A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

OSINT in the Context of Cyber-Security

F Tabatabaei, D Wells - … Source Intelligence Investigation: From Strategy to …, 2017 - Springer
The impact of cyber-crime has necessitated intelligence and law enforcement agencies
across the world to tackle cyber threats. All sectors are now facing similar dilemmas of how …

[图书][B] Violence against women in pornography

W DeKeseredy, M Corsianos - 2015 - taylorfrancis.com
Violence against Women in Pornography illuminates the ways in which adult pornography
hurts many women, both on and off screen. A growing body of social scientific knowledge …

Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy

CM Donner, CD Marcum, WG Jennings… - Computers in Human …, 2014 - Elsevier
While technological innovations over the last thirty years have markedly improved the ways
in which people communicate and gather information, these advances have also led to …

Illicit Bitcoin transactions: challenges in getting to the who, what, when and where

ASM Irwin, AB Turner - Journal of money laundering control, 2018 - emerald.com
Purpose The purpose of this paper is to highlight the intelligence and investigatory
challenges experienced by law enforcement agencies in discovering the identity of illicit …

The use of specialized cybercrime policing units: An organizational analysis

D Willits, J Nowacki - Criminal justice studies, 2016 - Taylor & Francis
Given the increased focus and importance of cybercrime, some police agencies have turned
to the use of specialized cybercrime policing units. Research has yet to examine how …

[图书][B] Cybercrime

CD Marcum, GE Higgins - 2019 - Springer
The Internet and its affiliated technology currently dominate commerce, education, banking,
and so many other facets of our daily lives. However, with this constant use of technology …

[图书][B] Digital forensics explained

G Gogolin - 2021 - taylorfrancis.com
This book covers the full life cycle of conducting a mobile and computer digital forensic
examination, including planning and performing an investigation as well as report writing …

Policing possession of child pornography online: Investigating the training and resources dedicated to the investigation of cyber crime

CD Marcum, GE Higgins… - … Journal of Police …, 2010 - journals.sagepub.com
The internet is not a single network, limited to one specific type of information or restrictive of
the types of users who can access its information. Conversely, the internet is an …

The effect of cybercrime on open innovation policies in technology firms

V Ratten - Information Technology & People, 2019 - emerald.com
Purpose Open innovation is important for technology firms as they can use freely available
resources to source creative and innovative ideas. Despite the usefulness of open …