- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals.
Andere Kunden interessierten sich auch für
- Thomas HoltCybercrime in Progress48,99 €
- Louise I. ShelleyDark Commerce28,99 €
- Unleashing the Art of Digital Forensics109,99 €
- G. K. Awari (Government Polytechnic Nagpur)Ethics in Information Technology103,99 €
- Kyong Eun OhSmartphones, Current Events and Mobile Information Behavior76,99 €
- Lauren R. Shapiro (John Jay College, New York, USA)Cyberpredators and Their Prey75,99 €
- Bruce Schneier (Harvard Kennedy School)Click Here to Kill Everybody28,99 €
-
-
-
This book provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- 3 ed
- Seitenzahl: 790
- Erscheinungstermin: 31. Mai 2022
- Englisch
- Abmessung: 242mm x 173mm x 38mm
- Gewicht: 1358g
- ISBN-13: 9780367360078
- ISBN-10: 0367360071
- Artikelnr.: 62846933
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd
- 3 ed
- Seitenzahl: 790
- Erscheinungstermin: 31. Mai 2022
- Englisch
- Abmessung: 242mm x 173mm x 38mm
- Gewicht: 1358g
- ISBN-13: 9780367360078
- ISBN-10: 0367360071
- Artikelnr.: 62846933
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Thomas J. Holt is Professor in the School of Criminal Justice at Michigan State University. His research focuses on all forms of cybercrime and the police response to these offenses. Dr. Holt's work has appeared in outlets such as British Journal of Criminology, Crime & Delinquency, and Terrorism & Political Violence. His research has been funded by the Australian Research Council, the Department of Homeland Security, the National Institute of Justice, and the National Science Foundation. Adam M. Bossler is Professor and Chair of the Department of Criminal Justice and Criminology at Georgia Southern University. His research interests focus on the applicability of criminological theories to cybercrime offending and victimization and the law enforcement response to cybercrime. His research has been funded by the Department of Justice, National Science Foundation, and United Kingdom Home Office. He has co-authored three books, co-edited the Palgrave Handbook of International Cybercrime and Cyberdeviance, and written for various peer-reviewed journals, including Criminology & Public Policy, Policing, International Journal of Offender Therapy and Comparative Criminology, Journal of Criminal Justice, and Deviant Behavior. In addition to being a co-founder of ancient astronaut criminology, he is also a member of the American Society of Criminology Division of Cybercrime, the International Interdisciplinary Research Consortium on Cybercrime (IIRCC), and the European Society of Criminology's Working Group on Cybercrime. Kathryn C. Seigfried-Spellar is Associate Professor in the Cyberforensics program in the Department of Computer and Information Technology (CIT) at Purdue University. She is a member of the Tippecanoe High Tech Crime Unit and has Special Deputy status for the Tippecanoe County Prosecutor's Office. Dr. Seigfried-Spellar's primary research area of interest is the personality characteristics and socio-legal factors associated with cyberdeviance, specifically internet crimes against children. Dr. Seigfried-Spellar has published in the area of digital forensics, specifically the ability to conduct a behavioral analysis of digital forensic evidence from child pornography investigations. She is a Fellow of the Digital and Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), member of the American Psychological Association (APA), and member of the International Association of Law Enforcement Intelligence Analysts (IALEIA).
1. Technology and Cybercrime
2: Law Enforcement, Privacy, and Security in Dealing with Cybercrime
3. Computer Hackers and Hacking
4. Malware and Automated Computer Attacks
5. Digital Piracy and Intellectual Property Theft
6. Online Fraud
7. Pornography, Image-Based Sexual Abuse, and Prostitution
8. Child Sexual Exploitation Material Offenses
9. Cyberbullying, Online Harassment, and Cyberstalking
10. Online Extremism and Cyberterror
11. Cyberwarfare and Information Operations Online
12. Illicit Market Operations Online
13. Cybercrime and Criminological Theories
14. Evolution of Digital Forensics
15. Acquisition and Examination of Forensic Evidence
16. Legal Challenges in Digital Forensic Investigations
17. The Future of Cybercrime, Terror, and Policy
2: Law Enforcement, Privacy, and Security in Dealing with Cybercrime
3. Computer Hackers and Hacking
4. Malware and Automated Computer Attacks
5. Digital Piracy and Intellectual Property Theft
6. Online Fraud
7. Pornography, Image-Based Sexual Abuse, and Prostitution
8. Child Sexual Exploitation Material Offenses
9. Cyberbullying, Online Harassment, and Cyberstalking
10. Online Extremism and Cyberterror
11. Cyberwarfare and Information Operations Online
12. Illicit Market Operations Online
13. Cybercrime and Criminological Theories
14. Evolution of Digital Forensics
15. Acquisition and Examination of Forensic Evidence
16. Legal Challenges in Digital Forensic Investigations
17. The Future of Cybercrime, Terror, and Policy
1. Technology and Cybercrime
2: Law Enforcement, Privacy, and Security in Dealing with Cybercrime
3. Computer Hackers and Hacking
4. Malware and Automated Computer Attacks
5. Digital Piracy and Intellectual Property Theft
6. Online Fraud
7. Pornography, Image-Based Sexual Abuse, and Prostitution
8. Child Sexual Exploitation Material Offenses
9. Cyberbullying, Online Harassment, and Cyberstalking
10. Online Extremism and Cyberterror
11. Cyberwarfare and Information Operations Online
12. Illicit Market Operations Online
13. Cybercrime and Criminological Theories
14. Evolution of Digital Forensics
15. Acquisition and Examination of Forensic Evidence
16. Legal Challenges in Digital Forensic Investigations
17. The Future of Cybercrime, Terror, and Policy
2: Law Enforcement, Privacy, and Security in Dealing with Cybercrime
3. Computer Hackers and Hacking
4. Malware and Automated Computer Attacks
5. Digital Piracy and Intellectual Property Theft
6. Online Fraud
7. Pornography, Image-Based Sexual Abuse, and Prostitution
8. Child Sexual Exploitation Material Offenses
9. Cyberbullying, Online Harassment, and Cyberstalking
10. Online Extremism and Cyberterror
11. Cyberwarfare and Information Operations Online
12. Illicit Market Operations Online
13. Cybercrime and Criminological Theories
14. Evolution of Digital Forensics
15. Acquisition and Examination of Forensic Evidence
16. Legal Challenges in Digital Forensic Investigations
17. The Future of Cybercrime, Terror, and Policy