Open Source Intelligence and Cyber Crime [[electronic resource] ] : Social Media Analytics / / edited by Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (V, 251 p. 88 illus., 69 illus. in color.) |
Disciplina | 327.1202854678 |
Collana | Lecture Notes in Social Networks |
Soggetto topico |
Computer security
Computational intelligence Sociophysics Econophysics Computer crimes Data mining Machine learning Systems and Data Security Computational Intelligence Data-driven Science, Modeling and Theory Building Cybercrime Data Mining and Knowledge Discovery Machine Learning |
ISBN | 3-030-41251-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns -- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation -- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web -- Chapter4. Protecting the Web from Misinformation -- Chapter5. Social Media for Mental Health: Data, Methods, and Findings -- Chapter6. Twitter Bots and the Swedish Election -- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study -- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter -- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums. |
Record Nr. | UNINA-9910413437003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Open Source Intelligence Investigation [[electronic resource] ] : From Strategy to Implementation / / edited by Babak Akhgar, P. Saskia Bayerl, Fraser Sampson |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (302 pages) : illustrations (some color) |
Disciplina | 327.1202854678 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Data mining Computer crimes Application software International criminal law System safety Systems and Data Security Data Mining and Knowledge Discovery Cybercrime Computer Appl. in Social and Behavioral Sciences International Criminal Law Security Science and Technology |
ISBN | 3-319-47671-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1: Introduction -- OSINT as an integral part of the national security apparatus.- Open Source Intelligence and the protection of national security -- Police use of Open Source Intelligence: The longer arm of law -- OSINT as part of the strategic national security landscape -- Taking stock of subjective narratives around modern OSINT -- Part 2: Methods, Tools and Techniques.-Acquisition and preparation of data for OSINT investigations -- Analysis, interpretation and validation of open source data -- OSINT and the dark web -- Fusion of OSINT and non-OSINT data -- A framework for assessing OSINT tools.-Design considerations for OSINT tools and processes.- Part 3: Practical Application and Cases -- A new age of Open Source Investigation: International examples -- Use cases and best practices for LEAs -- OSINT in the context of cyber-security -- Combatting cybercrime and sexual exploitation of children: An open source toolkit.-Identifying illegal cartel activities using open source intelligence.- Part 4: Legal Considerations -- Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism -- Following the breadcrumbs: Using Open Source Intelligence as evidence in criminal proceedings. |
Record Nr. | UNINA-9910158705203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Organised Crime Groups involved in Fraud [[electronic resource] /] / by Tiggey May, Bina Bhardwa |
Autore | May Tiggey |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 |
Descrizione fisica | 1 online resource (XVII, 140 p. 2 illus.) |
Disciplina | 364.163 |
Collana | Crime Prevention and Security Management |
Soggetto topico |
Organized crime
Commercial crimes Crime prevention Police Computer crimes Organized Crime Financial Crime Crime Prevention Policing Cybercrime |
ISBN | 3-319-69401-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. What do We Know about Organised Crime and Fraud? -- 3. Routes into Fraud and Organised Criminality -- 4. The Nature and Structure of Organised Crime Groups Involved in Fraud -- 5. Cops and 21st Century Robbers -- 6. Concluding Thoughts. |
Record Nr. | UNINA-9910300048703321 |
May Tiggey | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Palgrave Handbook of International Cybercrime and Cyberdeviance [[electronic resource]] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 |
Descrizione fisica | 1 online resource (Approx. 1225 p.) |
Disciplina | 364.168 |
Soggetto topico |
Computer crimes
Data protection Public safety Criminal behavior Forensic psychology Technology—Sociological aspects Cybercrime Security Crime Control and Security Criminal Behavior Forensic Psychology Science and Technology Studies |
ISBN | 3-319-90307-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foundations of Technology Use/Abuse and the Criminal Justice System -- Defining cybercrime -- Historical evolutions of Cybercrime: From Computer Crime to Cybercrime -- Legislative frameworks in dealing with cybercrime -- The USA -- The UK -- The EU Convention on Cybercrime -- Asia -- Cybersecurity as an industry -- Technology use, abuse, and public perceptions of cybercrime -- Cyberwarfare and nation-state threats -- The interplay of police and extralegal organizations to combat cybecrime -- Forensic evidence and cybercrime -- Organized Crime and Cybercrime -- The Dark Web as a Platform For Crime -- Criminological Theory and Cybercrime -- Social Learning -- Subcultural Theory -- The General Theory of Crime -- General Strain Theory and Cybercrime -- Digital Drift -- Space Transition Theory -- Routine Activities -- Rational Choice -- Deterrence -- Psychological theories and cybercrime (Cyberpsychology) -- Internet Addiction and Cybercrime -- Critical Theories and Cybercrime -- Cyber-Tresspass -- Computer Hacking and the Hacker Subculture -- Insider Threats, Outsiders, and Nation-States -- Global Voices in Hacking (Multi-national views) -- Hactivism and Cause Based Hackers -- Malicious software threats -- Cybercrime as service operations -- Cyber-Deception and Theft -- Data Breaches and Carding -- Social Engineering -- Identity Theft and Identity Crimes: Global Perspectives -- Romance Scams -- Nigerian Email Schemes -- Phishing and Financial Manipulation -- Digital Piracy as a Social Problem -- Legal Responses to Piracy -- Counterfeiting Products Online -- Cyber-Porn/Obscenity -- Historical Challenges of Technology and Pornographic Content -- Sexual Subcultures and On-line Spaces -- Dating and sexual relationships in the age of the Internet -- Sexting and Social Concerns -- Zoophilia -- BDSM and the Internet Age -- Child Pornography and Child Sexual Exploitation Frameworks -- The Rise of Sex Trafficking On-Line -- Camming and Capping -- Cyber-Violence -- Cyberbulling -- Online Harassment -- Cyberstalking -- Intimate Partner Violence and the Internet: Perspectives -- Technological Facilitation of Gang Activity and Violence -- Hate Speech in Online Spaces -- The Role of Technology in Facilitating Terror and Extremism on and offline -- Suicidal Ideation and Online Platforms -- Cyberwarfare as realized conflict -- Theorizing The Future of Cybercrime -- Criminal Social Networks and the Internet -- Police Legitimacy in the Age of the Internet -- Transforming Punishment as a Function of Technology -- The Rise of Cyberwarriors in Nation-State Relationships -- The Future of Criminological Theory and Cybercrime -- Technological Adoption and Cybercrimes. |
Record Nr. | UNINA-9910349373303321 |
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Palgrave International Handbook of School Discipline, Surveillance, and Social Control [[electronic resource] /] / edited by Jo Deakin, Emmeline Taylor, Aaron Kupchik |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 |
Descrizione fisica | 1 online resource (XIX, 603 p. 5 illus., 1 illus. in color.) |
Disciplina | 371.5 |
Soggetto topico |
Crime—Sociological aspects
Juvenile delinquents Computer crimes Educational sociology Educational policy Education and state Educational technology Crime and Society Youth Offending and Juvenile Justice Cybercrime Sociology of Education Educational Policy and Politics Educational Technology |
ISBN | 3-319-71559-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299868003321 |
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Policing Sexual Offences and Sex Offenders [[electronic resource] /] / by Terry Thomas |
Autore | Thomas Terry <1946-> |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Pivot, , 2016 |
Descrizione fisica | 1 online resource (IX, 116 p.) |
Disciplina | 363.23 |
Collana | Palgrave Studies in Risk, Crime and Society |
Soggetto topico |
Criminology
Crime—Sociological aspects Communication Sex (Psychology) Computer crimes Crime Control and Security Crime and Society Media and Communication Psychology of Gender and Sexuality Cybercrime |
ISBN | 1-137-53239-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Part I -- Chapter 2. Reporting and Recording Sexual Offences -- Chapter 3. The Police Investigation of Reports -- Chapter 4. The Police Investigation of Reports: The National Level -- Part II -- Chapter 5. International Policing -- Chapter 6. The Police Management of Sexual Offenders -- Chapter 7. The Police Collection and Dissemination of Information on Sexual Offenders -- Chapter 8. Conclusions. |
Record Nr. | UNINA-9910255191903321 |
Thomas Terry <1946-> | ||
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Pivot, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy, Data Protection and Cybersecurity in Europe [[electronic resource] /] / edited by Wolf J. Schünemann, Max-Otto Baumann |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 145 p. 2 illus.) |
Disciplina | 320.94 |
Soggetto topico |
European Union
Mass media Law Computer crimes Computer security Democracy Law—Europe European Union Politics IT Law, Media Law, Intellectual Property Cybercrime Systems and Data Security European Law |
ISBN | 3-319-53634-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction: Privacy, data protection and cybersecurity in Europe -- Part 1: Fundamental issues of privacy and data protection -- Chapter 2: Spain – The right to be forgotten -- Chapter 3: Harvesting social media for journalistic purposes in the UK -- Part 2: Discourses on cybersecurity and data protection in comparative perspective -- Chapter 4: Analysing the French discourse about “surveillance and data protection“ in the context of the NSA scandal -- Chapter 5: Solving the surveillance problem -- Chapter 6: The unshaken role of GCHQ -- Chapter 7: The ambiguous relation between privacy and security in German cyber politics -- Part 3: Europeanisation – centre and periphery -- Chapter 8: Protecting or processing? -- Chapter 9: Lithuania and Romania to introduce cybersecurity laws. |
Record Nr. | UNINA-9910255279503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media [[electronic resource] ] : Cyber Science 2023; 03–04 July; University of Aalborg, Copenhagen, Denmark / / edited by Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, Hanan Hindy, Martin Gilje Jaatun |
Autore | Onwubiko Cyril |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (410 pages) |
Disciplina | 530.1 |
Altri autori (Persone) |
RosatiPierangelo
RegeAunshul ErolaArnau BellekensXavier HindyHanan JaatunMartin Gilje |
Collana | Springer Proceedings in Complexity |
Soggetto topico |
System theory
Artificial intelligence Cooperating objects (Computer systems) Computer crimes Security systems Blockchains (Databases) Complex Systems Artificial Intelligence Cyber-Physical Systems Cybercrime Security Science and Technology Blockchain |
ISBN | 981-9969-74-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section 1: Data Science and Artificial Intelligence -- Section 2: Blockchain, Cyber Threat Intel and Malware Analysis -- Section 3: Cybersecurity, Usability and Ethics -- Section 4: Regional and National Cybersecurity -- Section 5: Critical Infrastructure Cybersecurity -- Section 6: Cybersecurity Research and Innovation -- Section 7: Cyber Fraud, Privacy and Education -- Section 8: Extended Abstracts. |
Record Nr. | UNINA-9910838274903321 |
Onwubiko Cyril | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Quest to Cyber Superiority [[electronic resource] ] : Cybersecurity Regulations, Frameworks, and Strategies of Major Economies / / by Nir Kshetri |
Autore | Kshetri Nir |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXIV, 240 p. 2 illus. in color.) |
Disciplina | 338.926 |
Soggetto topico |
Economic policy
Computer crimes Computer security International relations Mass media Law Political economy R & D/Technology Policy Cybercrime Systems and Data Security International Relations IT Law, Media Law, Intellectual Property International Political Economy |
ISBN | 3-319-40554-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Global Cybersecurity: Key Issues and Concepts -- The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data -- Cybersecurity in National Security and International Relations -- Cybersecurity’s Effects on International Trade and Investment -- Cybersecurity in the USA -- Cybersecurity in European Union Economies -- Cybersecurity in China -- Cybersecurity in India -- Cybersecurity in Japan -- Cybersecurity in South Korea -- Cybersecurity in Gulf Cooperation Council Economies -- Cybersecurity in Brazil -- Cybersecurity in Russia -- Lessons Learned, Implications and the Way Forward. |
Record Nr. | UNINA-9910254888203321 |
Kshetri Nir | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Resilience of Cyber-Physical Systems [[electronic resource] ] : From Risk Modelling to Threat Counteraction / / edited by Francesco Flammini |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (237 pages) |
Disciplina | 006.22 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer security Computer crimes Quality control Reliability Industrial safety Management information systems Security Systems and Data Security Cybercrime Quality Control, Reliability, Safety and Risk Business IT Infrastructure |
ISBN | 3-319-95597-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Complex, Resilient and Smart Systems -- Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems -- A Comprehensive Framework for the Security Risk Management of Cyber-Physical Systems -- Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components -- Quantitative Evaluation of the Efficacy of Defence-in-Depth in Critical Infrastructures -- A Model-Driven and Generative Approach to Holistic Security with C-IME -- Multi-Range Decoy I/O Defense of Electrical Substations against Industrial Control System Malware -- Flood Resilience of a Water Distribution System -- A Non-Parametric Cumulative Sum Approach for Online Diagnostics of Cyber Attacks to Nuclear Power Plants. |
Record Nr. | UNINA-9910337573703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|