Die Werke der Reihe "Recht und Neue Medien" zeichnen sich durch kompetente Autoren aus Wissenschaft und Praxis, große Aktualität und eine leicht verständliche Darstellung aus.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford's law for biometrics and network traffic analysis.
Digital and social media companies such as Apple, Google, and Facebook grip the globe with market, civic, and political strength akin to large, sovereign states.
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention.
Truly international in scope, this Handbook focuses on approaches to discipline, surveillance and social control from around the world, critically examining the strategies and practices schools employ to monitor students and control their behavior.
Through analysis of data held by the National Crime Agency on organised crime groups, and in-depth analysis of qualitative interviews with convicted fraudsters and enforcement professionals, this detailed study fills a significant gap in the contemporary literature on organised crime groups involved in fraud.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts.
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime.
This book, the second of two volumes edited by Kemshall and McCartan, focuses on responses to sexual offending, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book, the first of two volumes edited by McCartan and Kemshall, focusses on perceptions of sexual offenders, and how risk is used by policy makers, stakeholders, academics and practitioners to both construct and respond to unknown and known sex offenders within the contexts of criminal justice, health and social policy.
This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book is designed to provide specialists, spectators, and students with a brief and engaging exploration of media usage by radical groups and the laws regulating these grey areas of Jihadi propaganda activities.
This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and industrial production.
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK.
One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand.
This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book offers the first comprehensive analysis of the national and international legal issues surrounding digital assets in enforcement and insolvency.
This book begins with a broader discussion of cybercrime and attacks targeting ATMs and then focuses on a specific type of cybercrime named "e;ATM Hacking.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.