Resolving the Gamer’s Dilemma [[electronic resource] ] : Examining the Moral and Psychological Differences between Virtual Murder and Virtual Paedophilia / / by Garry Young |
Autore | Young Garry |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016 |
Descrizione fisica | 1 online resource (V, 139 p.) |
Disciplina |
155.2
302 |
Collana | Palgrave Studies in Cyberpsychology |
Soggetto topico |
Personality
Difference (Psychology) Sex (Psychology) Computer crimes Crime—Sociological aspects Ethics Personality and Differential Psychology Psychology of Gender and Sexuality Cybercrime Crime and Society Moral Philosophy and Applied Ethics |
ISBN | 3-319-46595-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introducing the Gamer’s Dilemma -- Chapter 2. Social Convention and the Likelihood of Harm: Luck’s Initial Attempts at Resolving the Dilemma -- Chapter 3. Motivation, Discrimination and Special Status: Luck’s Further Attempts at Resolving the Dilemma -- Chapter 4. Virtual Paedophilia as child pornography and the harm done to women: Bartel’s attempt at Resolving the Dilemma -- Chapter 5. Targeting Morally Irrelevant Characteristics and the Need for Context: Further Attempts at Resolving the Dilemma -- Chapter 6. A New Approach to Resolving the Gamer’s Dilemma: Applying Constructive Ecumenical Expressivism. |
Record Nr. | UNINA-9910151857803321 |
Young Garry | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Respectable Deviance and Purchasing Medicine Online [[electronic resource] ] : Opportunities and Risks for Consumers / / by Lisa Sugiura |
Autore | Sugiura Lisa |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 |
Descrizione fisica | 1 online resource (172 pages) : illustrations |
Disciplina | 615.1 |
Collana | Palgrave Studies in Cybercrime and Cybersecurity |
Soggetto topico |
Computer crimes
Crime—Sociological aspects Criminal behavior Crime prevention Social medicine Cybercrime Crime and Society Criminal Behavior Crime Prevention Medical Sociology |
ISBN | 3-319-74485-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Introduction -- Chapter 2. Contextualising the Online Pharmaceutical Trade -- Chapter 3. Opportunities in Online Medicine Purchasing -- Chapter 4. Challenging the Risks in Online Medicine Purchasing -- Chapter 5. Conclusion. |
Record Nr. | UNINA-9910300056703321 |
Sugiura Lisa | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Rise of Extreme Porn [[electronic resource] ] : Legal and Criminological Perspectives on Extreme Pornography in England and Wales / / by Alexandros K. Antoniou, Dimitris Akrivos |
Autore | Antoniou Alexandros K |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (XIV, 369 p. 11 illus.) |
Disciplina | 363.470941 |
Soggetto topico |
Crime—Sociological aspects
Computer crimes Sex crimes Mass media and crime Violence Crime Crime and Society Cybercrime Sexual Offending Crime and the Media Violence and Crime |
ISBN | 3-319-48971-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter One: Introduction -- Chapter Two: Obscenity and Prosecution Practice in the 21st Century -- Chapter Three: The Legislative History of the s 63 Offence -- Chapter Four: The Mediatisation of the Extreme Pornography Debate -- Chapter Five: Deconstructing the Elements of the s 63 Offence -- Chapter Six: Prosecutions, Convictions and Sentencing -- Chapter Seven: CPS Case Files Review: Setting the Scene -- Chapter Eight: Thresholds of Extreme Pornography -- Chapter Nine: Conclusions. |
Record Nr. | UNINA-9910164981903321 |
Antoniou Alexandros K | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing Social Identity in Mobile Platforms [[electronic resource] ] : Technologies for Security, Privacy and Identity Management / / edited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (269 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computers and civilization
System safety Social sciences—Data processing Social sciences—Computer programs Computer crimes Biometrics (Biology) Computers and Society Security Science and Technology Computational Social Sciences Cybercrime Biometrics |
ISBN | 3-030-39489-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I – Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II – Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III – Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices. |
Record Nr. | UNINA-9910409662603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing Social Identity in Mobile Platforms [[electronic resource] ] : Technologies for Security, Privacy and Identity Management / / edited by Thirimachos Bourlai, Panagiotis Karampelas, Vishal M. Patel |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (269 pages) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computers and civilization
System safety Social sciences—Data processing Social sciences—Computer programs Computer crimes Biometrics (Biology) Computers and Society Security Science and Technology Computational Social Sciences Cybercrime Biometrics |
ISBN | 3-030-39489-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I – Mobile-based Privacy & Security -- Shared Images and Camera Fingerprinting May Lead to Privacy Issues -- Presentation Attacks in Mobile and Continuous Behavioral Biometric Systems -- Personalized Data Minimization Assurance using Bluetooth Low Energy -- Part II – Mobile-based Biometric Technologies -- On Designing a Forensic Toolkit for Rapid Detection of Factors that Impact Face Recognition Performance when Processing Large Scale Face Datasets -- Classification of Soft Biometric Traits when Matching Near-Infrared Long-range Face Images against their Visible Counterparts -- Quality and Match Performance Analysis of Band-Filtered Visible RGB Images -- Unconstrained Face Recognition using Cell Phone Devices: Faces in the Wild -- Face Detection in MWIR Spectrum -- Part III – Mobile-based Active Authentication -- Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns -- Quickest Multiple User Active Authentication -- Iris Recognition on Mobile: Real-Time Feature Extraction and Matching in the Wild -- A Protocol for Decentralized Biometric-based Self-Sovereign Identity Ecosystem -- Towards Wider Adoption of Continuous Authentication on Mobile Devices. |
Record Nr. | UNISA-996465445203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Privacy Trends in the Industrial Internet of Things [[electronic resource] /] / edited by Cristina Alcaraz |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (310 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer security
Public safety Computer crimes System safety Systems and Data Security Privacy Crime Control and Security Cybercrime Security Science and Technology |
ISBN |
9783030123307
3030123308 9783030123291 3030123294 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1. Security Analysis and Advanced Threats -- Securing industrial Control Systems -- Towards a Secure Industrial Internet of Things -- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things -- Part 2. Secure Interconnection Mechanisms -- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT -- Access Control in the Industrial Internet of Things -- A Distributed Usage Control Framework for Industrial Internet of Things -- Part 3. Advanced Protection Techniques -- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl -- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology -- Who’s there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control -- Secure Machine to Machine Communication in Industrial Internet of Things -- Part 4. Privacy Issues in Industrial Connected Networks -- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things -- Security and Privacy Techniques for the Industrial Internet of Thing -- Part 5. Application Scenarios -- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management -- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things. |
Record Nr. | UNINA-9910337843803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security by Design [[electronic resource] ] : Innovative Perspectives on Complex Problems / / edited by Anthony J. Masys |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (VI, 401 p. 115 illus., 93 illus. in color.) |
Disciplina | 658.47 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Computer crimes
System safety Computational intelligence Management information systems Computer simulation Cybercrime Security Science and Technology Computational Intelligence Software Management Simulation and Modeling |
ISBN | 3-319-78021-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden’s Concentric Ring Theory to Applegate’s Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security – designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing ‘Deliverology’ for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing. |
Record Nr. | UNINA-9910300043703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sexual violence in a digital age [[electronic resource] /] / by Anastasia Powell, Nicola Henry |
Autore | Powell Anastasia |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017 |
Descrizione fisica | 1 online resource (317 pages) : illustrations, tables |
Disciplina | 364.153 |
Collana | Palgrave Studies in Cybercrime and Cybersecurity |
Soggetto topico |
Computer crimes
Violence Crime Human rights Criminology Sex crimes Digital media Cybercrime Violence and Crime Human Rights and Crime Sexual Offending Digital/New Media |
ISBN | 1-137-58047-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part I: Power -- 1- Sexual Violence: A Feminist Criminological Analysis -- 2- Conceptualising Technosocial Sexual Harms -- Part II: Violence -- 3- Rape Culture Unveiled -- 4- Beyond ‘Revenge Pornography’ -- 5- Online Misogyny, Harassment and Hate Crimes -- Part III: Justice -- 6- The Potentials and Limitations of Law -- 7- Towards Equal Digital Citizenship -- 8- Digital Justice and Feminist Activism -- Conclusion. |
Record Nr. | UNINA-9910255273603321 |
Powell Anastasia | ||
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Cities of Today and Tomorrow [[electronic resource] ] : Better Technology, Infrastructure and Security / / by Joseph N. Pelton, Indu B. Singh |
Autore | Pelton Joseph N |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Copernicus, , 2019 |
Descrizione fisica | 1 online resource (267 pages) |
Disciplina | 307.760285 |
Soggetto topico |
Technology
Data protection Computers and civilization Regional planning Urban planning Computer organization Computer crimes Popular Science in Technology Security Computers and Society Landscape/Regional and Urban Planning Computer Systems Organization and Communication Networks Cybercrime |
ISBN | 3-319-95822-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Chapter 1: The Coming Age of the Smart City -- Chapter 2: The Challenges of Envisioning and Planning a True Smart City -- Chapter 3: The Critical Infrastructure: and Software Needed to Build Smart City -- Chapter 4: Cyber Defense in the Age of the Smart City- Chapter 5: Using Intelligent Data Analytics for Urban Planning and Design - Chapter 6:Protecting Privacy from Internet Abuses in the Smart City - Chapter 7:A 21st Century Smart City.and Mobility - Chapter 8: Smart and Safe Control Systems for the Smart City - Chapter 9: The Smart City Floating Safely on the Cloud -- Chapter 10: Challenges and Opportunities in the Evolution of the Internet of Everything - Chapter 11: Coping with the Dark Web, Cyber-Criminals and Techno-Terrorists in a Smart City -- Chapter 12: How Nations and Smart Cities Can Cope with Cyber-Terrorism and Warfare. - Chapter 13: Flexibility, Vision and Foresight in the Planning for Tomorrow's Smart City. - Chapter 14: The Smart City -- Build It and They will Come. - Glossary. - Index. |
Record Nr. | UNINA-9910768191703321 |
Pelton Joseph N | ||
Cham : , : Springer International Publishing : , : Imprint : Copernicus, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Social Network Analysis and Law Enforcement [[electronic resource] ] : Applications for Intelligence Analysis / / by Morgan Burcher |
Autore | Burcher Morgan |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 |
Descrizione fisica | 1 online resource (204 pages) |
Disciplina | 302.0722 |
Collana | Crime Prevention and Security Management |
Soggetto topico |
Police
Computer crimes Organized crime Crime prevention Terrorism Data protection Policing Cybercrime Organized Crime Crime Prevention Security |
ISBN | 3-030-47771-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction – Intelligence-Led Policing, Crime Intelligence And Social Network Analysis -- 2. Social Network Analysis In The Field Of Crime Intelligence: Historical Development, Application And Limitations -- 3. Social Network Analysis And Crime Intelligence -- 4. Social Network Analysis And The Characteristics Of Criminal Networks -- 5. Social Network Analysis And The Organisational Characteristics Of Law Enforcement Agencies: Investigative Focus -- 6. Social Network Analysis And The Organisational Characteristics Of Law Enforcement Agencies: Working Relationships -- 7. Social Network Analysis And The Organisational Characteristics Of Law Enforcement Agencies: It Software, Systems And Training -- 8. Conclusion: Social Network Analysis And The Characteristics Of Criminal Networks And Law Enforcement. . |
Record Nr. | UNINA-9910411952103321 |
Burcher Morgan | ||
Cham : , : Springer International Publishing : , : Imprint : Palgrave Macmillan, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|