Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Social Issues (K.4.2) > Abuse And Crime Involving Computers (K.4.2...)  
 
Options:
 
  1-10 of 73 Reviews about "Abuse And Crime Involving Computers (K.4.2...)": Date Reviewed
   Financial regulatory and risk management challenges stemming from firm-specific digital misinformation
Casey K., Casey K.  Journal of Data and Information Quality 11(1): 1-4, 2019. Type: Article

In today’s digital economy, it is easy to alter the essence of information with regards to both context and value; thus, the potential for misinformation is huge. With this paper, Casey and Casey excellently present a new risk management app...

Sep 30 2021
  A practical guide to digital forensics investigations (2nd ed.)
Hayes D.,  Pearson, Boston, MA, 2021. 677 pp. Type: Book (978-7-897599-18-3)

Digital forensics has gained much interest in recent decades. Computing devices are widespread and used for countless applications. As a result, a huge number of digital traces can be fetched, analyzed, and, in case of a crime, used as evidence. <...

Jul 28 2021
  The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy
Bancroft A.,  Palgrave Macmillan, Cham, Switzerland, 2020. 235 pp. Type: Book (978-3-030265-11-3)

“In situations where crime is a value or reward in itself, breaking the law is its own incentive. Crime then can be situationally rational, motivated and meaningful.” Lecturer and researcher Angus Bancroft, with such simple yet deep ob...

Feb 25 2021
  Cybersecurity in Nigeria: a case study of surveillance and prevention of digital crime
Iorliam A.,  Springer International Publishing, New York, NY, 2019. 72 pp. Type: Book (978-3-030152-09-3)

Many of us have received a message from a “Nigerian prince” or a supposed “friend” in Nigeria. The first one involves an inheritance that the scammer needs to give out right away; in the second, said friend is asking for he...

Feb 11 2021
  A framework for a forensically sound harvesting the dark web
Popov O., Bergman J., Valassi C.  CECC 2018 (Proceedings of the Central European Cybersecurity Conference 2018, Ljubljana, Slovenia,  Nov 15-16, 2018) 1-7, 2018. Type: Proceedings

Popov et al. go inside the dark web ecosystem to find more practical and more effective ways of making digital evidence within the invisible Internet infrastructure. Most people who have heard the term “dark web” don’t really kno...

Feb 21 2019
  Move fast and break things: how Facebook, Google, and Amazon cornered culture and undermined democracy
Taplin J.,  Little, Brown & Co. Inc., Boston, MA, 2017. 320 pp. Type: Book (978-0-316275-77-4)

Since the turn of the 21st century, traditional newspaper and music industry revenues have fallen dramatically, with similar drops in film, television, and general print media companies. Traditional media’s spectacular falls in revenue are i...

Nov 12 2018
  Detecting cooperative and organized spammer groups in micro-blogging community
Dang Q., Zhou Y., Gao F., Sun Q.  Data Mining and Knowledge Discovery 31(3): 573-605, 2017. Type: Article

Public relations (PR) companies hire and pay cooperative and organized spammer groups to post specific content on online microblogging sites, such as Twitter, to influence public opinion or trending topics (topic hijacking). Detecting such spammer...

Jan 4 2018
  Terrorism online: politics, law and technology
Jarvis L., Macdonald S., Chen T.,  Routledge, New York, NY, 2015. 224 pp. Type: Book (978-0-415732-88-8), Reviews: (2 of 2)

Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, is attributed with the creation of the term “cyberterrorism” in 1997. He defines it as the convergence of cybernetics and terrorism [1...

Nov 2 2016
  Terrorism online: politics, law and technology
Jarvis L., Macdonald S., Chen T.,  Routledge, New York, NY, 2015. 224 pp. Type: Book (978-0-415732-88-8), Reviews: (1 of 2)

Some might assert that the next wave of terrorism will be digital, precisely the topic of this collection of materials from a “Multidisciplinary Conference in Terrorism” held in the UK....

Apr 21 2016
  Fraud and financial crime detection model using malware forensics
Kim A., Kim S., Park W., Lee D.  Multimedia Tools and Applications 68(2): 479-496, 2014. Type: Article

Fraud involving financial services transactions is on the rise. There are multiple reasons fraud is increasingly a concern. First, the volume of transactions is growing by double digits annually and the transaction volume is huge. In 2012, e-comme...

Nov 12 2014
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy