Cybercrime Through an Interdisciplinary Lens
Herausgeber: Holt, Thomas
Cybercrime Through an Interdisciplinary Lens
Herausgeber: Holt, Thomas
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
Andere Kunden interessierten sich auch für
Mike R. KnetzgerPolice Use of Force Through the Lens178,99 €
William A NogueraThrough the Lens of a Monster13,99 €
An Introduction to Criminal Justice (Second Edition)157,99 €
Rebuilding Crime Prevention Through Environmental Design168,99 €
Mark HalseyGenerations Through Prison54,99 €
Gail SuperGoverning through Crime in South Africa177,99 €
Angi M. ChristensenForensic Anthropology70,99 €-
-
-
Bringing together international experts, this book offers an interdisciplinary approach to cybercrime, explores a range of issues from cybersecurity to hacking to fraud, and lays out frameworks for collaboration between different fields.
Produktdetails
- Produktdetails
- Verlag: Routledge
- Seitenzahl: 266
- Erscheinungstermin: 13. Dezember 2016
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 567g
- ISBN-13: 9781138668836
- ISBN-10: 1138668834
- Artikelnr.: 47329501
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Routledge
- Seitenzahl: 266
- Erscheinungstermin: 13. Dezember 2016
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 567g
- ISBN-13: 9781138668836
- ISBN-10: 1138668834
- Artikelnr.: 47329501
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Thomas J. Holt is an Associate Professor in the School of Criminal Justice at Michigan State University, USA.
1. Situating the Problem of Cybercrime in a Multidisciplinary Context,
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
1. Situating the Problem of Cybercrime in a Multidisciplinary Context,
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe
Thomas J. Holt
2. The Evolution of Cybercrime, 2006-2016, Peter Grabosky
3. Cybercrime Research at the Crossroads: Where the Field Currently Stands
and Innovative Strategies to Move Forward, Adam M. Bossler
4. Conducting Large-Scale Analyses of Underground Hacker Communities,
Victor Benjamin, Sagar Samtani and Hsinchun Chen
5. The Evolving Nature of Nation State: Malicious Online Actor
Relationships, Max Kilger
6. Exploring the possibility of 'moral hazard' among victims of identity
fraud: The relation between reimbursement for unauthorized cash withdrawals
and risky online behavior, Johan van Wilsem
7. Ransomware and Cryptocurrency: Partners in Crime, Gail-Joon Ahn, Adam
Doupe, Ziming Zhao and Kevin Liao
8. Organizational Cybervictimization: Data Breach Prevention Using a
Victimological Approach, Mark Stockman, Joseph Nedelec and William Mackey
9. Sanction Threat and Friendly Persuasion Effects on System Trespassers'
Behaviors During a System Trespassing Event, Hattie Jones, David Maimon and
Wuling Ren
10. Gendering cybercrime, Alice Hutchings and Yi Ting Chua
11. Seeing the Forest Through the Trees: Identifying Key Players in the
Online Distribution of Child Sexual Exploitation Material, Bryce G.
Westlake and Richard Frank
12. Adaptation Strategies of Cyber Criminals to Interventions from Public
and Private Sectors, Floor Jansen and Jarmo van Lenthe







