This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, publication of state secrets, and DNA usage.
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can ...
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breaches, to engage in cybercrime and fraud. Using data from multiple English and Russian language web forums, the authors identify the range of products sold in these active on-line marketplaces and the prospective profits earned by these actors. The social organization of these markets is analysed using sociological theory to understand the sophistication of the markets. Social network analyses of the relational networks of participants are also...
This book examines the practices of cybercriminals who steal and sell personal information acquired through various means, including mass data breache...
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights problem, has likewise changed in the digital age. Through an investigation into our increasingly and ever-normalised digital lives, this study analyses the rise of technology-facilitated sexual assault, revenge pornography, online sexual harassment and gender-based hate speech. Drawing on ground-breaking research into the nature and extent of...
This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for...
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK.
This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen a...
Based on this hybrid nature of hacktivism, Karagiannopoulos proceeds to offer a critique of the current responses towards such practices and their potential for preserving the positive elements, whilst mitigating the risks and harms involved in such political practices.
Based on this hybrid nature of hacktivism, Karagiannopoulos proceeds to offer a critique of the current responses towards such practices and their pot...
Drawing together established deviance theories, Respectable Deviance and Purchasing Medicine Online considers the construction of online medicine purchasing, the justifications presented to challenge how it is labelled, and how the behaviour is managed to show how the framing of risks and deviance is challenged online.
Drawing together established deviance theories, Respectable Deviance and Purchasing Medicine Online considers the construction of online medicine purc...
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can be carried out. In studying these matters, the book examines the privacy issues raised by the NSA, publication of state secrets, and DNA usage.
This book lays out the foundation of a privacy doctrine suitable to the cyber age. It limits the volume, sensitivity, and secondary analysis that can ...