Cyber Strategy: Risk-Driven Security and Resiliency provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies.
This collection critically explores the use of financial technology (FinTech) and artificial intelligence (AI) in the financial sector and discusses effective regulation and the prevention of crime.
The growth of technology allows us to imagine entirely new ways of committing, combating and thinking about criminality, criminals, police, courts, victims and citizens.
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
Amidst the sensationalist claims about the dangers of the Internet, Virtually Criminal provides an empirically grounded criminological analysis of deviance and regulation within an online community.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming.
Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology.
Aslam and Gunaratna bring together a broad analysis of the responses of states in Asia to the threats presented by the COVID-19 pandemic in its early phase.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
This unique volume presents cutting-edge research on the nature and extent of a wide range of scams, cons, frauds, and deceptive activities, including sextortion, the use of ransomware, phishing, identity theft, Ponzi schemes, online shopping fraud, gift card scams, and health care fraud targeting elderly victims.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018.
Theories of Terrorism explains and advances the major theories of terrorism that address issues of becoming a terrorist, being a terrorist, and leaving terrorism, in a clear and accessible format.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed.
The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local.
The aim of this book is to demonstrate the use of business-driven risk assessments within the privacy impact assessment process to meet the requirements of privacy laws.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.
This new Handbook provides a comprehensive, state-of-the-art overview of current knowledge and debates on terrorism and counterterrorism, as well as providing a benchmark for future research.
Fraudulent, harmful, or at best useless pharmaceutical and therapeutic approachesdeveloped outside science-based medicine have boomed in recent years, especially due tothe commercialisation of cyberspace.