This book addresses the use of criminal history screening in employment decisions, assessing strategies for making fair and valid employment decisions.
This book investigates the unintended and deadly consequences of criminal justice reforms through observing the effects of prison depopulation sentencing reform on county jails.
This book addresses the use of criminal history screening in employment decisions, assessing strategies for making fair and valid employment decisions.
Career Paths in Forensic Psychology offers a comprehensive introduction and guide to the varied career paths for aspiring forensic psychologists, showing what a rewarding career at the intersection of law and psychology can look like in practice.
Offering a critical overview of the state of contemporary investigative journalism, this book considers ways in which investigative journalism can bring about meaningful change and what conditions need to be in place for it to do so.
This short Pivot argues for a paradigm shift towards a human-centric approach, emphasising the importance of understanding and managing human behaviour as a fundamental aspect of effective security strategies.
This book takes a unique approach to explaining permutation statistical methods for advanced undergraduate students, graduate students, faculty, researchers, and other professionals interested in the areas of criminology or criminal justice.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This short Pivot argues for a paradigm shift towards a human-centric approach, emphasising the importance of understanding and managing human behaviour as a fundamental aspect of effective security strategies.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
This volume critically examines how the integration of evidence-based research within police governance reshapes accountability, decision-making, and policy development.
The second edition of this bestselling book provides an in-depth explanation of not only why we fall for scams and how fraudsters use technology and other techniques to manipulate others but also why fraud prevention advice is not always effective.
This volume critically examines how the integration of evidence-based research within police governance reshapes accountability, decision-making, and policy development.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.
This book delves into the complex world of human trafficking in Indonesia, focusing on individuals involved in trafficking for domestic labor and the sex industry.
This book delves into the complex world of human trafficking in Indonesia, focusing on individuals involved in trafficking for domestic labor and the sex industry.