This volume discusses the phenomenon of internet infidelity by looking at the psychological, social, legal, and technological aspects involved in such behaviour.
This book provides a comprehensive interdisciplinary analysis of the sustainable and ethical integration of artificial intelligence (AI) within legal education, offering practical strategies for balancing innovation with ethical responsibility.
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities.
The book provides a contemporary 'snapshot' of critical debate centred around cybercrime and related issues, to advance theoretical development and inform social and educational policy.
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes.
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This book will serve as a practical guide for entrepreneurs and investors/advisors in constructing and understanding valuations of startups in rapidly shifting industries, including the areas of drug development, medical devices, cyber security, and renewable energy.
Through analysis of data held by the National Crime Agency on organised crime groups, and in-depth analysis of qualitative interviews with convicted fraudsters and enforcement professionals, this detailed study fills a significant gap in the contemporary literature on organised crime groups involved in fraud.
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents.
With their distinctiveness and stability over time, fingerprints continue to be the most widely used anatomical characteristic in systems that automatically recognize a person's identity.
Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019.
Since the last edition of this book was published, numerous changes have occurred in the telecommunications sector, at a national, European, and international level.
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019.
The world of fiber optic connections reaching neighborhoods, homes, and businesses will represent as great a change from what came before as the advent of electricity.
What happens in the virtual world doesn't always stay in the virtual world Tens of millions of people today are living part of their life in a virtual world.
A provocative analysis of net neutrality and a call to democratize online communicationThis short book is both a primer that explains the history and politics of net neutrality and an argument for a more equitable framework for regulating access to the internet.
This edited book explores the history, development and use of technology in the policing of society, showing that technology plays a key, if not pivotal role in the work of law enforcement.
Modern Intellectual Property Law combines coverage of each intellectual property right granted for creations of the mind into a thoughtful, unified textbook.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings.
Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection.
This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected.