The Internet offers significant possibilities for supporting the fulfillment of the 2030 Sustainable Development Agenda and advancing all human rights, including access to …
R Stoykova - Computer Law & Security Review, 2021 - Elsevier
Contemporary criminal investigation assisted by computing technology imposes challenges to the right to a fair trial and the scientific validity of digital evidence. This paper identifies …
" The purpose of this book is to introduce criminal justice and other social science students to the field of terrorism and homeland security. This book is also meant to provide a …
This study aims to consider the causality between global geopolitical risk (GPR) and technology (TEC) using the rolling window approach. The results reveal that GPR has a …
R Scrivens, G Davies, R Frank - Behavioral sciences of terrorism …, 2018 - Taylor & Francis
As violent extremists continue to surface in online discussion forums, law enforcement agencies search for new ways of uncovering their digital indicators. Researchers have both …
Homomorphic encryption, secure multi-party computation, and differential privacy are part of an emerging class of Privacy Enhancing Technologies which share a common promise: to …
Prólogo marginales». Se trata de actividades que bien no son punibles o son legales, pero que la gente sigue tratando de ocultar de los demás. Probablemente, las actividades …
As this publication explains, freedom of expression is not just a by-product of technical change; it must be protected by legal and regulatory measures that balance a variety of …
CG Reddick, AT Chatfield, PA Jaramillo - Government Information Quarterly, 2015 - Elsevier
This paper examines public opinion on National Security Agency (NSA) mass surveillance programs of Americans. A new theory, developed and tested in this paper, explicates the …