Combatting Cybercrime and Cyberterrorism (eBook)

Challenges, Trends and Priorities

Babak Akhgar, Ben Brewster (Herausgeber)

eBook Download: PDF
2016 | 1st ed. 2016
XII, 323 Seiten
Springer International Publishing (Verlag)
978-3-319-38930-1 (ISBN)

Lese- und Medienproben

Combatting Cybercrime and Cyberterrorism -
Systemvoraussetzungen
90,94 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues.

Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT.

This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.



Babak Akhgar is Professor of Informatics and Director of CENTRIC (Centre of excellence in terrorism, resilience, intelligence and organised crime research). Babak has more than 100 referred publications on security, OSINT, counter terrorism and cybercrime. He is principal investigator and technical lead in several multimillion Euros international security initiatives.  He has co-edited two books on intelligence management - Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organised Crime, and Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Prof Akhgar latest books are titled Cyber Crime and Cyber Terrorism, An investigators handbook and Application of Big Data for National Security are published by Elsevier. In addition to his scholarly activities, Prof Akhgar is trustee of Police National Legal Database (PNLD), board member of European Organisation for Security and member of SAS UK academic board.

Ben Brewster is a researcher within the Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research (CENTRIC) Institute at Sheffield Hallam University. He has a primary research interest in the application of Information Systems and Knowledge Management by law enforcement and security agencies. Ben is currently studying towards a PhD triangulating these interests in relation to their application in intelligence-led initiatives to combat Human Trafficking. Furthermore, he has experience working on a range of multi-disciplinary security focused research projects, including the EU FP7 funded ePOOLICE project focusing the on the use of text analytics and information retrieval tools to support open-source environmental horizon scanning to enable the early detection, pursuit and prevention of organised crime, the EU funded COURAGE project seeking to define a research agenda for Cybercrime and Cyberterrorism, and the DG-Home Affairs funded UINFC2 project centred around user engagement in response to the illegal use of the internet for the purposes of child exploitation. 

Babak Akhgar is Professor of Informatics and Director of CENTRIC (Centre of excellence in terrorism, resilience, intelligence and organised crime research). Babak has more than 100 referred publications on security, OSINT, counter terrorism and cybercrime. He is principal investigator and technical lead in several multimillion Euros international security initiatives.  He has co-edited two books on intelligence management – Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organised Crime, and Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies. Prof Akhgar latest books are titled Cyber Crime and Cyber Terrorism, An investigators handbook and Application of Big Data for National Security are published by Elsevier. In addition to his scholarly activities, Prof Akhgar is trustee of Police National Legal Database (PNLD), board member of European Organisation for Security and member of SAS UK academic board.Ben Brewster is a researcher within the Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research (CENTRIC) Institute at Sheffield Hallam University. He has a primary research interest in the application of Information Systems and Knowledge Management by law enforcement and security agencies. Ben is currently studying towards a PhD triangulating these interests in relation to their application in intelligence-led initiatives to combat Human Trafficking. Furthermore, he has experience working on a range of multi-disciplinary security focused research projects, including the EU FP7 funded ePOOLICE project focusing the on the use of text analytics and information retrieval tools to support open-source environmental horizon scanning to enable the early detection, pursuit and prevention of organised crime, the EU funded COURAGE project seeking to define a research agenda for Cybercrime and Cyberterrorism, and the DG-Home Affairs funded UINFC2 project centred around user engagement in response to the illegal use of the internet for the purposes of child exploitation. 

Part 1- Approaching Cybercrime and Cyberterrorism Research.- Megatrends and Grand Challenges of Cybercrime and Cyberterrorism Policy and Research.- Towards a Systematic View on CC/CT Ecology.- Mapping Stakeholder Challenges.- A methodology for Cybersecurity road mapping.- Part 2- Legal, Ethical and Privacy Considerations.- Data Protection Law Compliance for CC/CT Research.- Risks of Illegal Discrimination by Research on CC/CTRisks of Illegal Discrimination by Research on CC/CT.- Risks of Including Illegal Content in CC/CT Research.- Part 3- Technologies, Scenarios and Best Practices.- Cybercrime Costs, No Measure, No Solution.- Towards CC/CT Research Agenda development - identifying the technical challenges and the missing solutions.- The Never-ending Game of Cyberattack Attribution.- Emerging cyber security: bio-inspired techniques and MITM detection in IoT.- Cyber Situational testing.- Part 4- Policy Development and Roadmaps for CC/CT Research.- How the evolution of workforces influences cybercrime strategies.- Public-Private Partnership approaches to CC/ CT.- Are we doing all the right things to counter cybercrime?.- CC/ CT Taxonomy & comprehensive Research Roadmap.

Erscheint lt. Verlag 27.5.2016
Reihe/Serie Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications
Zusatzinfo XII, 323 p. 36 illus.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern Strafrecht
Technik Bauwesen
Schlagworte Cyber Law • cyber law enforcement agencies • digital security policy • digital security practice • EU FP7 ePOOLICE • European perspective on cybercrime • Information Security • organised digital crime
ISBN-10 3-319-38930-0 / 3319389300
ISBN-13 978-3-319-38930-1 / 9783319389301
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 11,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99