What happens in the virtual world doesn't always stay in the virtual world Tens of millions of people today are living part of their life in a virtual world.
A provocative analysis of net neutrality and a call to democratize online communicationThis short book is both a primer that explains the history and politics of net neutrality and an argument for a more equitable framework for regulating access to the internet.
This edited book explores the history, development and use of technology in the policing of society, showing that technology plays a key, if not pivotal role in the work of law enforcement.
Modern Intellectual Property Law combines coverage of each intellectual property right granted for creations of the mind into a thoughtful, unified textbook.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings.
Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection.
This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK.
This book, the first of two volumes edited by McCartan and Kemshall, focusses on perceptions of sexual offenders, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime.
Exploring the negative social impact of cyber-attacks, this book takes a closer look at the challenges faced by both the public and private sectors of the financial industry.
This book evaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, and removing content linked to illegal traded medicines.
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention.
This book, the second of two volumes edited by Kemshall and McCartan, focuses on responses to sexual offending, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book is designed to provide specialists, spectators, and students with a brief and engaging exploration of media usage by radical groups and the laws regulating these grey areas of Jihadi propaganda activities.
This edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Kaum eine andere Kriminalitätsart hat in den vergangenen Jahren einen derartig hohen Anstieg an Delikten und dementsprechende mediale Aufmerksamkeit erfahren wie die Cyber-Kriminalität, auch bekannt unter dem Begriff "Cybercrime".
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam.