Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Computers And Society (K.4)
>
Public Policy Issues (K.4.1)
> Abuse And Crime Involving Computers (K.4.1...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 42 Reviews about "
Abuse And Crime Involving Computers (K.4.1...)
":
Date Reviewed
Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article
In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants t...
Aug 24 2021
Hack for hire
Mirian A. Queue 17(4): 41-60, 2019. Type: Article
Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...
Jan 29 2020
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (4 of 4)
The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists...
Sep 14 2018
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (3 of 4)
We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs an...
Jul 16 2018
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (2 of 4)
The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...
Jul 12 2018
Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6), Reviews: (1 of 4)
Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not ...
Jul 11 2018
Handbook of biometrics for forensic science
Tistarelli M., Champod C., Springer International Publishing, New York, NY, 2017. 369 pp. Type: Book (978-3-319506-71-5)
Biometric samples have been used in forensic examinations for decades. However, this book is a compilation of efforts by several groups to systematize the union of the two sciences into a body of knowledge to be used, in concert, for c...
Jun 22 2017
Combatting cybercrime and cyberterrorism: challenges, trends and priorities
Akhgar B., Brewster B., Springer International Publishing, New York, NY, 2016. 306 pp. Type: Book (978-3-319389-29-5)
Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group of 100 in Tokyo used stolen South Afr...
Oct 13 2016
Automated inference of past action instances in digital investigations
James J., Gladyshev P. International Journal of Information Security 14(3): 249-261, 2015. Type: Article
The role of computers in forensics is expanding, since so much crime uses electronic devices. Developing support mechanisms for digital investigation is the need of the hour. However, a great number of lacunae exist in devising suitabl...
Apr 12 2016
Social media as a tool for social movements in Arab Spring countries
Hamza K. ICEGOV 2014 (Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, Guimaraes, Portugal, Oct 27-30, 2014) 71-74, 2014. Type: Proceedings
In approximately three fact-packed pages, the author discusses the impact of social media on the Arab Spring. This is a quick and very informative read for anyone interested in the reciprocal relationship between social media and socia...
Apr 14 2015
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy