New Arrivals: HV 6629 - HV 6773.9199
Showing 1 - 13 of 13 new items.
-
© 2017,The world has changed drastically over the past decade. The Internet has had a huge part in that, as it has made the world more accessible to anyone of any age, race, or gender. Used for entertainment, education, shopping, dating and more, the internet has provided a whole new virtual world for everyone to enjoy. But with the good also comes the bad and for kids and teens these days, the bad has becomes a constant threat from cyberbullies and cyberstalking. J. A. Hitchcock began to have an interest in cyberstalking and cyberbullies in 1996 when she blew the whistle on a literary agency scam. They stole her identity and began posting messages online pretending to be her; and that was only the beginning of a barrage of threats. When she contacted local police they had never had an internet-related case and couldn t help her, so she taught herself how to track down online criminals, how to handle the situation, and how to stay safer online. After 10 years of being a victim, her cyberstalkers were brought to justice. Unfortunately, not all internet crime stories end with a happy ending. Really, anyone of any age can become the target of a cyberbully. And quite honestly, victims are getting younger and younger every year when it comes to being cyberbullied. Throughout Cyberbullying and the Wild, Wild Web, Hitchcock explains how someone can become victim to cyberbullying and how they can stay safer online. Offering victims, and parents, the chance to be able to relate to and truly understand the unfortunate reality of cyberbullying through real-life examples of what happened to someone who had been through a similar situation. For much-needed practical advice, from an expert who truly understands the threat of cybercrime, this is a must-have resource to combat the ever-growing problem of internet crime in our society."
-
© 2017,The Violence of Hate, Fourth Edition presents a systematic introduction to issues related to the sociology and social psychology of hate and violence as they target people who are different in socially significant ways. It offers an integrated perspective on the causes and consequences of hate-motivated violence and the reasons we have not always been effective in stopping it. Not only do the authors address the experiences of racial, ethnic, and religious groups under attack, but also those who are victimized because of their sexual orientation, gender, gender-identity, age, or disability status. In addition, they include a chapter dedicated solely to the exploration of hate crimes, an evolving legal concept and public policy domain, as well as a chapter in which they suggest approaches that may be effectively applied collectively to the reduction of hate violence. As in earlier versions of The Violence of Hate, Levin and Nolan take the position that support for hate-motivated violence originates not in the ranting and raving of a few bigoted extremists at the margins of society but in the tacit approval of ordinary, even decent, people who are located squarely in the mainstream. Updates to the Fourth Edition: .Chapter 1: New discussions of structural and cultural factors illustrated by the racial conflicts in Ferguson Missouri, New York City, and Baltimore. New presentation of the recent ADL survey indicating degree of bigotry in more than 100 countries. New discussion of how threatening situations inspire increases in hate violence against a range of vulnerable groups. .Chapter 2: New chapter on hate violence around the world involving the experiences of Roma in Europe, sexual orientation and gender identity violence, and anti-Semitic and anti-Islamic violence in European countries. Includes discussions of violent responses to anti-Mohammed cartoons in Europe and North America, sectarian violence in Northern Ireland and the Middle East, and police versus the black community in the United States. .Chapter 3: Updated discussion of issues related to reporting hate incidents and collecting hate crime data. Expanded presentation of hate crime laws at the federal and state levels. New discussions of the problems associated with policing hate and the role of social media in spreading hate. .Chapter 4: New section on mass murder in the name of hate, including the Sikh Temple massacre outside of Milwaukee, the Charleston Black Church massacre, Baumhammer s killing spree targeting immigrants, Jews, and non-whites in the Pittsburgh area, Taylor s killing spree targeting whites, and black church burnings in the 1990s and 2015. New discussion of thrill hate crimes against the homeless, people with disabilities, and gays. Features: .Uses a single conceptual framework to explore racism in American society, and the historical occurrence of anti-Semitism, with special emphasis on Nazi Germany. .The experiences of other groups, such as Armenians massacred in 1915 and gay students victimized by violence, are also examined to provide a broad comparative perspective. .Shows the economic and psychological benefits of hate, making it an expected, even rational, behavior. .Examines the evolution of hate crime legislation in the United States and the impact of this legislation on the institutions of law and criminal justice. .Shows how prejudice and hate can be addressed locally, but have an impact globally. .The final chapter argues that respect for differences requires rebellious and even deviant behavior."
-
© 2016,A Ponzi scheme is one of the simplest, albeit effective, financial frauds to engineer, and new schemes keep coming forward. Despite this, however, people continue to invest in them. How are we to account for the seemingly never-ending lure of such schemes
-
© 2014,Each title in the highly acclaimed Opposing Viewpoints series explores a specific issue by placing expert opinions in a unique pro/con format; the viewpoints are selected from a wide range of highly respected and often hard-to-find publications.; This title addresses various issues related to hacking and hackers, including ways to combat hacking; if hacktivism is a serious threat; the significance of WikiLeaks; and the role of government in hacking.; "Each volume in the Opposing Viewpoints Series could serve as a model...not only providing access to a wide diversity of opinions, but also stimulating readers to do further research for group discussion and individual interest. Both shrill and moderate, th
-
© 2014,Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of "cyber blockades" and presents a unique comparison of blockade operations in five different domains -- on land, at sea, in the air, in space, and in cyberspace -- identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare.
-
© 2014,As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcementOCOs response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system. "
-
© 2015,NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER One of the world's leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you--and how this makes everyone more vulnerable than ever imagined. Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims' every move. We all know today's criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that's just the beginning. To date, no computer has been created that could not be hacked--a sobering fact given our radical dependence on these machines for everything from our nation's power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today's Internet is the size of a golf ball, tomorrow's will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car's brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology's tremendous power for the betterment of humanity--before it's too late.
-
© 2014,How is hate engendered, and what causes hatred to manifest as criminal behavior? " Hate Crime in the Media: A History" considers how in America, perceived threats on national, physical, and/or personal space have been created by mediated understandings of different peoples, and describes how these understandings have then played out in hate crimes based on ethnicity, religious identity, or sexual identity. The work reveals the origins of hate in American culture found in the media; political rhetoric; the entertainment industry, including national sports; and the legal system. Each chapter addresses historical questions of representation and documents the response to those considered intruders. The book also examines trends in hate crimes, the resulting changes in our legal code, and the specific victims of hate crimes.
-
© 2014,George Washington may never have told a lie, but he may be the only person#151;our history is littered with liars, deceivers, fraudsters, counterfeiters, and unfaithful lovers.nbsp; The Encyclopaedia of Liars and Deceivers nbsp;gathers 150 of them, each entry telling the intriguing tale of the liar's motives and the people who fell for the lies. nbsp; To collect these stories of deceit, Roelf Bolt travels from ancient times to the present day, documenting a huge assortment of legerdemain: infamous quacks, fraudulent scientists, crooks who committed #147;pseudocides" by faking their own deaths, and forgers of artworks, design objects, archaeological finds, and documents. From false royal claims, fake dragon's eggs, and bogus perpetual motion machines to rare books, mermaid skeletons, and Stradivari violins, Bolt reveals that almost everything has been forged or faked by someone at some point in history. His short, accessible narratives in each entry offer biographies and general observations on specific categories of deceit, and Bolt captures an impressive number of famous figures#151;including Albert Einstein, Cicero, Ptolemy, Ernest Hemingway, François Mitterand, and Marco Polo#151;as well as people who would have remained anonymous had their duplicity not come to light. nbsp; Funny, shocking, and even awe-inspiring, the stories of deception in this catalog of shame makenbsp; The Encyclopaedia of Liars and Deceiversnbsp; the perfect gift for all those who enjoy a good tall tale#151;and those people who like to tell them.
-
© 2013,Combating white-collar crime is a challenge as these criminals are found among the most powerful members of society, including politicians, business executives, and government officials. While there are many approaches to understanding this topic, Policing White-Collar Crime: Characteristics of White-Collar Criminals highlights the importance of police intelligence in confronting these crimes and criminals and focuses on the identification, retrieval, storage, and application of information resources. Combining theory with case examples of some of the most notorious criminal enterprises in recent years, the book explores: White-collar crime typologies and characteristics The roles and structure in a white-collar crime enterprise Sociological perspectives on why women are substantially less involved in white-collar crime Why chief executives are vulnerable to the lure of white-collar crime Characteristics of victims who fall prey to these crimes Theoretically based yet practitioner-oriented, this book offers a unique study of the contingent approach to policing white-collar criminalsemphasizing the essential elements of information management strategy, knowledge management strategy, information technology strategy, and value configuration in law enforcement. By implementing the techniques presented in this volume, law enforcement organizations can better develop and implement detection and prevention methods. This effective use of the critical element of police intelligence is a powerful tool for circumventing the tactics of white-collar criminals.
-
© 2013,Cyber crime is one of the main threats to the digital economy. From insider threats to complex distributed attacks and industrial worms, modern business faces unprecedented challenges. Cyber security and digital intelligence are the necessary responses to this challenge, yet they are understood by only a tiny minority of users and decision makers.In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards. He focuses on how cyber crime has evolved and the nature of the very latest threats and confronts issues that have yet to be addressed by codified rules and practice guidelines. His book is supported by over 30 illustrations and many valuable tables, with non-technical explanations of how cyber attacks are executed, avoided and controlled.
-
© 2013,This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.