This book explains Europol's online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.
From the Cambridge Analytica scandal to overloaded internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system.
From the Cambridge Analytica scandal to overloaded internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
In tracking the evolution of the First Amendment's Free Exercise and Establishment Clause doctrine through Key Supreme Court decisions on religious freedom, legal scholar Randall P.
This volume discusses the phenomenon of internet infidelity by looking at the psychological, social, legal, and technological aspects involved in such behaviour.
This book provides a comprehensive interdisciplinary analysis of the sustainable and ethical integration of artificial intelligence (AI) within legal education, offering practical strategies for balancing innovation with ethical responsibility.
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities.
The book provides a contemporary 'snapshot' of critical debate centred around cybercrime and related issues, to advance theoretical development and inform social and educational policy.
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes.
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This book will serve as a practical guide for entrepreneurs and investors/advisors in constructing and understanding valuations of startups in rapidly shifting industries, including the areas of drug development, medical devices, cyber security, and renewable energy.
Through analysis of data held by the National Crime Agency on organised crime groups, and in-depth analysis of qualitative interviews with convicted fraudsters and enforcement professionals, this detailed study fills a significant gap in the contemporary literature on organised crime groups involved in fraud.
This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents.
With their distinctiveness and stability over time, fingerprints continue to be the most widely used anatomical characteristic in systems that automatically recognize a person's identity.
Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019.
Since the last edition of this book was published, numerous changes have occurred in the telecommunications sector, at a national, European, and international level.
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019.
The world of fiber optic connections reaching neighborhoods, homes, and businesses will represent as great a change from what came before as the advent of electricity.