
The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research
pp. 1
Intimate Partner Violence and the Internet: Perspectives
pp. 1
Hate Speech in Online Spaces
pp. 1
The Rise of Online Vigilantism
pp. 1
Cybercrime in India: Laws, Regulations, and Enforcement Mechanisms
pp. 1
Subcultural Theories of Crime
pp. 1
Critical Criminology and Cybercrime
pp. 1
The Psychology of Cybercrime
pp. 1
Social Engineering
pp. 1
Data Breaches and GDPR
pp. 1
Spam-Based Scams
pp. 1
Computer Hacking and the Hacker Subculture
pp. 1
Sexual Subcultures and Online Spaces
pp. 1
Cybercrime Legislation in the United States
pp. 1
Environmental Criminology and Cybercrime: Shifting Focus from the Wine to the Bottles
pp. 1
Organized Crime and Cybercrime
pp. 1
Digital Piracy
pp. 1
Global Voices in Hacking (Multinational Views)
pp. 1
Defining Cybercrime
pp. 1
Organized Financial Cybercrime: Criminal Cooperation, Logistic Bottlenecks, and Money Flows
pp. 1
Malicious Software Threats
pp. 1
Romance Fraud
pp. 1
Feminist Theories in Criminology and the Application to Cybercrimes
pp. 1
Counterfeit Products Online
pp. 1
Legislative Frameworks: The United Kingdom
pp. 1
Deviant Instruction: The Applicability of Social Learning Theory to Understanding Cybercrime
pp. 1
Dating and Sexual Relationships in the Age of the Internet
pp. 1
Image-Based Sexual Abuse: A Feminist Criminological Approach
pp. 1
Forensic Evidence and Cybercrime
pp. 1
Cyberwarfare as Realized Conflict
pp. 1
Hacktivism: Conceptualization, Techniques, and Historical View
Similar content
2,737
Considering Gender-Based Violence as a Form of Hate: A Socio-Legal Examination
Authors:
M. DAWSON
The “Who?” Question in the Hate Speech Debate: Part 1: Consistency, Practical, and Formal Approaches
Authors:
Alexander Brown
Microorganisms versus stony materials: a love–hate relationship
Authors:
N. De Belie
See all similar
Cited by
1
Automatic Identification of Hate Speech – A Case-Study of alt-Right YouTube Videos
Authors:
Johan Eddebo
,
Mika Hietanen
,
Mathias Johansson
See all cited by