Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Social Issues (K.4.2) > Abuse And Crime Involving Computers (K.4.2...)  
  1-10 of 24 Reviews about "Abuse And Crime Involving Computers (K.4.2...)": Date Reviewed
  Man-made women: the sexual politics of sex dolls and sex robots
Richardson K., Odlind C., Palgrave Macmillan, New York, NY, 2023. 212 pp.  Type: Book (3031193806)

People with unconventional or even perverse desires sometimes search for alternatives to real human beings. This has led to the development of sex dolls and sex robots, referred to as “man-made women” in this book. However alarming, th...

Mar 21 2024
  A practical guide to digital forensics investigations (2nd ed.)
Hayes D., Pearson, Boston, MA, 2021. 677 pp.  Type: Book (978-7-897599-18-3)

Digital forensics has gained much interest in recent decades. Computing devices are widespread and used for countless applications. As a result, a huge number of digital traces can be fetched, analyzed, and, in case of a crime, used as...

Jul 28 2021
  The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy
Bancroft A., Palgrave Macmillan, Cham, Switzerland, 2020. 235 pp.  Type: Book (978-3-030265-11-3)

“In situations where crime is a value or reward in itself, breaking the law is its own incentive. Crime then can be situationally rational, motivated and meaningful.” Lecturer and researcher Angus Bancroft, with suc...

Feb 25 2021
  Terrorism online: politics, law and technology
Jarvis L., Macdonald S., Chen T., Routledge, New York, NY, 2015. 224 pp.  Type: Book (978-0-415732-88-8), Reviews: (2 of 2)

Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, is attributed with the creation of the term “cyberterrorism” in 1997. He defines it as the convergence of cybernet...

Nov 2 2016
  Terrorism online: politics, law and technology
Jarvis L., Macdonald S., Chen T., Routledge, New York, NY, 2015. 224 pp.  Type: Book (978-0-415732-88-8), Reviews: (1 of 2)

Some might assert that the next wave of terrorism will be digital, precisely the topic of this collection of materials from a “Multidisciplinary Conference in Terrorism” held in the UK....

Apr 21 2016
  Fraud and financial crime detection model using malware forensics
Kim A., Kim S., Park W., Lee D. Multimedia Tools and Applications 68(2): 479-496, 2014.  Type: Article

Fraud involving financial services transactions is on the rise. There are multiple reasons fraud is increasingly a concern. First, the volume of transactions is growing by double digits annually and the transaction volume is huge. In 2...

Nov 12 2014
  Overcoming the insider: reducing employee computer crime through situational crime prevention
Willison R., Siponen M. Communications of the ACM 52(9): 133-137, 2009.  Type: Article

Situational crime prevention (SCP) is a criminological theory, proposed by Ronald Clarke in the 1980s and developed over the last 30 years, that focuses on the crime event rather than the criminal. A number of highly effective crime pr...

Nov 2 2009
  Web psychos, stalkers, and pranksters
Banks M., Coriolis Group Books, Scottsdale, AZ, 1997.  Type: Book (9781576101377)

According to the blurb, the author of this prophylactic approach to the Internet for new users “has logged more than 30,000 hours online since 1979,” which works out to an average of about 4.5 hours a day. Banks has...

Nov 1 1997
  A gift of fire
Baase S., Prentice-Hall, Inc., Upper Saddle River, NJ, 1997.  Type: Book (9780134587790)

Baase has written an excellent, comprehensive book that covers many of the social, legal, and ethical issues associated with computing. It is designed as a textbook for either computer science or the social sciences. However, it gives ...

Sep 1 1997
  Halting the hacker
Pipkin D., Prentice-Hall, Inc., Upper Saddle River, NJ, 1997.  Type: Book (9780132437189)

Never in the history of computing has there been such a great opportunity for hackers to gain access to computers. This book is designed to give systems and security managers insight into the minds of hackers and to provide the tools t...

Sep 1 1997
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy