The book provides a contemporary 'snapshot' of critical debate centred around cybercrime and related issues, to advance theoretical development and inform social and educational policy.
Exploring the negative social impact of cyber-attacks, this book takes a closer look at the challenges faced by both the public and private sectors of the financial industry.
This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection.
This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.
This book will serve as a practical guide for entrepreneurs and investors/advisors in constructing and understanding valuations of startups in rapidly shifting industries, including the areas of drug development, medical devices, cyber security, and renewable energy.
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities.
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape.
This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
This book identifies and examines the novel ways in which money is laundered internationally through illegal activities on the internet, focusing on sales, payments, social media, online gaming, and tax misapplication.
This book reviews the use of digital surveillance for detecting, investigating and interpreting fraud associated with critical cyberinfrastructures in Nigeria, as it is well known that the country's cyberspace and cyberinfrastructures are very porous, leaving too much room for cyber-attackers to freely operate.
This book is a means to diagnose, anticipate and address new cyber risks and vulnerabilities while building a secure digital environment inside and around businesses.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR.
Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices.
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians and government targets, but according to many experts, increasingly to multinational corporations and other international economic enterprises.
In a world of globalization and technological change, terrorism continues to pose grave threats not only to more traditional targets such as civilians and government targets, but according to many experts, increasingly to multinational corporations and other international economic enterprises.
Applying the Data Protection Act to the CloudThe UK s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction.
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same but the outcomes can be equally devastating.
This book offers the first comprehensive analysis of the national and international legal issues surrounding digital assets in enforcement and insolvency.
The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring presents new findings and perspectives from leading international scholars on several emerging areas issues in legal and economic research.
The Law and Economics of Privacy, Personal Data, Artificial Intelligence, and Incomplete Monitoring presents new findings and perspectives from leading international scholars on several emerging areas issues in legal and economic research.