This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime.
Exploring the negative social impact of cyber-attacks, this book takes a closer look at the challenges faced by both the public and private sectors of the financial industry.
This book evaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, and removing content linked to illegal traded medicines.
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention.
This book, the second of two volumes edited by Kemshall and McCartan, focuses on responses to sexual offending, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book is designed to provide specialists, spectators, and students with a brief and engaging exploration of media usage by radical groups and the laws regulating these grey areas of Jihadi propaganda activities.
This edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Kaum eine andere Kriminalitätsart hat in den vergangenen Jahren einen derartig hohen Anstieg an Delikten und dementsprechende mediale Aufmerksamkeit erfahren wie die Cyber-Kriminalität, auch bekannt unter dem Begriff "Cybercrime".
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam.
Resilient Thinking - Protecting Organisations in the 21st Century, Second editionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience.
Resilient Thinking - Protecting Organisations in the 21st Century, Second editionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience.
Truly international in scope, this Handbook focuses on approaches to discipline, surveillance and social control from around the world, critically examining the strategies and practices schools employ to monitor students and control their behavior.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book presents a timely analysis of the psychological influences, underpinnings, and predictors of non-consensual image-based sexual offending (NCIBSO), such as revenge pornography, cyber-flashing, deepfake media production and upskirting.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
Esta publicación pretende reforzar la necesidad de definir estrategias para preservar los sistemas propios de los países (especialmente los datos), dada la dificultad de prevenir ataques cibernéticos e identificar sus fuentes.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam.
This volume discusses the phenomenon of internet infidelity by looking at the psychological, social, legal, and technological aspects involved in such behaviour.