Cyber Criminology (eBook)

Hamid Jahankhani (Herausgeber)

eBook Download: PDF
2018 | 1st ed. 2018
X, 357 Seiten
Springer International Publishing (Verlag)
978-3-319-97181-0 (ISBN)

Lese- und Medienproben

Cyber Criminology -
Systemvoraussetzungen
139,09 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides a comprehensive overview of the current and emerging challenges of cyber criminology, victimization and profiling. It is a compilation of the outcomes of the collaboration between researchers and practitioners in the cyber criminology field, IT law and security field.

As Governments, corporations, security firms, and individuals look to tomorrow's cyber security challenges, this book provides a reference point for experts and forward-thinking analysts at a time when the debate over how we plan for the cyber-security of the future has become a major concern.

Many criminological perspectives define crime in terms of social, cultural and material characteristics, and view crimes as taking place at a specific geographic location. This definition has allowed crime to be characterised, and crime prevention, mapping and measurement methods to be tailored to specific target audiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups.

Due to the rapid changes in technology, cyber criminals' behaviour has become dynamic, making it necessary to reclassify the typology being currently used. Essentially, cyber criminals' behaviour is evolving over time as they learn from their actions and others' experiences, and enhance their skills. The offender signature, which is a repetitive ritualistic behaviour that offenders often display at the crime scene, provides law enforcement agencies an appropriate profiling tool and offers investigators the opportunity to understand the motivations that perpetrate such crimes. This has helped researchers classify the type of perpetrator being sought.

This book offers readers insights into the psychology of cyber criminals, and understanding and analysing their motives and the methodologies they adopt. With an understanding of these motives, researchers, governments and practitioners can take effective measures to tackle cybercrime and reduce victimization.



Professor Hamid Jahankhani gained his PhD from the Queen Mary College, University of London. In 1999 he moved to the University of East London (UEL) to become the first Professor of Information Security and Cyber Criminology at the university in 2010. Over the last 15 years Hamid has also been involved in developing new and innovative programmes and introducing 'block mode' delivery approach at UEL, including MSc Information Security and Computer Forensics, Professional Doctorate Information Security.

Hamid's principal research area for a number of years has been in the field of cyber security, information security and digital forensics. In partnership with the key industrial sectors, he has examined and established several innovative research projects that are of direct relevance to the needs of UK and European information security, digital forensics industries, Critical National Infrastructure and law enforcement agencies. Hamid has planned, proposed and managed several collaborative projects, and secured a substantial research income of up to £6m.

Professor Jahankhani is the Editor-in-Chief of the International Journal of Electronic Security and Digital Forensics, and International Journal of Electronic democracy, both published by Inderscience and general chair of the annual International Conference on Global Security, Safety and Sustainability (ICGS3). Hamid has edited and contributed to over 15 books and has over 150 conference and journal publications together with Various BBC radio interviews. Hamid has supervised to completion 13 PhD and professional doctorate degree students and overseen 67 PhD students progressing. In summer 2017 Hamid was trained as the GCHQ 'cyberist' to train the next generation of cyber security experts through GCHQ CyberFirst initiative.

Professor Hamid Jahankhani gained his PhD from the Queen Mary College, University of London. In 1999 he moved to the University of East London (UEL) to become the first Professor of Information Security and Cyber Criminology at the university in 2010. Over the last 15 years Hamid has also been involved in developing new and innovative programmes and introducing “block mode” delivery approach at UEL, including MSc Information Security and Computer Forensics, Professional Doctorate Information Security. Hamid’s principal research area for a number of years has been in the field of cyber security, information security and digital forensics. In partnership with the key industrial sectors, he has examined and established several innovative research projects that are of direct relevance to the needs of UK and European information security, digital forensics industries, Critical National Infrastructure and law enforcement agencies. Hamid has planned, proposed and managed several collaborative projects, and secured a substantial research income of up to £6m. Professor Jahankhani is the Editor-in-Chief of the International Journal of Electronic Security and Digital Forensics, and International Journal of Electronic democracy, both published by Inderscience and general chair of the annual International Conference on Global Security, Safety and Sustainability (ICGS3). Hamid has edited and contributed to over 15 books and has over 150 conference and journal publications together with Various BBC radio interviews. Hamid has supervised to completion 13 PhD and professional doctorate degree students and overseen 67 PhD students progressing. In summer 2017 Hamid was trained as the GCHQ “cyberist” to train the next generation of cyber security experts through GCHQ CyberFirst initiative.

Foreword; Lord A. Carlile of Berriew CBE QC.- Cyber Criminology and Psychology.- Crime and Social Media: Legal responses to offensive online communications and abuse; O. Sallavaci et al.- Explaining Why Cybercrime Occurs: Criminological and Psychological Theories; L.J. Stalans, C.M. Donner.- Cyberaggression and Cyberbullying: Widening the Net; J.M. Hyland et al.- Part 2 Cyber-Threat Landscape.- Policies, Innovative Self-Adaptive Techniques and Understanding Psychology of Cybersecurity to Counter Adversarial Attacks in Network and Cyber Environments; R. Montasari et al.- The Dark Web; P.L. Dordal.- Tor black markets: economics characterization and investigation technique; G. Me, L. Pesticcio.- A New Scalable Botnet Detection Method in the Frequency Domain; G. Bottazzi et al.- Part 3 Cybercrime Detection.- Predicting the Cyber Attackers; a Comparison of Different Classification Techniques; S. Pournouri et al.- Criminal Data Mining, Threat Analysis and Prediction; M. Farsi et al.- SMERF: Social Media, Ethics & Risk Framework; I. Mitchell et al.- Understanding the cyber-victimisation of people with long term conditions and the need for collaborative forensics-enabled Disease Management Programmes; Z.A. Alhaboby et al.- An Investigator’s Christmas Carol - Past, Present, and Future Law Enforcement Agency Data Mining Practices; J.A. Sherer et al.- DaPA: Deconstruct and Preserve for all: A Procedure for the Preservation of Digital Evidence on Solid State Drives and Traditional Storage Media; I. Mitchell et al.- Part 4 Education, Training and Awareness in Cybercrime Prevention.- An examination into the effect of early education on cyber security awareness within the U.K.; T. Brittan, H. Jahankhani.- An examination into the level of training, education and awareness among frontline police officers in tackling cybercrime within the Metropolitan Police Service; H. Forouzan, H. Jakhankhani.- Combating Cyber Victimisation: Cybercrime Prevention; A.Abdalla et al.- Information security landscape in Vietnam: insights from two research surveys; M. Nkhoma et al.

Erscheint lt. Verlag 27.11.2018
Reihe/Serie Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications
Zusatzinfo X, 357 p. 72 illus., 41 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern Strafrecht
Technik Bauwesen
Schlagworte Big Data • Cloud Computing • Crime Detection • criminal data mining • cybercrime justice models • Cybercrime mapping • cybercrime policing • cyber profiling • Cyber threat intelligence • Cyber victimization • data protection • digital forensics • internet of things • Open Source Intelligence • Profiling cybercriminals • threat analysis and prediction
ISBN-10 3-319-97181-6 / 3319971816
ISBN-13 978-3-319-97181-0 / 9783319971810
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99