This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime.
This book, the second of two volumes edited by Kemshall and McCartan, focuses on responses to sexual offending, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book, the first of two volumes edited by McCartan and Kemshall, focusses on perceptions of sexual offenders, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book is designed to provide specialists, spectators, and students with a brief and engaging exploration of media usage by radical groups and the laws regulating these grey areas of Jihadi propaganda activities.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK.
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "e;ATM Hacking.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes.
This edited book takes an interdisciplinary approach to shed light on the complex dynamics involved in the incidence of online hate speech against migrants in user-generated contexts.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security.
This edited book takes an interdisciplinary approach to shed light on the complex dynamics involved in the incidence of online hate speech against migrants in user-generated contexts.
This handbook provides a comprehensive treatise of the concepts and nature of technology-facilitated gendered violence and abuse, as well as legal, community and activist responses to these harms.
This handbook provides a comprehensive treatise of the concepts and nature of technology-facilitated gendered violence and abuse, as well as legal, community and activist responses to these harms.
With their distinctiveness and stability over time, fingerprints continue to be the most widely used anatomical characteristic in systems that automatically recognize a person's identity.
This edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "e;ATM Hacking.
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes.