Front Cover._x000D_
Title Page._x000D_
Copyright Page._x000D_
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series._x000D_
Titles in this Series._x000D_
Editorial Advisory Board._x000D_
List of Contributors._x000D_
Table of Contents._x000D_
Detailed Table of Contents._x000D_
Preface._x000D_
Acknowledgment._x000D_
Cybercrimes Examples, Risks, and Threats._x000D_
1: Cyber Attacks on Critical Infrastructure: Review and Challenges._x000D_
2: Raptor: Early Recognition and Elimination of Network Attacks._x000D_
3: Online Violence: Listening to Children's Online Experiences._x000D_
4: Development and Mitigation of Android Malware._x000D_
5: Answering the New Realities of Stalking._x000D_
6: Cyberbullying: Keeping Our Children Safe in the 21st Century._x000D_
7: DNA Databases for Criminal Investigation._x000D_
8: Composition of the Top Management Team and Information Security Breaches._x000D_
9: Hijacking of Clicks: Attacks and Mitigation Techniques._x000D_
10: Fighting Cybercrime and Protecting Privacy: DDoS, Spy Software, and Online Attacks._x000D_
Cyber Security Approaches and Developments._x000D_
11: Privacy Compliance Requirements in Workflow Environments._x000D_
12: Forensic Readiness and eDiscovery._x000D_
13: Cybercrimes Technologies and Approaches._x000D_
14: Cyber-Crimes against Adolescents: Bridges between a Psychological and a Design Approach._x000D_
15: Event Reconstruction: A State of the Art._x000D_
16: Indirect Attribution in Cyberspace._x000D_
17: Modern Crypto Systems in Next Generation Networks: Issues and Challenges._x000D_
18: Automatic Detection of Cyberbullying to Make Internet a Safer Environment._x000D_
19: A Taxonomy of Browser Attacks._x000D_
20: Defending Information Networks in Cyberspace: Some Notes on Security Needs._x000D_
21: Network Situational Awareness: Sonification and Visualization in the Cyber Battlespace._x000D_
22: Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?._x000D_
Legal Aspects and ICT Law._x000D_
23: The Gatekeepers of Cyberspace: Surveillance, Control, and Internet Regulation in Brazil._x000D_
24: Surveillance, Privacy, and Due Diligence in Cybersecurity: An International Law Perspective._x000D_
25: A Routine Activity Theory-Based Framework for Combating Cybercrime._x000D_
26: Internet of Things: The Argument for Smart Forensics._x000D_
27: Sticks and Stones Will Break My Euros: The Role of EU Law in Dealing with Cyber-Bullying through Sysop-Prerogative._x000D_
28: Trolling Is Not Just a Art. It Is an Science: The Role of Automated Affective Content Screening in Regulating Digital Media and Reducing Risk of Trauma._x000D_
Case Studies._x000D_
29: Honeypots and Honeynets: Analysis and Case Study._x000D_
30: Analysis of the Cybercrime with Spatial Econometrics in the European Union Countries._x000D_
31: Cyber Security Model of Artificial Social System Man-Machine._x000D_
32: Information Disclosure on Social Networking Sites: An Exploratory Survey of Factors Impacting User Behaviour on Facebook._x000D_
Compilation of References._x000D_
About the Contributors._x000D_
Index._x000D_