New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1st Edition

  • Maurice Dawson
  • Published By:
  • ISBN-10: 1466683465
  • ISBN-13: 9781466683464
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 305 Pages | eBook
  • Original Copyright 2015 | Published/Released January 2016
  • This publication's content originally published in print form: 2015

  • Price:  Sign in for price



Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. NEW THREATS AND COUNTERMEASURES IN DIGITAL CRIME AND CYBER TERRORISM brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series.
Titles in this Series.
Editorial Advisory Board.
Table of Contents.
Detailed Table of Contents.
1: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism.
2: Mobile Devices: The Case for Cyber Security Hardened Systems.
3: Security Threats on Mobile Devices.
4: The Human Factor in Mobile Phishing.
5: Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks.
6: Legal Issues: Security and Privacy with Mobile Devices.
7: Survey in Smartphone Malware Analysis Techniques.
8: Trust Management in Mobile Ad Hoc Networks for QoS Enhancing.
9: Insider Threats: Detecting and Controlling Malicious Insiders.
10: Authorship Analysis: Techniques and Challenges.
11: The Need for a Dualist Application of Public and Private Law in Great Britain Following the Use of “Flame Trolling” During the 2011 UK Riots: A Review and Model.
12: Native Language Identification (NLID) for Forensic Authorship Analysis of Weblogs.
13: The Critical Need for Empowering Leadership Approaches in Managing Health Care Information Security Millennial Employees in Health Care Business and Community Organizations.
14: Learning Management Systems: Understand and Secure Your Educational Technology.
15: The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business Workforce.
16: Communication, Technology, and Cyber Crime in Sub-Saharan Africa.
Related References.
Compilation of References.
About the Contributors.