Kaum eine andere Kriminalitätsart hat in den vergangenen Jahren einen derartig hohen Anstieg an Delikten und dementsprechende mediale Aufmerksamkeit erfahren wie die Cyber-Kriminalität, auch bekannt unter dem Begriff "Cybercrime".
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam.
This book explores the governance of smart cities from a holistic approach, arguing that the creation of smart cities must consider the specific circumstances of each country to improve the preservation, revitalisation, liveability, and sustainability of urban areas.
Resilient Thinking - Protecting Organisations in the 21st Century, Second editionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience.
Resilient Thinking - Protecting Organisations in the 21st Century, Second editionSince the release of the first edition in 2012, a lot has changed in the world of risk and organisational resilience.
Covering 17 Asian jurisdictions representing differing stages in the development of data protection regulatory systems this book offers an in-depth, cross-jurisdictional commentary on the developing world of Asian privacy and personal data protection, with a special focus on private international law issues.
Library, information and knowledge professionals are often at the front line of managing and monitoring their organisation's legal compliance and have roles and responsibilities in both complying with the law and taking advantage of its provisions.
Current advancements in civil rights and environmental activism emphasize the crucial importance of making environmental information widely available to the public, regardless of whether it is in the hands of the government or of corporations, especially when the information is needed to understand and prevent risks for human health and the environment.
Truly international in scope, this Handbook focuses on approaches to discipline, surveillance and social control from around the world, critically examining the strategies and practices schools employ to monitor students and control their behavior.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book presents a timely analysis of the psychological influences, underpinnings, and predictors of non-consensual image-based sexual offending (NCIBSO), such as revenge pornography, cyber-flashing, deepfake media production and upskirting.
IT-Sicherheitsrecht und unbestimmte Rechtsnormen: Diese Arbeit untersucht die NIS-Richtlinien, das BSIG und ihre unbestimmten Rechtsnormen, die Unternehmen vor erhebliche Herausforderungen stellen.
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets.
This book presents a timely and innovative exploration of one of the first human rights articles about data production and processing: the Convention on the Rights of Persons with Disabilities article 31, 'Statistics and data collection'.
Communication in Legal Advocacy integrates work in legal theory, communication theory, social science research, and strategic planning to provide a comprehensive anaysis of the communication processes in trials.
Resisting State Surveillance in the Digital Age provides an in-depth examination of the complexity and diversity of organised opposition to increasing state surveillance powers in the UK.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security.
This book explores the manifold actual, possible and probable interconnections between gambling and crime in the context of the increased availability of wagering activities across many regions of the world.
This comprehensive textbook identifies the emerging legal, policy, and ethical considerations associated with the collection, analysis, storage, and distribution of data that can be tied to location on Earth - otherwise known as "e;geospatial information.