| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910813342803321 |
|
|
Titolo |
Corporate crime : contemporary debates / / edited by Frank Pearce and Laureen Snider |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Toronto, [Ontario] ; ; Buffalo, [New York] ; ; London, [England] : , : University of Toronto Press, , 1995 |
|
©1995 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-282-04570-9 |
9786612045707 |
1-4426-7348-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (443 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Corporations - Corrupt practices |
Commercial crimes |
Livres numeriques. |
Conference papers and proceedings. |
e-books. |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Based on the conference, Corporate crime: ethics, law and the state, held Nov. 12-14, 1992. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Regulating capitalism / Frank Pearce and Laureen Snider -- Corporate crime and Republican criminological praxis / John Braithwaite -- Should we prosecute corporations and/or individuals? / Gilbert Geis and Joseph Dimento -- Feminism, law, and the pharmaceutical industry / Patricia Peppin -- Preliminary observations on strains of, and strains in, corporate law scholarship / Harry Glasbeek -- Corporate crime and new organizational forms / Steve Tombs -- Management, morality, and law : organizational forms and ethical deliberations / Peter Cleary Yeager -- Loosely coupled systems and unlawful behaviour : organization theory and corporate crime / Carl Keane -- Serious fraud in Britain : criminal justice versus regulation / Michael Levi -- Saving the savings and loans? U.S. government response to financial crime / Kitty Calavita and Henry N. Pontell -- Public policy towards individuals |
|
|
|
|
|
|
|
|
|
|
|
involved in competition-law offences in Canada / W.T. Stanbury -- And defeat goes on : an assessment of third-wave health and safety regulation / Eric Tucker -- Regulating work in a capitalist society / Charles Noble -- Judgments of legitimacy regarding occupational health and safety / Vivienne Walters [and others] -- Environmental harm and corporate crime / Robert Paehlke -- Can confrontation, negotiation, or socialization solve the Superfund enforcement dilemma? / Harold C. Barnett -- Controlling corporate misconduct through regulatory offences : the Canadian experience / Kernaghan Webb -- Due process and the Nova Scotia herbicide trial / Colin Goff. |
|
|
|
|
|
|
Sommario/riassunto |
|
Corporate crime inflicts massive harm on employees, consumers, workplaces, economies, and the environment, but there are inadequate controls and few deterrent mechanisms, and sanctions are mild relative to the harm done. There is little agreement on remedies and praxis, reflecting an underlying diversity of opinion on the causes of corporate criminality. Corporate Crime is a collection of original papers by many of the world's leading experts on corporate crime, and covers its causes, extent, and control. It provides discussions of all the major areas of corporate criminal conduct, looking at the relationship between corporate structure and corporate crime. It opens up debate on appropriate control strategies to deter perpetrators and minimize harm. The discussions centre around strategies to control the social, economic, and political costs of various kinds of corporate crime - within the corporate organization and the fields of finance, occupational health and safety, and environmental degradation. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910829064003321 |
|
|
Autore |
Shimonski Robert |
|
|
Titolo |
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, Massachusetts : , : Syngress, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (258 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic intelligence |
Internet in espionage |
Cyber intelligence (Computer security) |
Internet - Security measures |
Computer crimes |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester |
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking |
|
|
|
|
|
|
|
|
|
|
|
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance |
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) |
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods |
Protect Yourself! |
|
|
|
|
|
|
Sommario/riassunto |
|
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ |
|
|
|
|
|
|
|
| |