The New Technology of Financial Crime
New Crime Commission Technology, New Victims, New Offenders, and New Strategies for Prevention and Control
Herausgeber: Rebovich, Donald; Byrne, James M
The New Technology of Financial Crime
New Crime Commission Technology, New Victims, New Offenders, and New Strategies for Prevention and Control
Herausgeber: Rebovich, Donald; Byrne, James M
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed. This book covers a wide range of topics related to financial crime commission, victimization, prevention, and control.
Andere Kunden interessierten sich auch für
- The Routledge Handbook of Technology, Crime and Justice64,99 €
- Tine MunkThe Rise of Politically Motivated Cyber Attacks123,99 €
- Abbas Moallem (Adjunct Faculty, San Jose State University, CA)Understanding Cybersecurity Technologies124,99 €
- Artificial Intelligence and the Law194,99 €
- Alessandro MorettiThe Rise and Rise of Illegal Ticket Touting176,99 €
- Kenneth OkereaforCybersecurity in the COVID-19 Pandemic25,99 €
- Andrew KeenTomorrows Versus Yesterdays: Conversations in Defense of the Future22,99 €
-
-
-
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed. This book covers a wide range of topics related to financial crime commission, victimization, prevention, and control.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 242
- Erscheinungstermin: 8. August 2022
- Englisch
- Abmessung: 244mm x 170mm x 16mm
- Gewicht: 570g
- ISBN-13: 9781032192024
- ISBN-10: 103219202X
- Artikelnr.: 64035043
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 242
- Erscheinungstermin: 8. August 2022
- Englisch
- Abmessung: 244mm x 170mm x 16mm
- Gewicht: 570g
- ISBN-13: 9781032192024
- ISBN-10: 103219202X
- Artikelnr.: 64035043
Donald Rebovich, Ph.D., Distinguished Professor of Criminal Justice at Utica College, is the Executive Director of the Center for Identity Management & Information Protection (CIMIP). Prior to coming to Utica College, Dr Rebovich served as Research Director for the National White-Collar Crime Center (NW3C) & the American Prosecutors Research Institute of the National District Attorneys Association (NDAA). James M. Byrne, Ph.D., is a professor in the School of Criminology and Justice Studies at the University of Massachusetts Lowell. He is the Director of the Global Community Corrections Initiative (www.globcci.org) and Editor-in-Chief of the journal, Victims & Offenders. Dr Byrne is the co-editor, The Global Impact of the COVID-19 Pandemic on Institutional and Community Corrections (Routledge, 2021), and is currently completing a new book, The Technology Revolution in Criminal Justice: A Global Review (Routledge, forthcoming).
Introduction 1. The Dynamics of Business, Cybersecurity and
Cyber-Victimization: Foregrounding the Internal Guardian in Prevention 2.
Phishing Evolves: Analyzing the Enduring Cybercrime 3. Online Fraud
Victimization in China: A Case Study of Baidu Tieba 4. Interrelationship
between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity
Assessment via Cyber-Routine Activities Theoretical Framework 5. The Use of
Military Profiles in Romance Fraud Schemes 6. The Distillation of National
Crime Data into A Plan for Elderly Fraud Prevention: A Quantitative and
Qualitative Analysis of U.S. Postal Inspection Service Cases of Fraud
against the Elderly 7. Organized Crime as Financial Crime: The Nature of
Organized Crime as Reflected in Prosecutions and Research 8. Preventing
Identity Theft: Perspectives on Technological Solutions from Industry
Insiders 9. Forecasting Identity Theft Victims: Analyzing Characteristics
and Preventive Actions through Machine Learning Approaches 10. The
Identification of a Model Victim for Social Engineering: A Qualitative
Analysis
Cyber-Victimization: Foregrounding the Internal Guardian in Prevention 2.
Phishing Evolves: Analyzing the Enduring Cybercrime 3. Online Fraud
Victimization in China: A Case Study of Baidu Tieba 4. Interrelationship
between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity
Assessment via Cyber-Routine Activities Theoretical Framework 5. The Use of
Military Profiles in Romance Fraud Schemes 6. The Distillation of National
Crime Data into A Plan for Elderly Fraud Prevention: A Quantitative and
Qualitative Analysis of U.S. Postal Inspection Service Cases of Fraud
against the Elderly 7. Organized Crime as Financial Crime: The Nature of
Organized Crime as Reflected in Prosecutions and Research 8. Preventing
Identity Theft: Perspectives on Technological Solutions from Industry
Insiders 9. Forecasting Identity Theft Victims: Analyzing Characteristics
and Preventive Actions through Machine Learning Approaches 10. The
Identification of a Model Victim for Social Engineering: A Qualitative
Analysis
Introduction 1. The Dynamics of Business, Cybersecurity and
Cyber-Victimization: Foregrounding the Internal Guardian in Prevention 2.
Phishing Evolves: Analyzing the Enduring Cybercrime 3. Online Fraud
Victimization in China: A Case Study of Baidu Tieba 4. Interrelationship
between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity
Assessment via Cyber-Routine Activities Theoretical Framework 5. The Use of
Military Profiles in Romance Fraud Schemes 6. The Distillation of National
Crime Data into A Plan for Elderly Fraud Prevention: A Quantitative and
Qualitative Analysis of U.S. Postal Inspection Service Cases of Fraud
against the Elderly 7. Organized Crime as Financial Crime: The Nature of
Organized Crime as Reflected in Prosecutions and Research 8. Preventing
Identity Theft: Perspectives on Technological Solutions from Industry
Insiders 9. Forecasting Identity Theft Victims: Analyzing Characteristics
and Preventive Actions through Machine Learning Approaches 10. The
Identification of a Model Victim for Social Engineering: A Qualitative
Analysis
Cyber-Victimization: Foregrounding the Internal Guardian in Prevention 2.
Phishing Evolves: Analyzing the Enduring Cybercrime 3. Online Fraud
Victimization in China: A Case Study of Baidu Tieba 4. Interrelationship
between Bitcoin, Ransomware, and Terrorist Activities: Criminal Opportunity
Assessment via Cyber-Routine Activities Theoretical Framework 5. The Use of
Military Profiles in Romance Fraud Schemes 6. The Distillation of National
Crime Data into A Plan for Elderly Fraud Prevention: A Quantitative and
Qualitative Analysis of U.S. Postal Inspection Service Cases of Fraud
against the Elderly 7. Organized Crime as Financial Crime: The Nature of
Organized Crime as Reflected in Prosecutions and Research 8. Preventing
Identity Theft: Perspectives on Technological Solutions from Industry
Insiders 9. Forecasting Identity Theft Victims: Analyzing Characteristics
and Preventive Actions through Machine Learning Approaches 10. The
Identification of a Model Victim for Social Engineering: A Qualitative
Analysis