Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Abuse And Crime Involving Computers (K.4.1...)  
 
Options:
 
  1-10 of 93 Reviews about "Abuse And Crime Involving Computers (K.4.1...)": Date Reviewed
  Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G.  ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article

In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants to continue t...

Aug 24 2021
  Cybersecurity in Nigeria: a case study of surveillance and prevention of digital crime
Iorliam A.,  Springer International Publishing, New York, NY, 2019. 72 pp. Type: Book (978-3-030152-09-3)

Many of us have received a message from a “Nigerian prince” or a supposed “friend” in Nigeria. The first one involves an inheritance that the scammer needs to give out right away; in the second, said friend is asking for he...

Feb 11 2021
  Hack for hire
Mirian A.  Queue 17(4): 41-60, 2019. Type: Article

Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable target for hackers...

Jan 29 2020
  Website replica detection with distant supervision
Carvalho C., Moura E., Veloso A., Ziviani N.  Information Retrieval 21(4): 253-272, 2018. Type: Article

Detecting duplicate web pages is of great importance for search engines. This is because duplicates are very costly to index. The work of Carvalho et al. advances the technology for detecting web page duplicates, with the potential to improve sear...

Jan 18 2019
   Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (4 of 4)

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists, but also b...

Sep 14 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (3 of 4)

We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs and behaviors ...

Jul 16 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (2 of 4)

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, with evidence dating back ...

Jul 12 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M.,  ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (1 of 4)

Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not always true,...

Jul 11 2018
  Guide to digital forensics: a concise and practical introduction
K√§vrestad J.,  Springer International Publishing, New York, NY, 2017. 147 pp. Type: Book (978-3-319674-49-0)

Guide to digital forensics is designed as a 145-page introductory textbook or an overview for practitioners. The author is Swedish, but the concepts are universal....

Apr 5 2018
  Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
Winkler I., Gomes A.,  Syngress Publishing, Cambridge, MA, 2016. 260 pp. Type: Book (978-0-128093-16-0)

The idea is simple (you just have to accept it): any cybersecurity defense that you may build to protect your organization will (eventually) fail. Period. The optimal way to proceed beyond that simple fact is to anticipate it by design, and build ...

Jan 12 2018
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy