20%
130.90
CHF104.70
Download est disponible immédiatement
This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field. As Governments, corporations, security firms, and individuals look to tomorrow's cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern.
Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups.
Due to the rapid changes in technology, cyber criminals' behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals' behaviour is evolving over time as they learn from their actions and others' experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought.
This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understandingof these motives, researchers, governments and practitioners can take effective measures to tackle cybercrime and reduce victimization.
Auteur
Professor Hamid Jahankhani gained his PhD from the Queen Mary College, University of London. In 1999 he moved to the University of East London (UEL) to become the first Professor of Information Security and Cyber Criminology at the university in 2010. Over the last 15 years Hamid has also been involved in developing new and innovative programmes and introducing block mode delivery approach at UEL, including MSc Information Security and Computer Forensics, Professional Doctorate Information Security.
Hamid's principal research area for a number of years has been in the field of cyber security, information security and digital forensics. In partnership with the key industrial sectors, he has examined and established several innovative research projects that are of direct relevance to the needs of UK and European information security, digital forensics industries, Critical National Infrastructure and law enforcement agencies. Hamid has planned, proposed and managed several collaborative projects, and secured a substantial research income of up to £6m.
Professor Jahankhani is the Editor-in-Chief of the International Journal of Electronic Security and Digital Forensics, and International Journal of Electronic democracy, both published by Inderscience and general chair of the annual International Conference on Global Security, Safety and Sustainability (ICGS3). Hamid has edited and contributed to over 15 books and has over 150 conference and journal publications together with Various BBC radio interviews. Hamid has supervised to completion 13 PhD and professional doctorate degree students and overseen 67 PhD students progressing. In summer 2017 Hamid was trained as the GCHQ cyberist to train the next generation of cyber security experts through GCHQ CyberFirst initiative.
Contenu
Foreword; Lord A. Carlile of Berriew CBE QC.- Cyber Criminology and Psychology.- Crime and Social Media: Legal responses to offensive online communications and abuse; O. Sallavaci et al.- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories; L.J. Stalans, C.M. Donner.- Cyberaggression and Cyberbullying: Widening the Net; J.M. Hyland et al.- Part 2 Cyber-Threat Landscape.- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments; R. Montasari et al.- The Dark Web; P.L. Dordal.- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio.- A New Scalable Botnet Detection Method in the Frequency Domain; G. Bottazzi et al.- Part 3 Cybercrime Detection.- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques; S. Pournouri et al.- Criminal Data Mining, Threat Analysis and Prediction; M. Farsi et al.- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al.- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes; Z.A. Alhaboby et al.- An Investigator's Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices; J.A. Sherer et al.- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media; I. Mitchell et al.- Part 4 Education, Training and Awareness in Cybercrime Prevention.- An examination into the effect of early education on cyber security awareness within the U.K.; T. Brittan, H. Jahankhani.- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service; H. Forouzan, H. Jakhankhani.- Combating Cyber Victimisation: Cybercrime Prevention; A.Abdalla et al.- Information security landscape in Vietnam: insights from two research surveys; M. Nkhoma et al.