Cybercrime Through an Interdisciplinary Lens (eBook, ePUB)
Redaktion: Holt, Thomas
46,95 €
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
46,95 €
Als Download kaufen
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
23 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
46,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
23 °P sammeln
Cybercrime Through an Interdisciplinary Lens (eBook, ePUB)
Redaktion: Holt, Thomas
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 2.18MB
Andere Kunden interessierten sich auch für
- Cyber Criminology (eBook, ePUB)52,95 €
- Alessandro MorettiThe Rise and Rise of Illegal Ticket Touting (eBook, ePUB)42,95 €
- The Routledge Handbook of Technology, Crime and Justice (eBook, ePUB)46,95 €
- Thomas J. HoltCybercrime and Digital Forensics (eBook, PDF)37,95 €
- Global Criminology (eBook, ePUB)52,95 €
- George CurtisThe Law of Cybercrimes and Their Investigations (eBook, ePUB)109,95 €
- Petter GottschalkPolicing White-Collar Crime (eBook, ePUB)48,95 €
-
-
-
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 256
- Erscheinungstermin: 8. Dezember 2016
- Englisch
- ISBN-13: 9781317210986
- Artikelnr.: 47387034
- Verlag: Taylor & Francis
- Seitenzahl: 256
- Erscheinungstermin: 8. Dezember 2016
- Englisch
- ISBN-13: 9781317210986
- Artikelnr.: 47387034
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Thomas J. Holt is an Associate Professor in the School of Criminal Justice at Michigan State University, USA.
1. Situating the Problem of Cybercrime in a Multidisciplinary Context,
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
1. Situating the Problem of Cybercrime in a Multidisciplinary Context,
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe