Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Abuse And Crime Involving Computers (K.4.1...)  
 
Options:
 
  1-10 of 42 Reviews about "Abuse And Crime Involving Computers (K.4.1...)": Date Reviewed
  Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019.  Type: Article

In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants t...

Aug 24 2021
  Hack for hire
Mirian A. Queue 17(4): 41-60, 2019.  Type: Article

Email accounts usually include large amounts of sensitive information, including passwords for other accounts, financial information, contacts’ information, business exchanges, and so on. Consequently, they make a valuable ta...

Jan 29 2020
   Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (4 of 4)

The basis of deception is misdirection: it amounts to making something insignificant seem important, while really relevant things go unnoticed. This strategy is used not only by spammers, crackers, cyber criminals, and cyber terrorists...

Sep 14 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (3 of 4)

We are living in a very digitally connected world. An unwanted consequence is that each one of us who uses a computer, smartphone, tablet, or even smart TV could be targeted by individuals or groups who want to influence our beliefs an...

Jul 16 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (2 of 4)

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, wi...

Jul 12 2018
  Deception in the digital age: exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp.  Type: Book (978-0-124116-30-6), Reviews: (1 of 4)

Psychology and sociology may be surpassing technology as the key to online deception. This book reminds me of the old adage that access through personal interaction is often more effective than other techniques in espionage. While not ...

Jul 11 2018
  Handbook of biometrics for forensic science
Tistarelli M., Champod C., Springer International Publishing, New York, NY, 2017. 369 pp.  Type: Book (978-3-319506-71-5)

Biometric samples have been used in forensic examinations for decades. However, this book is a compilation of efforts by several groups to systematize the union of the two sciences into a body of knowledge to be used, in concert, for c...

Jun 22 2017
  Combatting cybercrime and cyberterrorism: challenges, trends and priorities
Akhgar B., Brewster B., Springer International Publishing, New York, NY, 2016. 306 pp.  Type: Book (978-3-319389-29-5)

Cybercrime investigations are different from traditional crime investigation, requiring in-depth technical expertise and large-scale cross-jurisdictional effort. In May 2016, a well-organized group of 100 in Tokyo used stolen South Afr...

Oct 13 2016
  Automated inference of past action instances in digital investigations
James J., Gladyshev P. International Journal of Information Security 14(3): 249-261, 2015.  Type: Article

The role of computers in forensics is expanding, since so much crime uses electronic devices. Developing support mechanisms for digital investigation is the need of the hour. However, a great number of lacunae exist in devising suitabl...

Apr 12 2016
  Social media as a tool for social movements in Arab Spring countries
Hamza K.  ICEGOV 2014 (Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, Guimaraes, Portugal, Oct 27-30, 2014) 71-74, 2014.  Type: Proceedings

In approximately three fact-packed pages, the author discusses the impact of social media on the Arab Spring. This is a quick and very informative read for anyone interested in the reciprocal relationship between social media and socia...

Apr 14 2015
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy