語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
到查詢結果
[ author_sort:"jahankhani, hamid." ]
切換:
標籤
|
MARC模式
|
ISBD
Cyber criminology
~
Jahankhani, Hamid.
Cyber criminology
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber criminologyedited by Hamid Jahankhani.
其他作者:
Jahankhani, Hamid.
出版者:
Cham :Springer International Publishing :2018.
面頁冊數:
x, 357 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer crimes.
電子資源:
https://doi.org/10.1007/978-3-319-97181-0
ISBN:
9783319971810$q(electronic bk.)
Cyber criminology
Cyber criminology
[electronic resource] /edited by Hamid Jahankhani. - Cham :Springer International Publishing :2018. - x, 357 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator's Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys.
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field. As Governments, corporations, security firms, and individuals look to tomorrow's cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern. Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups. Due to the rapid changes in technology, cyber criminals' behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals' behaviour is evolving over time as they learn from their actions and others' experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought. This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, researchers, governments and practitioners can take effective measures to tackle cybercrime and reduce victimization.
ISBN: 9783319971810$q(electronic bk.)
Standard No.: 10.1007/978-3-319-97181-0doiSubjects--Topical Terms:
245152
Computer crimes.
LC Class. No.: HV6773 / .C934 2018
Dewey Class. No.: 364.168
Cyber criminology
LDR
:04907nmm a2200349 a 4500
001
547307
003
DE-He213
005
20190502150937.0
006
m d
007
cr nn 008maaau
008
190709s2018 gw s 0 eng d
020
$a
9783319971810$q(electronic bk.)
020
$a
9783319971803$q(paper)
024
7
$a
10.1007/978-3-319-97181-0
$2
doi
035
$a
978-3-319-97181-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6773
$b
.C934 2018
072
7
$a
JKV
$2
bicssc
072
7
$a
SOC004000
$2
bisacsh
072
7
$a
JKV
$2
thema
072
7
$a
LNQE
$2
thema
082
0 4
$a
364.168
$2
23
090
$a
HV6773
$b
.C994 2018
245
0 0
$a
Cyber criminology
$h
[electronic resource] /
$c
edited by Hamid Jahankhani.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
x, 357 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Foreword -- Cyber Criminology and Psychology -- Crime and Social Media: Legal responses to offensive online communications and abuse -- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories -- Cyberaggression and Cyberbullying: Widening the Net -- Part 2 Cyber-Threat Landscape -- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio -- A New Scalable Botnet Detection Method in the Frequency Domain -- Part 3 Cybercrime Detection -- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques -- Criminal Data Mining, Threat Analysis and Prediction -- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al -- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes -- An Investigator's Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices -- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media -- Part 4 Education, Training and Awareness in Cybercrime Prevention -- An examination into the effect of early education on cyber security awareness within the U.K -- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service -- Combating Cyber Victimisation: Cybercrime Prevention -- Information security landscape in Vietnam: insights from two research surveys.
520
$a
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field. As Governments, corporations, security firms, and individuals look to tomorrow's cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern. Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups. Due to the rapid changes in technology, cyber criminals' behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals' behaviour is evolving over time as they learn from their actions and others' experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought. This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, researchers, governments and practitioners can take effective measures to tackle cybercrime and reduce victimization.
650
0
$a
Computer crimes.
$3
245152
650
0
$a
Criminology.
$3
190212
650
0
$a
Piracy (Copyright)
$3
202005
650
0
$a
Internet
$x
Social aspects.
$3
223647
650
1 4
$a
Cybercrime.
$3
748274
650
2 4
$a
Criminal Law and Criminal Procedure Law.
$3
823831
650
2 4
$a
Security Science and Technology.
$3
510148
650
2 4
$a
Security.
$3
760527
700
1
$a
Jahankhani, Hamid.
$3
284009
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advanced sciences and technologies for security applications.
$3
738348
856
4 0
$u
https://doi.org/10.1007/978-3-319-97181-0
950
$a
Law and Criminology (Springer-41177)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000163543
電子館藏
1圖書
電子書
EB HV6773 .C994 2018 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-319-97181-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入