Written by the Director of the Tokyo Trial Research Centre at China's Shanghai Jiao Tong University, this book provides a unique analysis of war crime trials in Asia-Pacific after World War II.
This book examines the media and cultural responses to the awful crimes of Brady and Hindley, whose murders provided a template for future media reporting on serial killers.
Data Journalism and the COVID 19 Disruption offers an international, multidisciplinary account of how and to what extent the COVID 19 pandemic has been a blessing for data journalism.
This book presents the first detailed inquiry into the nature of cross-border drug trafficking between Laos People's Democratic Republic and Vietnam, using an exploratory approach.
This edited volume explores the fundamental aspects of the dark web, ranging from the technologies that power it, the cryptocurrencies that drive its markets, the criminalities it facilitates to the methods that investigators can employ to master it as a strand of open source intelligence.
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories.
The crime drop is one of the most important puzzles in contemporary criminology: since the early-1990s many countries appear to exhibit a pronounced decline in crime rates.
This book utilizes critical discourse analysis to illuminate the ways in which one of the largest agribusinesses in operation, Tyson Foods, disguises their actions whilst simultaneously presenting the image of a benign, good corporate citizen.
This book explains the consequences of global policy initiatives against money laundering, terrorist financing, and tax evasion on financial centres located in offshore jurisdictions in the Caribbean region.
Through analysis of data held by the National Crime Agency on organised crime groups, and in-depth analysis of qualitative interviews with convicted fraudsters and enforcement professionals, this detailed study fills a significant gap in the contemporary literature on organised crime groups involved in fraud.
This volume addresses an important historiographical gap by assessing the respective contributions of tradition and foreign influences to the 19th century codification of criminal law.
Systematisch aufgebaut spannt der Autor dieses Lehrbuches den Bogen von der historischen Entwicklung über die Grundlagen des Strafvollzugs bis hin zum Vollzugssystem, dem Behandlungsprozess und den Sicherheitsaspekten.
The Handbook of Loss Prevention and Crime Prevention, 5e, is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International.
The Manager's Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs.
Crime Scene Investigation Laboratory Manual, Second Edition, is written by a former crime scene investigator and forensic scientist who provides practical, straightforward, and immediately applicable best practices.
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems.
Forensic Examination of Signatures explains the neuroscience and kinematics of signature production, giving specific details of research carried out on the topic.
In our attempts to understand crime, researchers typically focus on proximate factors such as the psychology of offenders, their developmental history, and the social structure in which they are embedded.
Forensic Handwriting Identification: Fundamental Concepts and Principles teaches the law enforcement and legal communities the major principles involved in handwriting and hand-printing analysis as applied to many types of investigations, including fraud, homicide, suicide, drug trafficking/clandestine labs, sexual offenses, threats and extortion, blackmail, arson, bombings, and theft.
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively.
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the sources, methods and evidence used to perform forensic data analysis of cell phones, call detail records, real time ping records and geo-location data obtained from cellular carriers and cell phones.
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.
Forensic Odontology: Principles and Practice details the aspects necessary to become an accomplished forensic odontologist, including an illustration of the skills necessary to become an expert witness.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
Whether you are a business owner, department manager, or even a concerned employee, Workplace Security Essentials will show you how to improve workplace safety and security using real-life examples and step-by-step instructions.
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management.
Police Psychology: New Trends in Forensic Psychological Science is a relatively new specialty that can be broadly defined as the application of psychological principles and methods to assist law enforcement.
Mass Identifications: Statistical Methods in Forensic Genetics summarizes the state-of-the-art in the field, including methods and recent development in genetics (sequencing).
Threat and Violence Interventions: The Effective Application of Influence evaluates threat and violence risk for various levels of mental health practitioners, law enforcement officers, security professionals, human resource professionals, attorneys, and academics in forensic psychology, sociology, criminology and law.
Sex, Crime, Drugs, and Just Plain Stupid Behaviors: The New Face of Young Adulthood in America is written for students, parents, and practitioners to provide insight into how emerging adulthood impacts the lives and behaviors of young people.
This book explores the European Public Prosecutor's Office (EPPO), the creation of which was approved in the Regulation adopted by the Justice and Home Affairs (JHA) Council on 12 October 2017.