Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, 1st Edition

  • Maria Manuela Cruz-Cunha
  • Published By:
  • ISBN-10: 1466663251
  • ISBN-13: 9781466663251
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 675 Pages | eBook
  • Original Copyright 2014 | Published/Released December 2015
  • This publication's content originally published in print form: 2014

  • Price:  Sign in for price



In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Table of Contents

Front Cover._x000D_
Title Page._x000D_
Copyright Page._x000D_
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series._x000D_
Titles in this Series._x000D_
Editorial Advisory Board._x000D_
List of Contributors._x000D_
Table of Contents._x000D_
Detailed Table of Contents._x000D_
Cybercrimes Examples, Risks, and Threats._x000D_
1: Cyber Attacks on Critical Infrastructure: Review and Challenges._x000D_
2: Raptor: Early Recognition and Elimination of Network Attacks._x000D_
3: Online Violence: Listening to Children's Online Experiences._x000D_
4: Development and Mitigation of Android Malware._x000D_
5: Answering the New Realities of Stalking._x000D_
6: Cyberbullying: Keeping Our Children Safe in the 21st Century._x000D_
7: DNA Databases for Criminal Investigation._x000D_
8: Composition of the Top Management Team and Information Security Breaches._x000D_
9: Hijacking of Clicks: Attacks and Mitigation Techniques._x000D_
10: Fighting Cybercrime and Protecting Privacy: DDoS, Spy Software, and Online Attacks._x000D_
Cyber Security Approaches and Developments._x000D_
11: Privacy Compliance Requirements in Workflow Environments._x000D_
12: Forensic Readiness and eDiscovery._x000D_
13: Cybercrimes Technologies and Approaches._x000D_
14: Cyber-Crimes against Adolescents: Bridges between a Psychological and a Design Approach._x000D_
15: Event Reconstruction: A State of the Art._x000D_
16: Indirect Attribution in Cyberspace._x000D_
17: Modern Crypto Systems in Next Generation Networks: Issues and Challenges._x000D_
18: Automatic Detection of Cyberbullying to Make Internet a Safer Environment._x000D_
19: A Taxonomy of Browser Attacks._x000D_
20: Defending Information Networks in Cyberspace: Some Notes on Security Needs._x000D_
21: Network Situational Awareness: Sonification and Visualization in the Cyber Battlespace._x000D_
22: Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?._x000D_
Legal Aspects and ICT Law._x000D_
23: The Gatekeepers of Cyberspace: Surveillance, Control, and Internet Regulation in Brazil._x000D_
24: Surveillance, Privacy, and Due Diligence in Cybersecurity: An International Law Perspective._x000D_
25: A Routine Activity Theory-Based Framework for Combating Cybercrime._x000D_
26: Internet of Things: The Argument for Smart Forensics._x000D_
27: Sticks and Stones Will Break My Euros: The Role of EU Law in Dealing with Cyber-Bullying through Sysop-Prerogative._x000D_
28: Trolling Is Not Just a Art. It Is an Science: The Role of Automated Affective Content Screening in Regulating Digital Media and Reducing Risk of Trauma._x000D_
Case Studies._x000D_
29: Honeypots and Honeynets: Analysis and Case Study._x000D_
30: Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries._x000D_
31: Cyber Security Model of Artificial Social System Man-Machine._x000D_
32: Information Disclosure on Social Networking Sites: An Exploratory Survey of Factors Impacting User Behaviour on Facebook._x000D_
Compilation of References._x000D_
About the Contributors._x000D_