This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
This book constitutes the refereed proceedings of the 22nd International Conference on Ethical and Social Impacts of Information and Communication Technology, ETHICOMP 2025, held in Lisbon, Portugal, during September 17–19, 2025.
This book takes you deep into the heart of the challenges and opportunities presented by the rapid evolution of Artificial Intelligence (AI) technologies.
This book takes you deep into the heart of the challenges and opportunities presented by the rapid evolution of Artificial Intelligence (AI) technologies.
The Revenge Porn Helpline was founded in 2015 following the criminalisation of the sharing of intimate images without consent and has received over 75,000 cases.
The Revenge Porn Helpline was founded in 2015 following the criminalisation of the sharing of intimate images without consent and has received over 75,000 cases.
Die Autorin gibt eine umfassende Einführung in die Viktimologie auf Basis umfangreicher Auswertung einschlägiger Fachliteratur und Berücksichtigung verschiedener angrenzender Disziplinen.
Die Autorin gibt eine umfassende Einführung in die Viktimologie auf Basis umfangreicher Auswertung einschlägiger Fachliteratur und Berücksichtigung verschiedener angrenzender Disziplinen.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book presents the 16th ICGS3-24 conference which aims to understand the full impact of cyber-security, AI, deepfake, and quantum computing on humanity.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book evidences the cyclical failures of online safety policy and challenge conventional policy and educational approaches to tackling online harms, and provide a robust argument for a critical, evidence-based approaches which align with the needs of those we claim to wish to protect.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains while networking with the leading representatives, researchers and solution providers.
This book investigates the recent history of the drug market on the dark web and suggests interventions that can be used to curb the trade of illegal products in the internet's underbelly.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity.
This book examines the international forums in which states develop cyber norms-"e;rules of the road"e; for how governments use information and communication technologies.