The Pivot explores bystander intervention and image-based sexual abuse. It fills a critical gap in the market on a significant and contemporary legal, social, public health, and criminal justice issue. It is timely in light of a number of recent high...Lasīt vairāk
The Pivot explores bystander intervention and image-based sexual abuse. It fills a critical gap in the market on a significant and contemporary legal, social, public health, and criminal justice issue. It is timely in light of a number of recent high...Lasīt vairāk
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019. Information and communications techn...Lasīt vairāk
This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019. Information and communications techn...Lasīt vairāk
This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the th...Lasīt vairāk
This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the th...Lasīt vairāk
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities. It offers a broad overview of the best of research in this area, including research contrib...Lasīt vairāk
This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities. It offers a broad overview of the best of research in this area, including research contrib...Lasīt vairāk
This book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. Cybersecurity is increasingly seen as essential yet it is also a point of contention between citizens, states, non-go...Lasīt vairāk
This book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. Cybersecurity is increasingly seen as essential yet it is also a point of contention between citizens, states, non-go...Lasīt vairāk
This book explores the discrimination encountered and propagated by individuals in online environments. The editors develop the concept of online othering as a tool through which to analyse and make sense of the myriad toxic and harmful behaviours...Lasīt vairāk
This book explores the discrimination encountered and propagated by individuals in online environments. The editors develop the concept of online othering as a tool through which to analyse and make sense of the myriad toxic and harmful behaviours...Lasīt vairāk
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention. With contributions from a wide range of European countries...Lasīt vairāk
This book brings together an international group of experts to present the latest psychosocial and developmental criminological research on cyberbullying, cybervictimization and intervention. With contributions from a wide range of European countries...Lasīt vairāk
This book focuses on the phenomenon of hacktivism and how it has been dealt with up to now in the United States and the United Kingdom. After discussing the birth of the phenomenon and the various relevant groups, from Electronic Disturbance Theater...Lasīt vairāk
This book focuses on the phenomenon of hacktivism and how it has been dealt with up to now in the United States and the United Kingdom. After discussing the birth of the phenomenon and the various relevant groups, from Electronic Disturbance Theater...Lasīt vairāk
This is a unique interdisciplinary exploration of the contemporary phenomenon of online medicine purchasing. In this research, Sugiura provides a criminological understanding of the sale of online medicines as well as the traditional illegal markets....Lasīt vairāk
This is a unique interdisciplinary exploration of the contemporary phenomenon of online medicine purchasing. In this research, Sugiura provides a criminological understanding of the sale of online medicines as well as the traditional illegal markets....Lasīt vairāk
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit ( UCRU), directed by Dr Tim Owen at the University of Central Lancashire, UK. This book offers up-to-date perspectives on Cybercrime......Lasīt vairāk
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit ( UCRU), directed by Dr Tim Owen at the University of Central Lancashire, UK. This book offers up-to-date perspectives on Cybercrime......Lasīt vairāk
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights problem,...Lasīt vairāk
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights problem,...Lasīt vairāk
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web foru...Lasīt vairāk
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, p...Lasīt vairāk