Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and…mehr
This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within thecontext of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.
To this end, the book:
presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;
provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;
and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.
The research contained in the book fits well into thelarger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Dr. Reza Montasari is Senior Lecturer in Cyber Threats at the Department of Criminology, Sociology and Social Policy at the School of Social Sciences in Swansea University. Reza obtained his B.Sc. (Hons) in Multimedia Computing and M.Sc. in Computer Forensics both from the University of South Wales and his Ph.D. in Digital Forensics from the University of Derby. He is a Fellow of Higher Education Academy (FHEA), a Chartered Engineer (CEng.), and a Member of the Institution of Engineering and Technology (IET). Dr. Montasari is also a Member of Strategic Independent Advisory Group at South Wales Police. Reza’s main research interests lie in the areas of Digital Forensics, Artificial Intelligence, Cyber Security, National and International Security, and Cyberwarfare. He has authored numerous books, journal articles, conference papers, book chapters, media articles in his fields of expertise. Reza serves as Editorial Board Member, Program Steering Committee Member, and Reviewer for several leading international journals and conferences in the fields of Digital Forensics and Cyber Security.
Dr. Reza Montasari is Senior Lecturer in Cyber Threats at the Department of Criminology, Sociology and Social Policy at the School of Social Sciences in Swansea University. Reza obtained his B.Sc. (Hons) in Multimedia Computing and M.Sc. in Computer Forensics both from the University of South Wales and his Ph.D. in Digital Forensics from the University of Derby. He is a Fellow of Higher Education Academy (FHEA), a Chartered Engineer (CEng.), and a Member of the Institution of Engineering and Technology (IET). Dr. Montasari is also a Member of Strategic Independent Advisory Group at South Wales Police. Reza’s main research interests lie in the areas of Digital Forensics, Artificial Intelligence, Cyber Security, National and International Security, and Cyberwarfare. He has authored numerous books, journal articles, conference papers, book chapters, media articles in his fieldsof expertise. Reza serves as Editorial Board Member, Program Steering Committee Member, and Reviewer for several leading international journals and conferences in the fields of Digital Forensics and Cyber Security.
Inhaltsangabe
1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom.- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online.- 3. Cell Site Analysis and ANPR Mapping.- 4. AI-Based Internet of Things Forensics.- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures.- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning.- 7. Policing Cyberspace and Big Data Predictive Analytics.- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing.- 9. Enterprise Geographic Information System and Digital Policing.- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom.- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online.- 3. Cell Site Analysis and ANPR Mapping.- 4. AI-Based Internet of Things Forensics.- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures.- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning.- 7. Policing Cyberspace and Big Data Predictive Analytics.- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing.- 9. Enterprise Geographic Information System and Digital Policing.- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom.- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online.- 3. Cell Site Analysis and ANPR Mapping.- 4. AI-Based Internet of Things Forensics.- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures.- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning.- 7. Policing Cyberspace and Big Data Predictive Analytics.- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing.- 9. Enterprise Geographic Information System and Digital Policing.- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
1. Counter Terrorism and Unmanned Aerial Vehicle (UAV) Forensics: Investigative Process Based on the Case Study of DJI Mavic 2 Zoom.- 2. The Use of Machine Learning and Digital Forensics to Detect and Investigate Terrorist Content Online.- 3. Cell Site Analysis and ANPR Mapping.- 4. AI-Based Internet of Things Forensics.- 5. Digital Investigation of Timing-Based Side-Channel Attacks against IoT Devices and Proposed Countermeasures.- 6. Predictive Modelling: Forestalling Cyberterrorism Using Machine Learning.- 7. Policing Cyberspace and Big Data Predictive Analytics.- 8. Criminal Intelligence, Crime Pattern Analysis and Operational Policing.- 9. Enterprise Geographic Information System and Digital Policing.- 10. The Use of Artificial Intelligence in Managing Big Data Analysis Demands.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826