Computer crime, cybercrime Books
John Wiley & Sons CyberThreats to Canadian Democracy
Book SynopsisScrutinizing the events of the 2019 federal election and looking to the future, Cyber-Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen Canadian democracy, shedding light on some of the most contentious issues around technology and electoral integrity.Trade Review“Digital technologies present numerous advantages to democratic engagement alongside some very real threats to the Canadian political environment. Cyber-Threats to Canadian Democracy opens up the conversation and offers timely and important research on the topic.” Andrea Lawlor, University of Western Ontario“This volume is the first study of how new technologies may impact Canadian election processes. The text offers a multidisciplinary perspective to the domestic and foreign threats to the electoral process. This work sounds an alarm. The challenge is how to respond.” Choice
£91.80
McGill-Queen's University Press CyberThreats to Canadian Democracy
Book SynopsisScrutinizing the events of the 2019 federal election and looking to the future, Cyber-Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen Canadian democracy, shedding light on some of the most contentious issues around technology and electoral integrity.Trade Review“Digital technologies present numerous advantages to democratic engagement alongside some very real threats to the Canadian political environment. Cyber-Threats to Canadian Democracy opens up the conversation and offers timely and important research on the topic.” Andrea Lawlor, University of Western Ontario“This volume is the first study of how new technologies may impact Canadian election processes. The text offers a multidisciplinary perspective to the domestic and foreign threats to the electoral process. This work sounds an alarm. The challenge is how to respond.” Choice
£26.99
Faber & Faber The Missing Hours
Book Synopsis'Gripping' Observer 'A one-sitting read' Jane Casey'Compulsively readable' Mail on SundayShe doesn't remember. He won't let her forget.From a distance, Claudia Castro has it all: the famous family, the trust fund, thousands of Instagram followers, and a spot in NYU's freshman class. But then one drunken night everything changes.Her memory hazy, Claudia cuts herself off from her family, seeking solace in a new friendship, but when the rest of school comes back from spring break, Claudia is missing.What readers are saying:'This book kept me up way too late, but it was totally worth it!''Intense, gritty . . . Clear your clendar as you'll want to read this book in one sitting.''A fast-paced read that gives the reader much to ponder.''Timely, taut, and gripping - an absolute must-read.'
£9.49
John Wiley & Sons Inc The Crypto Launderers
Book SynopsisTable of ContentsForeword ix Timeline of Key Events xi Prologue xv Chapter 1: The Dark Web: The Origins of Crypto Laundering 1 Chapter 2: Black Holes: The Rise of the Rogue Exchange 23 Chapter 3: Mixers: Covering Up Their Tracks 39 Chapter 4: Privacy Coins: Going Underground 59 Chapter 5: Bitcoin ATMs: Crypto Hits the Streets 83 Chapter 6: Ransomware: Cybercrime Goes Industrial 97 Chapter 7: Hacked: Crypto Exchange Heists 123 Chapter 8: DeFi: Tornadoes, Bridges, and the Frontiers of Regulation 139 Chapter 9: NFTs: Virtual Art, Virtual Crime 163 Chapter 10: Brave New World: The Metaverse, Web 3.0, and the Battle for the Future of Finance 177 Afterword: How Much Crime in Crypto? 193 Acknowledgements 199 Glossary 201 List of Figures 207 Bibliography 209 Notes 211 Index 249
£28.50
Bloomsbury Publishing PLC Bloomsbury Professional Law Insight -
Book SynopsisThis book explores the specialist area of cryptocurrency in the context of matrimonial finance proceedings. The work is split into two parts. The first part provides a comprehensive primer on cryptocurrency and blockchain technology. It explains what cryptocurrencies are, how they are held by their owners, and how blockchain technology works. This part also considers the legal status and current regulatory treatment of cryptocurrency in England and Wales. The second part provides an overview of financial remedies and the distributive principles applied by the Family Court in matrimonial finance cases. It analyses the current case law on cryptocurrencies as a variety of ‘property’, before exploring issues that practitioners may face when encountering crypto-assets in litigation. This includes the challenges of valuing, tracing, and freezing cryptocurrency, as well as disclosure considerations. The work includes an overview of the principles relating to ‘self-help’ disclosure and associated criminal offences pursuant to the Computer Misuse Act 1990 and the Data Protection Act 2018. It also contains a summary of HMRC’s current guidance on the taxation of crypto-assets for individuals. This title is included in Bloomsbury Professional's Family Law and Cyber Law online services.Table of Contents1. Introduction 2. An Introduction to Cryptocurrency a. Introduction b. Types of cryptoassets c. What is cryptocurrency? d. Comparing transaction systems: ‘traditional’ finance v cryptocurrency e. The legal status of cryptocurrency in the United Kingdom f. Case study: the evolution of Bitcoin 3. Blockchain a. Introduction b. What is blockchain? c. How blockchain works d. The consensus mechanism e. Advantages and disadvantages of blockchain f. Applications of blockchain technology g. Smart contracts h. Non-Fungible Tokens 4. The Cryptocurrency Ecosystem a. Introduction b. Key players and key terms c. Top 10 cryptocurrencies by market capitalisation: Bitcoin, Ethereum, Tether, USD Coin, BNB, Cardano, XRP, Binance USD, Solana, Dogecoin 5. Regulation of cryptocurrency in the United Kingdom a. Introduction b. The FCA regulatory perimeter c. Financial regulation by category: security tokens, e-money tokens, exchange tokens, utility tokens, stablecoins d. AML / CTF financing e. Regulatory developments in the UK 6. Overview of financial remedies in matrimonial finance a. Introduction b. The Court’s powers and statutory discretion c. The distributive principles d. Matrimonial and non-matrimonial property e. Special contributions f. Income g. Summary 7. Cryptocurrency as a matrimonial asset a. Are cryptocurrencies ‘property’ and why does it matter? b. Are cryptocurrencies divisible? c. Disclosure on Form E 8. Practical considerations in litigation a. Introduction b. Identifying and tracing cryptocurrency c. Valuation of cryptocurrency d. Disclosure, freezing orders, and preservation of devices e. Self-help disclosure and associated criminal offences f. Taxation
£57.00
The Law Society Cyber Security Toolkit
Book SynopsisCyber security is a central issue for legal services providers, their insurers and regulators. This second edition of Cyber Security Toolkit has been fully revised and updated to cover current cyber security threats and best practice approaches.
£60.00
ISTE Ltd and John Wiley & Sons Inc Cybercrime During the SARS-CoV-2 Pandemic:
Book SynopsisThe SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved.In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon.Table of ContentsIntroduction ixDaniel VENTRE and Hugo LOISEAU Chapter 1 The Evolution of Cybercrime During the Covid-19 Crisis 1Daniel VENTRE 1.1 Introduction 1 1.2 Observing the evolution of cybercrime 4 1.2.1 Leveraging annual data: the case of India 8 1.2.2 Leveraging monthly data 11 1.2.3 Leveraging weekly data: the case of China 21 1.3 Has the global geography of cyberattacks changed? 29 1.4 Conclusion 34 1.5 Appendix 39 1.5.1 Cybercrime tools: malware 39 1.5.2 CVSS as indicators of vulnerability levels 40 1.5.3 Heterogeneity and complexity of cybercrime typologies 41 1.5.4 Attitude of companies toward cyber risks: the case of the United Kingdom 46 1.6 References 47 Chapter 2 The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada 49Hugo LOISEAU 2.1 Introduction 49 2.2 The impacts of the SARS-CoV-2 pandemic 50 2.3 Cybercrime and SARS-CoV-2 52 2.3.1 Targets and victims 53 2.3.2 Malicious actors 57 2.3.3 Cyberspace: a propitious environment for cybercrime 58 2.4. The evolution of cybercrime in North America during the pandemic 61 2.4.1 The United States 62 2.4.2 Canada 67 2.5 Discussion 69 2.6 Conclusion 72 2.7 Acknowledgments 74 2.8 References 74 Chapter 3 Online Radicalization as Cybercrime: American Militancy During Covid-19 81Joseph FITSANAKIS and Alexa MCMICHAEL 3.1 Introduction 81 3.2 A new typology of cybercrime 83 3.3 Internet connectivity and violent militancy 85 3.4 The pre-pandemic domestic threat landscape 87 3.5 The domestic threat landscape of the pandemic 88 3.6 Pandemic accelerationism 91 3.7 From virtual to real-life criminality 93 3.8 Online radicalization during Covid-19 94 3.9 A new methodological paradigm for online radicalization? 98 3.10 Conclusion: meta-radicalization as cybercrime 100 3.11 References 102 Chapter 4 Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions 109Alexandre VERONESE and Bruno CALABRICH 4.1 Introduction: Brazilian cybercrime and the Covid crisis impact 109 4.2 Cybercrime in the literature and the Brazilian case 112 4.3 A theoretical model for international cooperation 115 4.4 The evolution of cybercrime in Brazil 119 4.5 The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime 126 4.6 Managing international cooperation without having the best tools 133 4.7 Difficulties with cooperation: joints, mortises, and notches 137 4.8 Conclusion: what to expect from the future? 140 4.9 References 142 4.10 Appendix: List of interviews and questions 147 Chapter 5 Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal? 149Inês GUEDES, Joana MARTINS, Samuel MOREIRA and Carla CARDOSO 5.1 Introduction 149 5.2 The impact of the Covid-19 pandemic on cybercrime 150 5.3 Evolution of cybercrime in Portugal 153 5.4 Online identity theft (OIT) 155 5.4.1 Definition and modus operandi 155 5.4.2 RAT applied to cyberspace 156 5.4.3 Individual variables and OIT victimization 159 5.5 Fear of (online) crime 160 5.5.1 Determinants of fear of (online) crime 160 5.6 The present study 162 5.6.1 Measures 163 5.6.2 Results 165 5.6.3 Variables associated with online victimization and fear of identity theft 169 5.7 Conclusion 170 5.8 References 171 Chapter 6 A South African Perspective on Cybercrime During the Pandemic 177Brett VAN NIEKERK, Trishana RAMLUCKAN and Anna COLLARD 6.1 Introduction 177 6.1.1 Background to South Africa and the pandemic 178 6.1.2 Methodology 179 6.2 International rankings 180 6.3 Cybercrime and related legislation 183 6.4 Cybersecurity incidents 186 6.4.1 Ransomware 186 6.4.2 Scams and fraud 188 6.4.3 System intrusions and data breaches 190 6.4.4 Disinformation and malicious communications 192 6.4.5 Other 196 6.5 Discussion 197 6.6 Conclusion 199 6.7 References 199 List of Authors 211 Index 213
£118.80
Bloomsbury Publishing PLC The Hacker
Book SynopsisThe gripping debut techno thriller from cybercrime specialist Daniel Scanlan. FBI Special Agent Ericka Blackwood chases a deadly online predator in a high-stakes hunt for the truth. Perfect for fans of Thomas Harris and Stieg Larsson. He's online. He's anonymous. He's deadly. When a video surfaces on the Dark Web showing a murder no one else could have witnessed, FBI Special Agent Ericka Blackwood starts tracking down the killer. But the case is even darker than Ericka thought. Hidden behind an avatar named Dantalion, a criminal mastermind is feeding his sadistic appetites by directing the crimes of others – and he may have been orchestrating his twisted schemes for years. As Ericka homes in on her target, the tables are suddenly turned. Dantalion has information that will help Ericka fulfil a deeply personal quest for revenge... but only if she risks her career, her life, and the fate of Dantalion's future victims. Does vengeance come at too high a price? Reviewers on The Hacker 'Frighteningly plausible and deftly written, Daniel Scanlan’s debut is a thrilling roller coaster of twists and turns.' Boyd Morrison 'A thoroughly disturbing lightning-paced thriller. Dark, twisted and horribly captivating.' Ian Green 'Tense, gripping, brutal, scary – The Hacker has everything you'd want from a thriller.' P.R. Black 'Dark, brutal, scary – yet absolutely riveting.' Samantha Brick 'The author creates an atmosphere of high-tech terror... A modern, thrilling novel.' Promoting Crime FictionTrade ReviewFrighteningly plausible and deftly written, The Hacker takes you on a harrowing journey into the dark reaches of modern technology. Daniel Scanlan's debut is a thrilling roller coaster of twists and turns that will have you racing through its pages. Riveting to the very end! -- Boyd MorrisonThe Hacker is a thoroughly disturbing lightning paced thriller, packed with action and intrigue. Dark and twisted and horribly captivating. Scanlan delivers a frighteningly believable world where the line between digital and physical blurs most in the shadows -- Ian GreenTense, gripping, brutal, scary – The Hacker has everything you'd want from a thriller. A tough and all-too-believable heroine who has demons to contend with matches wits and skills with an evil spider at the centre of his wicked web... Who will win this sadistic game? Perfect for fans of Stieg Larsson -- P.R. BlackFrighteningly plausible... The Hacker is a modern, thrilling novel that moves along at high speed and hurtles towards its dénouement * Promoting Crime Fiction *Dark, brutal, scary – yet absolutely riveting -- Samantha Brick
£9.49
Bloomsbury Publishing PLC The Hacker
Book SynopsisThe gripping debut techno thriller from cybercrime specialist Daniel Scanlan. FBI Special Agent Ericka Blackwood chases a deadly online predator in a high-stakes hunt for the truth. Perfect for fans of Thomas Harris and Stieg Larsson. He's online. He's anonymous. He's deadly. When a video surfaces on the Dark Web showing a murder no one else could have witnessed, FBI Special Agent Ericka Blackwood starts tracking down the killer. But the case is even darker than Ericka thought. Hidden behind an avatar named Dantalion, a criminal mastermind is feeding his sadistic appetites by directing the crimes of others – and he may have been orchestrating his twisted schemes for years. As Ericka homes in on her target, the tables are suddenly turned. Dantalion has information that will help Ericka fulfil a deeply personal quest for revenge... but only if she risks her career, her life, and the fate of Dantalion's future victims. Does vengeance come at too high a price? Reviewers on The Hacker: 'Frighteningly plausible and deftly written, Daniel Scanlan’s debut is a thrilling roller coaster of twists and turns.' Boyd Morrison 'One of the most engaging and intelligent thrillers of the year.' Kashif Hussein, Best Thriller Books 'A thoroughly disturbing lightning-paced thriller. Dark, twisted and horribly captivating.' Ian Green 'Tense, gripping, brutal, scary – The Hacker has everything you'd want from a thriller.' P.R. Black 'Dark, brutal, scary – yet absolutely riveting.' Samantha Brick 'The author creates an atmosphere of high-tech terror... A modern, thrilling novel.' Promoting Crime FictionTrade ReviewFrighteningly plausible and deftly written, The Hacker takes you on a harrowing journey into the dark reaches of modern technology. Daniel Scanlan's debut is a thrilling roller coaster of twists and turns that will have you racing through its pages. Riveting to the very end! -- Boyd MorrisonPacked with realistic tidbits of crime-solving in the age of cyberspace and meta verse, it’s one of the most engaging and intelligent thrillers of the year. * Kashif Hussein, Best Thriller Books *The Hacker is a thoroughly disturbing lightning paced thriller, packed with action and intrigue. Dark and twisted and horribly captivating. Scanlan delivers a frighteningly believable world where the line between digital and physical blurs most in the shadows -- Ian GreenTense, gripping, brutal, scary – The Hacker has everything you'd want from a thriller. A tough and all-too-believable heroine who has demons to contend with matches wits and skills with an evil spider at the centre of his wicked web... Who will win this sadistic game? Perfect for fans of Stieg Larsson -- P.R. BlackFrighteningly plausible... The Hacker is a modern, thrilling novel that moves along at high speed and hurtles towards its dénouement * Promoting Crime Fiction *Dark, brutal, scary – yet absolutely riveting -- Samantha Brick
£19.00
Octopus Publishing Group Deep Fakes and the Infocalypse: What You Urgently
Book Synopsis"Nina Schick is alerting us to a danger from the future that is already here." - Adam Boulton, Editor at Large, Sky News"Deep Fakes and the Infocalypse is an urgent, thoughtful and thoroughly-researched book that raises uncomfortable questions about the way that information is being distorted by states and individuals... A must-read." - Greg Williams, Editor in Chief of WIRED UK"Essential reading for any one interested about the shocking way information is and will be manipulated." - Lord Edward Vaizey"Schick's Deep Fakes and the Infocalypse is a short, sharp book that hits you like a punch in the stomach." - Nick Cohen, The Observer"Deep Fakes is an uncomfortable but gripping read, probing the way in which the internet has been flooded with disinformation and dark arts propaganda." - Jim Pickard, Chief Political Correspondent, Financial Times"A searing insight into a world so many of us find difficult to understand. I was gripped from the first page." - Iain Dale, Broadcaster"With this powerful book, Nina Schick has done us all a great public service...It's your civic duty to read it." - Jamie Susskind, author of Future Politics"Gripping, alarming and morally vital." - Ian Dunt, Host of Remainiacs PodcastDeep Fakes are coming, and we are not ready. Advanced AI technology is now able to create video of people doing things they never did, in places they have never been, saying things they never said. In the hands of rogue states, terrorists, criminals or crazed individuals, they represent a disturbing new threat to democracy and personal liberty. Deep Fakes can be misused to shift public opinion, swing Presidential elections, or blackmail, coerce, and silence individuals. And when combined with the destabilising overload of disinformation that has been dubbed 'the Infocalypse', we are potentially facing a danger of world-changing proportions.Deep Fakes and the Infocalypse is International Political Technology Advisor Nina Schick's stark warning about a future we all need to understand before it's too late. Deep Fake technology at its most insidious can currently be seen in the BBC drama series The Capture. Trade ReviewNina Schick is alerting us to a danger from the future that is already here. Deepfakes mean that we can't trust our eyes and ears. Listen to this vital warning. -- Adam Boulton * Sky News *Schick's Deep Fakes and the Infocalypse is a short, sharp book that hits you like a punch in the stomach. -- Nick Cohen * The Observer *A searing insight into a world so many of us find difficult to understand. I was gripped from the first page and read the book in one sitting. The lessons I learned from it will stay with me for a long time. * Iain Dale, Broadcaster, LBC *With this powerful book, Nina Schick has done us all a great public service. It's a brilliant guide to the challenges facing our information ecosystem. It's your civic duty to read it. * Jamie Susskind, Author of Future Politics *Deep Fakes is an uncomfortable but gripping read, probing the way in which the internet has been flooded with disinformation and dark arts propaganda dubbed by Schick as "the Infocalypse" - and how that has undermined democracies in the world. The book sketches out an alarming future where convincing fakes will make it even harder for citizens to disentangle truth from lies, and I would advise policy-makers to read it. * Jim Pickard, Chief Political Correspondent, The Financial Times *Gripping, alarming and morally vital. Reading this book is like being ushered into a terrifying new world where nothing can be trusted. Thankfully Nina Schick guides us through it in a reassuringly old-fashioned way: with diligence, breezy storytelling, expert insight and a tried-and-tested commitment to accuracy. * Ian Dunt, Author: Brexit What the Hell Happens Next? *Those concerned with the criminal side of technology will learn from Schick's well-mounted argument. * Kirkus Reviews *Deep Fakes and the Infocalypse is an urgent, thoughtful and thoroughly-researched book that raises uncomfortable questions about the way that information is being distorted by states and individuals. Schick expertly outlines the key challenges that liberal democracies face to ensure the primacy of veracity and trust in public discourse. A must-read for anyone who cares about how the world is represented and an important addition to the discussion around the polarisation of contemporary politics. * Greg Williams, Editor in Chief of WIRED UK *This is essential reading for any one interested about the shocking way information is and will be manipulated - essential not just for policy makers but also CEOs and corporations having to navigate this new landscape. * Lord Edward Vaizey *Schick is a world-leading authority on the ways that warped information flows have broken our shared sense of reality. Deep Fakes is an urgent, illuminating, fast-paced read, making clear that if we break reality, we break democracy too. * Brian Klaas, Author, How to Rig an Election *If you are freaked out by this stuff and you want to see what the background is, and what the future can look like, this is the book for you. I learned a lot from it. * Andrew Yang, Yang Speaks Podcast *Disinformation is no longer a small element of the political landscape. In an era when political campaigns can be based on entirely false versions of reality, it is the political landscape. Schick's book helps explain how this has happened, and warns that it will get worse. * Anne Applebaum, Author, The Twilight of Democracy *This thought-provoking, well-written book finishes with a rallying call: we need to understand, defend and fight back, and Schick tells us how. -- Brian Maye * The Irish Times *
£11.69
Springer Nature Switzerland AG Online Othering: Exploring Digital Violence and
Book SynopsisThis book explores the discrimination encountered and propagated by individuals in online environments. The editors develop the concept of 'online othering' as a tool through which to analyse and make sense of the myriad toxic and harmful behaviours which are being created through, or perpetuated via, the use of communication-technologies such as the internet, social media, and ‘the internet of things’. The book problematises the dichotomy assumed between real and virtual spaces by exploring the construction of online abuse, victims' experiences, resistance to online othering, and the policing of interpersonal cyber-crime. The relationship between various socio-political institutions and experiences of online hate speech are also explored.Online Othering explores the extent to which forms of information-technologies facilitate, exacerbate, and/or promote the enactment of traditional offline offences (such as domestic abuse and stalking). It focuses on the construction and perpetration of online abuse through examples such as the far-right, the alt-right and Men's Rights Activists. It also explores experiences of, and resistance to, online abuse via examples such as victims' experiences of revenge porn, online abuse and misogyny, transphobia, disability hate crime, and the ways in which online othering is intersectional. Finally, the collection addresses the role of the police and other agencies in terms of their interventions, and the regulation and governance of virtual space(s). Contributions to the volume come from fields including sociology; communication and media studies; psychology; criminology; political studies; information science and gender studies. Online Othering is one of the very first collections to explore a multitude of abuses and their relationship to information and communication technology.Table of ContentsAcknowledgements ‘Online othering’: An introduction (by Emily Harmer and Karen Lumsden) Section I: Online Culture Wars: The Rise of the Alt-Right, Trumpism and White Masculinities Section I: Editors’ Introduction (by Emily Harmer and Karen Lumsden) Chapter 1: Online hate movements: From the far-right to the 'alt-right' and from the margins to the mainstream (by Aaron Winter) Chapter 2: Libcucks, fags and useful idiots: The othering of oppositional white masculinities by the ‘alt-right’ (by Alex Green) Chapter 3: ‘“I want to kill you in front of your children” is not a threat. It's an expression of a desire, not of an intent’: Discourses of trolling and gendered violence on a Reddit Men’s Rights Activist (MRA) forum (by Karen Lumsden) Section II: Experiences of Online Abuse: Gendered Othering, Sexism and Misogyny Editors’ Introduction (by Emily Harmer and Karen Lumsden) Chapter 4: Online/offline continuities: Online abuse of feminists as a form of violence against women (by Ruth Lewis, Mike Rowe and Clare Wiper) Chapter 5: Power, pleasure and pain: Approaching sexting and revenge porn with post-feminism (by Rikke Amundsen) Chapter 6: ‘There’s a bit of banter’: How male teenagers ‘do boy’ on social networking sites (by John Whittle, Dave Elder-Vass and Karen Lumsden) Chapter 7: Othering political women: Online misogyny and racism towards women in public life (by Emily Harmer and Rosalynd Southern) Section III: Online Exclusion: Boundaries, Spaces and Intersectionality Editors’ Introduction (by Karen Lumsden and Emily Harmer) Chapter 8: The online ‘othering’ of transgender and non-binary people: A discourse analysis of comments on Youtube videos on ‘gender neutral toilets’ (by Ben Colliver, Adrian Coyle and Maria Silvestri) Chapter 9: Invisible needs: Young people with physical disabilities seek sexual information online (by Herminder Kaur) Chapter 10: Rural racism in the digital age (by Nathan Kerrigan) Section IV: Responding to, Regulating and Policing Online Hate Editors’ Introduction (by Karen Lumsden and Emily Harmer) Chapter 11: ‘When I saw women being attacked…it has made me want to stand up and fight’: Reporting, responding to, and resisting online misogyny (by Jo Smith) Chapter 12: Disability hate speech: Interrogating the online/offline distinction (by Phillipa Hall) Chapter 13: Critique of the stalking risk profile: The changing nature of online relationships in cases of cyberstalking (by Brianna O’Shea, R. Julian, J. Prichard and S. Kelty)
£116.99
Springer Nature Switzerland AG Cybercrime Prevention: Theory and Applications
Book SynopsisThis book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the digital realm. It provides an overview of the key principles, concepts and research literature associated with crime prevention, and discusses the interventions most commonly applied to crime problems. The authors review the theoretical underpinnings of these and analyses evidence for their efficacy. Cybercrime Prevention is split into three sections which examine primary prevention, secondary prevention and tertiary prevention. It provides a thorough discussion of what works and what does not, and offers a formulaic account of how traditional crime prevention interventions can be reimagined to apply to the digital realm. Trade Review Table of ContentsSeries Editor PrefaceCHAPTER 1: SETTING THE SCENEIntroductionApproaches to crime preventionFactors associated with cyber-dependent offendingParameters of the reviewOverview of the bookReferencesPART I: PRIMARY FORMS OF PREVENTIONCHAPTER 2: SITUATIONAL CRIME PREVENTIONIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for the interventionFuture applications and adaptations to digital contextsReferencesCHAPTER 3: UNIVERSAL COMMUNICATION STRATEGIESIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for interventionFuture applications and adaptations to digital contextsReferencesPART II: SECONDARY FORMS OF PREVENTIONCHAPTER 4: EDUCATIONAL WORKSHOPSIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for interventionFuture applications and adaptations to digital contextsReferencesCHAPTER 5: MENTORING PROGRAMSIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for the interventionFuture applications and adaptations to digital contextsReferencesCHAPTER 6: TARGETED WARNINGS AND POLICE CAUTIONSIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for the interventionFuture applications and adaptations to digital contextsReferencesPART III: TERTIARY FORMS OF PREVENTIONCHAPTER 7: POSITIVE DIVERSIONSIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for interventionFuture applications and adaptations to digital contextsReferencesCHAPTER 8: RESTORATIVE JUSTICEIntroductionTheoretical underpinnings of the interventionCurrent applicationsEvidence base for interventionFuture applications and adaptations to digital contextsReferencesCHAPTER 9: DESIGNING AND EVALUATING CRIME PREVENTION SOLUTIONS FOR THE DIGITAL AGENavigating the cybercrime intervention minefieldSelecting the appropriate study designSourcing the best possible dataBeing attentive to ethical issuesAcknowledging generalisability concernsCharting a path forward for researchers and practitionersReferences
£49.49
Springer Nature Switzerland AG Researching Cybercrimes: Methodologies, Ethics,
Book SynopsisThis edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods. The accessibility, variety and wealth of data available online presents substantial opportunities for researchers from different disciplines to study cybercrimes and, more generally, human behavior in cyberspace. The unique and dynamic characteristics of cyberspace often demand cross-disciplinary and cross-national research endeavors, but disciplinary, cultural and legal differences can hinder the ability of researchers to collaborate. This work also provides a review of the ethics associated with the use of online data sources across the globe. The authors are drawn from multiple disciplines and nations, providing unique insights into the value and challenges evident in online data use for cybercrime scholarship. It is a key text for researchers at the upper undergraduate level and above.Table of Contents1. Introduction to Part I – Anita Lavorgna and Thomas J. Holt.- 2. Epistemologies of cyberspace: notes for interdisciplinary research, Anita Lavorgna.- 3. The how and why of cybercrime: the EU as a case study of the role of ideas, interests and institutions as drivers of a security-governance approach, Benjamin Farrand and Helena Carrapico.- 4. Programming the criminologist: developing cyber skills to investigate cybercrime, Ruth McAlister and Fabian Campbell-West.- 5. Profiling and predictions. Challenges in cybercrime research datafication, Bart Custers.- 6. Data-driven technologies in Justice Systems: Intersections of power, data configurations, and knowledge production, Pamela Ugwudike.- 7. Introduction to Part II, Anita Lavorgna and Thomas J. Holt.- 8. The challenges of empirically comparing cybercriminals and traditional offenders, Marleen Weulen Kranenbarg.- 9. Breaking the walls of silence: analyzing criminal investigations to improve our understanding of cybercrime – E. Rutger Leukfeldt and Edward R. Kleemans.- 10. Using digital open source and crowdsourced data in studies of deviance and crime, Rajeev V. Gundur, Mark Berry and Dean Taodang.- 11. Developing open-source databases from online sources to study online and offline phenomena, Emily Ann Greene-Colozzi, Joshua D. Freilich and Steven M. Chermak.- 12. Too much data? Opportunities and challenges of large datasets and cybercrime, Jack Hughes, Yi Ting Chua and Alice Hutchings.- 13. Use of Artificial Intelligence to support cybercrime research, Stuart E. Middleton.- 14. Honeypots for cybercrime research, Robert C. Perkins and C. Jordan Howell.- 15. Social and semantic online networks, Elena Pavan.- 16. Digital ethnography in cybercrime research: some notes from the virtual field, Nicholas Gibbs and Alexandra Hall.- 17. The meme is the method: examining the power of the image within extremist propaganda, Ashton Kingdon.- 18. Introduction to Part III, Anita Lavorgna and Thomas J. Holt.- 19. Researching cybercrime in the European Union: asking the right ethics questions, Francisco J. Castro-Toledo and Fernando Miró-Llinares.- 20. Ethical approaches to studying cybercrime: considerations, practice and experience in the United Kingdom, Brian Pickering, Silke Roth and Craig Webber.- 21. Conducting ethical research with online populations in the United States, Kacy Amory and George Burruss.- 22. Investigating the ethical boundaries for online research in Brazil, Felipe Cardoso Moreira de Oliveira.- 23. Ethics and internet-based cybercrime research in Australia, James Martin.- 24. Researching crime and deviance in Southeast Asia: challenges and ethics when using online data, Lennon Yao-Chung Chang and Souvik Mukherjee.- 25. The ethics of web crawling and web scraping in cybercrime research: navigating issues of consent, privacy and other potential harms associated with automated data collection, Russell Brewer, Bryce Westlake, Tahlia Hart and Omar Arauza.- 26. Does the institution have a plan for that? Researcher safety and the ethics of institutional responsibility, Ashley A. Mattheis and Ashton Kingdon.- 27 Engaging with incels: reflexivity, identity and the female cybercrime ethnographic researcher, Lisa Sugiura.- 28. Personal reflections on researching fraud: challenges surrounding the ethics of “doing”, Cassandra Cross.- 29. At the intersection of digital research and sexual violence: insights on gaining informed consent from vulnerable participants, Tully O’Neil.- 30. Concluding thoughts, Anita Lavorgna and Thomas J. Holt.
£42.74
Springer Nature Switzerland AG Cybersecurity in Poland: Legal Aspects
Book SynopsisThis open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of cybersecurity and, in addition, has implemented the provisions of the NIS Directive) but may discuss a number of other issues. The book presents international and EU regulations in the field of cybersecurity and issues pertinent to combating cybercrime and cyberterrorism. Moreover, regulations concerning cybercrime in a few select European countries are presented in addition to the problem of collision of state actions in ensuring cybersecurity and human rights. The advantages of the book include a comprehensive and synthetic approach to the issues related to the cybersecurity system of the Republic of Poland, a research perspective that takes as the basic level of analysis issues related to the security of the state and citizens, and the analysis of additional issues related to cybersecurity, such as cybercrime, cyberterrorism, and the problem of collision between states ensuring security cybernetics and human rights. The book targets a wide range of readers, especially scientists and researchers, members of legislative bodies, practitioners (especially judges, prosecutors, lawyers, law enforcement officials), experts in the field of IT security, and officials of public authorities. Most authors are scholars and researchers at the War Studies University in Warsaw. Some of them work at the Academic Centre for Cybersecurity Policy – a thinktank created by the Ministry of National Defence of the Republic of Poland. Table of ContentsIntroduction.- Part I Providing cybersecurity as a new challenge for governments.- Cyberspace and cybersecurity.- Cyberspace as an area of legal regulation.- Cyberspace, cybercrime, cyberterrorism (F. Radoniewicz).- International regulations of cybersecurity (F. Radoniewicz.- Cybersecurity in the European Union law.- National Cybersecurity System Act.- The New National Security Strategy of the Republic of Poland.- The Cybersecurity Strategy of the Republic of Poland.- The functioning of state power structures and cybersecurity.- Personal data protection in the context of the Act on the National Cybersecurity System.- Space security and cybersecurity in Poland.- Part II Competences, obligations and tasks of entities responsible for ensuring cybersecurity under the national cybersecurity system (“imperious entities”).- Cybersecurity as a public task in administration.- The authorities competent for cybersecurity.- The main tasks of the network of Computer Security Incident Response Teams in the light of the Act on the National Cybersecurity System in Poland.- Tasks of the Minister of National Defence in the field of cybersecurity.- Role of the minister competent for computerisation in the cybersecurity system.- The duties and legal status of the Government Plenipotentiary for Cybersecurity and the College for Cybersecurity.- Part III Obligations of other entities included in the national cybersecurity system („participants” of the national cybersecurity system).- Tasks of operators of essential services and digital service providers .- The obligations of public entities.- The system of control and supervision of operators of essential services, digital service providers and entities providing cybersecurity services.- Monetary penalties in the National Cybersecurity System Act.- The liability of entities providing services by electronic means for digital content.- Part IV Combating cybercrime as a special task in the area of cybersecurity.- Cybercrime and cyberterrorism in Polish Law.- Cybercrime in selected European countries.- The entities and institutions in charge of combating cybercrime in Poland.- Operational activities in the field of cybersecurity.- Operational activities and the right to privacy.- Summary.- Biographies.- Bibliography.
£31.49
Springer Nature Switzerland AG Handbook of Fingerprint Recognition
Book SynopsisA major new professional reference work on fingerprint security systems and technology from leading international researchers in the field. Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems. This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.Table of ContentsIntroduction.- Fingerprint sensing.- Fingerprint analysis and representation.- Fingerprint matching.- Fingerprint classification and indexing.- Latent fingerprint recognition.- Fingerprint synthesis.- Fingerprint individuality.- Securing fingerprint systems.
£104.49
Springer International Publishing AG The Rule of Law in Cyberspace
Book SynopsisThe rule of law in cyberspace currently faces serious challenges. From the democratic system to the exercise of fundamental rights, the Internet has raised a host of new issues for classic legal institutions. This book provides a valuable contribution to the fields of international, constitutional and administrative law scholarship as the three interact in cyberspace.The respective chapters cover topics such as the notion of digital states and digital sovereignty, jurisdiction over the Internet, e-government, and artificial intelligence. The authors are eminent scholars and international experts with a profound knowledge of these topics. Particular attention is paid to the areas of digital democracy, digital media and regulation of the digital world.The approach employed is based on a comparative perspective from Germany, the Netherlands, Italy, Portugal and Brazil. One particular focus is on how various legal systems are coping with increasing difficulties in the exercise of democracy with regard to disinformation and hate speech. The roles of legislators, the judicial system and public administrations are analysed in the light of the latest cases, conflicts and technologies.In addition to this comparative approach, the book explores the evolution of rule of law in cyberspace and the upcoming new legal regimes in the European Union and Brazil. Special care is taken to offer a critical review of both the literature and the latest legal solutions adopted and being considered regarding the regulation of cyberspace from a constitutional and administrative perspective.Given its scope, the book will be of interest to researchers and scholars in the field of digital law whose work involves constitutional problems in cyberspace and/or practical problems concerning the regulation of social networks and online commerce.Table of Contents- Introduction. - Part I Democratic Constitutionalism in Cyberspace. - “Digital Democracy”: A Threat to the Democratic System or Oxygenation of Representative Democracy and Free Speech?. - Digital Constitutionalism and Constitutional Jurisdiction: A Research Agenda for the Brazilian Case. - The Crisis of the Representative Democracy in the Face of Digital Democracy. - Rule of Law, Democracy and New Technologies. - Freedom, Democracy, Digital Government and Human Development. - The Digitization of Government and Digital Exclusion: Setting the Scene. - The Impact of Artificial Intelligence on the Structures of the Modern Public Sphere. - Part II The Threat of Disinformation and the Role of Social Networks. - Fake News and the 2018 Brazilian Presidential Election. - Political Speech, Freedom of Expression and Fake News. - Disinformation and Journalism. - Social Networks and the Exercise of Fundamental Rights: Public Administration and the Digitalization of Fundamental Rights. - Freedom of Expression in the Age of Digital Platforms: Change of Paradigm?. - Online Hate Speech and the Role of Digital Platforms: What Are the Prospects for Freedom of Expression?. - Hate Speech and Social Media. - Don’t Shoot the Message: Regulating Disinformation Beyond Content. - Models of Legal Liability for Social Networks: Between Germany and Portugal. - Self-Regulation and Public Regulation of Social Networks in Portugal. - Cyber Courts for Social Media As a New Institutional Dimension of Media Freedom?.
£80.99
Springer International Publishing AG Collaborative Approaches for Cyber Security in
Book SynopsisThis book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. Table of Contents1. Collaborative and confidential architectures for information sharing and analytics.- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware.- 3. Virtualized security-awareness systems and digital twins.- 4. Empirical evaluation of system vulnerabilities.- 5. Collaborative physical and cyber defense requirements.- 6. Heterogeneous data centric security policies specification and enforcement.- 7. Big data for anomaly and advanced threats detection.- 8. Collaborative identification and ranking of malware.- 9. Visual analytics techniques for cyber security.- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
£125.99
Springer International Publishing AG Counterintelligence in a Cyber World
Book SynopsisThis book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.Table of ContentsChapter. 1. Counterintelligence TheoryChapter. 2. The Cyber Operational EnvironmentChapter. 3. Cyber Threats (and Opportunities)Chapter. 4. Psychology and Criminal ProfilingChapter. 5. CounterespionageChapter. 6. Technical SurveillanceChapter. 7. Physical SurveillanceChapter. 8. Data AnalysisChapter. 9. Attack AttributionChapter. 10. Practical DeceptionChapter. 11. Legal Issues in Cyber CounterintelligenceChapter. 12. Ethical Issues in Cyber Counterintelligence
£47.49