You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there has been a significant rise in criminals seeking to exploit these tools for their nefarious gain. Countries all over the world are seeing substantial increases in identity theft and cyberattacks, as well as illicit transactions, including drug trafficking and human trafficking, being made through the dark web internet. Sex offenders and murderers explore unconventional methods of finding and contacting their victims through Facebook, Instagram, popular dating sites, etc., while pedophiles rely on these channels to obtain information an...
This book contains a broad spectrum of carefully researched articles dealing with IT-Security: the proceedings of the DeepSec InDepth Security conference, an annual event well known for bringing together the world's most renowned security professionals from academics, government, industry, and the underground hacking community. In cooperation with the Magdeburger Institut für Sicherheitsforschung (MIS) we publish selected articles covering topics of past DeepSec conferences. The publication offers an in-depth description which extend the conference presentation and includes a follow-up with updated information. Carefully picked, these proceedings are not purely academic, but papers written by people of practice, international experts from various areas of the IT-Security zoo. You find features dealing with IT-Security strategy, the social domain as well as with technical issues, all thoroughly researched and hyper contemporary. We want to encourage individuals, organizations and countries to meet and exchange, to improve overall security, understanding and trust. We try to combine hands-on practice with scientific approach. This book is bringing it all together.
This volume constitutes the refereed and revised post-conference proceedings of the 7th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2022, held in Kristiansand, Norway, in October 2022. The 23 full papers presented were carefully reviewed and selected from 33 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The papers are categorized in the following topical subheadings: strategic disaster risk reduction; situational awareness; telecommunications, sensors and drones; collaborative emergency management; cybersecurity and privacy; earthquake and climate forecasting; social media analytics; community resilience.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
Der Tagungsband dokumentiert die Beiträge der gleichnamigen Sicherheitskonferenz, die an der Donau-Universität Krems, Zentrum für Infrastrukturelle Sicherheit, durchgeführt wird. Der Tagungsband des Jahres 2018 widmet sich aktuellen Herausforderungen rund um das Thema „Digital Disorder – Digitale Unordnung: Cybercrime und der Faktor Mensch“.
Seit 2006 werden in Österreich Fälle von Cybercrime in der amtlichen Kriminalstatistik erfasst. Im Rahmen eines Forschungsprojektes wurden die Fälle der letzten zehn Jahre (2006 – 2016) näher analysiert. Dazu wurde eine Aktenanalyse beim Wiener Straflandesgericht durchführt, die das Ziel hatte Täter- und Opferprofile, typische Tathergänge, erfolgreiche Ermittlungswege sowie die Bewertung der Taten durch das Gericht näher zu untersuchen.
Die Autorin befasst sich aus einer interdisziplinären Perspektive mit dem Phänomen der seit der Kölner Silvesternacht 2015/2016 vielerorts neu entstandenen Bürgerwehren. Sie vermittelt nicht nur neues kriminologisches (Grundlagen-)Wissen über deutsche Bürgerwehren, sondern verortet dieses auch im Gesamtkomplex aktueller Entwicklungen. Wissenschaftlich betrachtet geht es dabei um die Frage nach der Bedeutung abweichenden Verhaltens für die Kriminologie im Allgemeinen.
Können bisherige kriminologische Theorien und Erkenntnisse auf die Regeln des digitalen Raumes übertragen werden? Dieses Buch vereint Beiträge von Autoren aus verschiedenen Bereichen der Kriminologie und anderen Kriminalwissenschaften, die dieser wichtigen Frage aus unterschiedlichen Perspektiven nachgehen. Damit zeichnet dieses Buch aktuelle Entwicklungen im Bereich digitaler Delikte und digitaler Polizeiarbeit nach und untersucht, inwiefern kriminologische Phänomene und Ansätze im digitalen Raum neu begriffen und gestaltet werden müssen im Sinne einer eigenen Cyberkriminologie.
This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2017, the 36th International Conference on Computer Safety, Reliability, and Security, held in Trento, Italy, in September 2017. The 38 revised full papers presented together with 5 introductory papers to each workshop, and three invited papers, were carefully reviewed and selected from 49 submissions. This year's workshops are: ASSURE 2017 – Assurance Cases for Software-Intensive Systems; DECSoS 2017 – ERCIM/EWICS/ARTEMIS Dependable Embedded and Cyber-Physical Systems and Systems-of-Systems; SASSUR 2017 – Next Generation of System Assurance Approaches for Safety-Critical Systems; TIPS 2017 – Timing Performance in Safety Engineering; TELERISE 2017 Technical and legal Aspects of Data Privacy and Security.