Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
Machine Learning for Criminology and Crime Research: At the Crossroads reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationship.
Volunteer Police, Choosing to Serve provides an in-depth comparison between volunteer policing in the United States and in the United Kingdom, and explores the shared past and similar-yet sometimes divergent-evolution of special constables, auxiliaries, and reserves.
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily-and hinges upon-the correct evaluation of the threat.
Crime, Law and Justice in New Zealand examines the recent crime trends and the social, political, and legal changes in New Zealand from the end of the twentieth century to the present.
Built around the experiences of older prisoners, Punished for Aging looks at the challenges individuals face in Canadian penitentiaries and their struggles for justice.
Renowned criminologist Mike Hough illuminates the principles and practices of good policing in this important analysis of the police service's legitimacy and the factors, such as public trust, that drive it.
People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it.
Rape culture, a colloquial term often used to describe society's normalization and cultural acceptance of sexual violence, especially of men towards women, can be defined in a variety of ways.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition is a highly detailed and exhaustive history and analysis of terror groups that both formed the Iraq insurgency and led to the rise of the Islamic State of Iraq and Syria (ISIS).
Challenging Organized Crime in the Western Hemisphere: A Game of Moves and Countermoves takes the unusual approach of exploring and describing how organized crime groups develop their capacities in response to heightened powers of law enforcement; and how law enforcement in turn responds, creating an ongoing dynamic interaction.
Policing Suspicion is an innovative examination of policing practices and the impact of these on patterns of arrest and prosecution in London, 1780-1850.
Using the best scientific decision-making practices, this book introduces the concept of risk management and its application in the structure of national security decisions.
As the youth gang phenomenon becomes an important and sensitive public issue, communities from Los Angeles to Rio, Cape Town to London are facing the reality of what such violent groups mean for their children and young people.
Police Administration, 11th Edition, is a best-selling textbook that examines police administration from multiple perspectives: a systems perspective (emphasizing the interrelatedness among units and organizations); a traditional, structural perspective (administrative principles, management functions, and the importance of written guidelines); a human behavioral perspective (the human element in organizations); and a strategic management perspective (communications and information systems, performance evaluation, strategies and tactics, and prevailing and promising approaches to increasing effectiveness of police agencies).
We now live in a pre-crime society, in which information technology strategies and techniques such as predictive policing, actuarial justice and surveillance penology are used to achieve hyper-securitization.
Using the best scientific decision-making practices, this book introduces the concept of risk management and its application in the structure of national security decisions.
Inhaftierung ist nicht nur ein gravierender Einschnitt in das Leben der verurteilten Person, sondern auch der Angehörigen: PartnerIn, Kinder, Eltern, Großeltern, Geschwister, enge Freunde.
This how-to guide covers every aspect of law enforcement training, from training academy administration, to designing curricula, to identifying and utilizing qualified instructors.
Community Justice discusses concepts of community within the context of justice policy and programs and addresses the important relationship between the criminal justice system and the community in the USA.
Handbook of Terrorist and Insurgent Groups: A Global Survey of Threats, Tactics, and Characteristics examines the most current and significant terrorist and insurgent groups around the world.
As the youth gang phenomenon becomes an important and sensitive public issue, communities from Los Angeles to Rio, Cape Town to London are facing the reality of what such violent groups mean for their children and young people.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics.
There have been significant changes in public attitudes towards surveillance in the last few years as a consequence of the Snowden disclosures and the Cambridge Analytica scandal.
This edited collection illuminates the weaknesses and strengths of crime reporting across a wide range of countries, with a focus on democratic countries in which the police bear some accountability to citizens.
This edited text draws together the insights of numerous worldwide eminent academics to evaluate the condition of predictive policing and artificial intelligence (AI) as interlocked policy areas.
Bio-Privacy: Privacy Regulations and the Challenge of Biometrics provides an in-depth consideration of the legal issues posed by the use of biometric technology.