This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping fraud, gift card scams, and health care fraud targeting elderly victims.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
This book documents the evolution of the United Nations (UN) Crime Programme and its changing priorities, from the early focus on juvenile delinquency and correctional treatment, to the present preoccupation with transnational organized crime.
This second edition of Critical Infrastructure Protection, Risk Management, and Resilience continues to be an essential resource for understanding and protecting critical infrastructure across the U.
It is imperative that educators, parents, and potential victims be aware of sexual predators, the danger they pose in our society, and the resources available to help prevent this growing epidemic.
Cybercrime has become increasingly prevalent in the new millennium as computer-savvy criminals have developed more sophisticated ways to victimize people online and through other digital means.
Discussing social media-related scholarship found in criminology, legal studies, policing, courts, corrections, victimization, and crime prevention, this book presents the current state of our knowledge on the impact of social media and the major sociological frameworks employed to study the U.
Umsetzbare Sicherheitsstrategien – auch für Unternehmen und Organisationen mit kleinen Budgets- Das komplexe Thema »Informationssicherheit« zugänglich und praxisnah aufbereitet.
This book addresses social and complex network analysis challenges, exploring social network structures, dynamic networks, and hierarchical communities.
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking, identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and "e;canceling"e; people for perceived violations of norms.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
In einer Welt, in der KI-Technologien rasch fortschreiten und Datenschutzfragen immer wichtiger werden, bietet dieses Buch wertvolle Einblicke und praktische Lösungen.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
This textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.