Cyber criminology

Mentés helye:
Bibliográfiai részletek
Testületi szerző:
Közreműködő(k):
Különgyűjtemény:e-book
Formátum: könyv
Nyelv:angol
Megjelenés: Cham : Springer International Publishing : Imprint: Springer, 2018
Kiadás:1st ed. 2018
Sorozat:Advanced sciences and technologies for security applications, ISSN 1613-5113
Tárgyszavak:
Online elérés:https://doi.org/10.1007/978-3-319-97181-0
Címkék: Új címke
A tételhez itt fűzhet saját címkét!
id opac-EUL01-000975026
collection e-book
institution B2
EUL01
spelling Cyber criminology edited by Hamid Jahankhani
1st ed. 2018
Cham Springer International Publishing Imprint: Springer 2018
X, 357 p. ill., részben színes ; online forrás
szöveg txt rdacontent
számítógépes c rdamedia
távoli hozzáférés cr rdacarrier
szövegfájl PDF rda
Advanced sciences and technologies for security applications 1613-5113
Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys.
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field. As Governments, corporations, security firms, and individuals look to tomorrow’s cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern. Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups. Due to the rapid changes in technology, cyber criminals’ behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals’ behaviour is evolving over time as they learn from their actions and others’ experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought. This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, re
Nyomtatott kiadás: ISBN 9783319971803
Nyomtatott kiadás: ISBN 9783319971827
Az e-könyvek a teljes ELTE IP-tartományon belül online elérhetők.
könyv
e-book
Olvasási képességet érintő fogyatékossággal élő személy számára (is) használható dokumentum.
kiberbűnözés
kiberbiztonság
kriminálpszichológia bűnözői profilalkotás
tanulmányok
elektronikus könyv
Computer crimes
Criminal law
Data protection
System safety
Jahankhani, Hamid szerkesztő
SpringerLink (Online service) közreadó testület
Advanced sciences and technologies for security applications
Online változat https://doi.org/10.1007/978-3-319-97181-0
EUL01
language English
format Book
author2 Jahankhani, Hamid, szerkesztő
author_facet Jahankhani, Hamid, szerkesztő
SpringerLink (Online service), közreadó testület
author_corporate SpringerLink (Online service), közreadó testület
author_sort Jahankhani, Hamid
title Cyber criminology
spellingShingle Cyber criminology
Advanced sciences and technologies for security applications, ISSN 1613-5113
kiberbűnözés
kiberbiztonság
kriminálpszichológia -- bűnözői profilalkotás
tanulmányok
elektronikus könyv
Computer crimes
Criminal law
Data protection
System safety
title_short Cyber criminology
title_full Cyber criminology edited by Hamid Jahankhani
title_fullStr Cyber criminology edited by Hamid Jahankhani
title_full_unstemmed Cyber criminology edited by Hamid Jahankhani
title_auth Cyber criminology
title_sort cyber criminology
series Advanced sciences and technologies for security applications, ISSN 1613-5113
series2 Advanced sciences and technologies for security applications
publishDate 2018
publishDateSort 2018
physical X, 357 p. : ill., részben színes ; online forrás
edition 1st ed. 2018
isbn 978-3-319-97181-0
issn 1613-5113
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6772-HV6773
callnumber-raw QK2409
callnumber-search QK2409
topic kiberbűnözés
kiberbiztonság
kriminálpszichológia -- bűnözői profilalkotás
tanulmányok
elektronikus könyv
Computer crimes
Criminal law
Data protection
System safety
topic_facet kiberbűnözés
kiberbiztonság
kriminálpszichológia -- bűnözői profilalkotás
tanulmányok
elektronikus könyv
Computer crimes
Criminal law
Data protection
System safety
kiberbűnözés
kiberbiztonság
kriminálpszichológia
Computer crimes
Criminal law
Data protection
System safety
bűnözői profilalkotás
url https://doi.org/10.1007/978-3-319-97181-0
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 364 - Criminology
dewey-full 364.168
dewey-sort 3364.168
dewey-raw 364.168
dewey-search 364.168
first_indexed 2023-12-27T14:26:46Z
last_indexed 2023-12-29T20:06:31Z
recordtype opac
publisher Cham : Springer International Publishing : Imprint: Springer
_version_ 1786644312411340800
score 13,368425
generalnotes This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field. As Governments, corporations, security firms, and individuals look to tomorrow’s cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern. Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups. Due to the rapid changes in technology, cyber criminals’ behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals’ behaviour is evolving over time as they learn from their actions and others’ experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought. This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, re
General_Note:Olvasási képességet érintő fogyatékossággal élő személy számára (is) használható dokumentum.