Offering a critical overview of the state of contemporary investigative journalism, this book considers ways in which investigative journalism can bring about meaningful change and what conditions need to be in place for it to do so.
This short Pivot argues for a paradigm shift towards a human-centric approach, emphasising the importance of understanding and managing human behaviour as a fundamental aspect of effective security strategies.
This second edition expands upon a program that teaches expressive visual arts activities to college students to share with individuals in jails, nursing homes, psychiatric facilities, domestic abuse shelters and youth care centers.
This book takes a unique approach to explaining permutation statistical methods for advanced undergraduate students, graduate students, faculty, researchers, and other professionals interested in the areas of criminology or criminal justice.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
This short Pivot argues for a paradigm shift towards a human-centric approach, emphasising the importance of understanding and managing human behaviour as a fundamental aspect of effective security strategies.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
This book privileges Indigenous ways of knowing, being and doing in research and serves as a voice in taking on some of the more marginal topics within methodologies.
This book provides an overview of the current state of minority-language media, from policy formulation to practice, in various contexts around the world.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025.
Uncommon Wealths in Postcolonial Fiction engages urgently with wealth, testing current assumptions of inequality in order to push beyond reductive contemporary readings of the gaping abyss between rich and poor.
This book presents a wide array of innovative and cutting-edge practice models, research-based conceptualisations and theorisations as well as policy contributions which will serve as resource material for social work professionals across the globe.
This volume critically examines how the integration of evidence-based research within police governance reshapes accountability, decision-making, and policy development.
The second edition of this bestselling book provides an in-depth explanation of not only why we fall for scams and how fraudsters use technology and other techniques to manipulate others but also why fraud prevention advice is not always effective.
This book classifies and assesses the real and perceived risks associated with both the Covid-19 pandemic and government responses to it in seven African countries — DR Congo, Kenya, Ethiopia, South Africa, Tanzania, Uganda, and Zimbabwe — based on large scale quantitative and qualitative surveys conducted in 2022–2024.
This volume critically examines how the integration of evidence-based research within police governance reshapes accountability, decision-making, and policy development.
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals.