This edited book explores the history, development and use of technology in the policing of society, showing that technology plays a key, if not pivotal role in the work of law enforcement.
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes.
This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud.
This book responds to the claim that criminology is becoming socially and politically irrelevant despite its exponential expansion as an academic sub-discipline.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
A riveting account of espionage for the digital age, from one of America's leading intelligence expertsSpying has never been more ubiquitous-or less understood.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks.
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity.
This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
Dieses Buch stellt ein Kompendium ausgewählter spiel- und entscheidungstheoretischer Modelle zur Erreichung und Bewertung der Sicherheit kritischer Infrastrukturen vor.