Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
1,221
result(s) for
"Computer crimes Social aspects."
Sort by:
Hacked
2016
Inside the life of a hacker and cybercrime culture.
Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them?
InHacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of capitalism, crime, and control.This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy.Hackedthus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect the focus from the individual to corporations, governments, and broader social issues.A compelling study,Hackedhelps us understand not just the figure of the hacker, but also digital crime and social control in our high-tech society.
The human factor of cybercrime
\"This book focuses on the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It brings together leading criminologists from around the world to consider questions about the nature of of cybercrime, and examines all facets of victimization, offending, offender networks, and policy responses\"-- Provided by publisher.
The Human Factor of Cybercrime
by
Leukfeldt, Rutger
,
Holt, Thomas J
in
Big Data
,
Computer crimes-Social aspects
,
Computer Fraud, Hacking & Viruses
2019,2020
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses.
Does the Internet increase crime?
by
Kiesbye, Stefan, edt
in
Computer crimes Juvenile literature.
,
Internet Social aspects Juvenile literature.
,
Computer crimes.
2010
Explores Internet-related sexual offenses, as well as cyberbullying, online gambling, and other manifestations of illegal activity conducted on the Internet.
Wiki at war : conflict in a socially networked world
2012,2011
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of war, diplomacy, and domestic politics.
“The war for winning dominance over social networks and using that dominance to advantage is already underway,” Carafano writes in this extremely timely analysis of the techno-future of information and the impact of social networking via the Internet. Drawing on his extensive knowledge of history and defense strategy, Carafano creates a cogent analysis of what is truly new about the “new media,” and what is simply a recasting of human warfare in contemporary forms.
Wiki at War is written in a lively, accessible style that will make this technological development comprehensible and engaging for general readers without sacrificing the book’s usefulness to specialists. Outlining the conditions under which a difference in degree becomes a difference in kind, detailing how ancient wisdom can still apply to national security decisions, and examining the conditions under which new expertise is required to wage effective diplomacy or successful military strategy, Carafano casts in stark relief the issues that face political, military, and social leaders in trying to manage and control information, in both the international and domestic arenas. Wiki at War affords stimulating thought about and definitive discussion of this vital emerging topic.
Cybercrime and digital deviance
\"Cybercrime and Digital Deviance is a work that combines insights from sociology, criminology, and computer science to explore cybercrimes such as hacking and romance scams, along with forms of cyberdeviance such as pornography addiction, trolling, and flaming. Other issues are explored including cybercrime investigations, organized cybercrime, the use of algorithms in policing, cybervictimization, and the theories used to explain cybercrime. Graham and Smith make a conceptual distinction between a terrestrial, physical environment and a single digital environment produced through networked computers. Conceptualizing the online space as a distinct environment for social interaction links this text with assumptions made in the fields of urban sociology or rural criminology. Students in sociology and criminology will have a familiar entry point for understanding what may appear to be a technologically complex course of study. The authors organize all forms of cybercrime and cyberdeviance by applying a typology developed by David Wall: cybertrespass, cyberdeception, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime. Because it is based on legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions it provides a solid foundation for deeper study. Taken together, Graham and Smith's application of a digital environment and Wall's cybercrime typology makes this an ideal upper level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity\"-- Provided by publisher.
Victims, offenders and victim-offender overlaps of knife crime: A social network analysis approach using police records
2020
Knife crime is a source of concern for the police in England and Wales, however little published research exists on this crime type. Who are the offenders who use knives to commit crime, when and why? Who are their victims, and is there a victim-offender overlap? What is the social network formation for people who are exposed to knife crime? Using a multidimensional approach, our aim is to answer these questions about one of England and Wales’ largest jurisdictions: Thames Valley. We first provide a state-of-the-art narrative review of the knife crime literature, followed by an analysis of population-level data on central tendency and dispersion of knife crimes reported to the police (2015–2019), on offences, offenders, victims, victim-offender overlaps and gang-related assaults. Social network analysis was used to explore the formations of offender-victim networks. Our findings show that knife crime represents a small proportion of crime (1.86%) and is associated largely with violence offenses. 16–34 year-old white males are at greatest risk of being the victims, offenders or victim-offenders of knife crime, with similar relative risks between these three categories. Both knife offenders and victims are likely to have a criminal record. Knife crimes are usually not gang-related (less than 20%), and experienced mostly between strangers, with the altercation often a non-retaliatory ‘one-off event’. Even gang-related knife crimes do not follow ‘tit-for-tat’ relationships—except when the individuals involved have extensive offending histories and then are likely to retaliate instantaneously. We conclude that while rare, an incident of knife crime remains predicable, as a substantial ratio of offenders and victims of future knife crime can be found in police records. Prevention strategies should not be focused on gang-related criminals, but on either prolific violent offenders or repeat victims who are known to the police—and therefore more susceptible to knife crime exposure.
Journal Article
Tools and weapons : the promise and the peril of the digital age /
\"In Tools and Weapons, Brad Smith and Carol Ann Browne take us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying \"Microsoft memoir,\" the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort\"-- Provided by publisher.
Hate speech detection: Challenges and solutions
by
Goharian, Nazli
,
Yao, Hao-Ren
,
Russell, Katina
in
Artificial intelligence
,
Biology and Life Sciences
,
Computer and Information Sciences
2019
As online content continues to grow, so does the spread of hate speech. We identify and examine challenges faced by online automatic approaches for hate speech detection in text. Among these difficulties are subtleties in language, differing definitions on what constitutes hate speech, and limitations of data availability for training and testing of these systems. Furthermore, many recent approaches suffer from an interpretability problem-that is, it can be difficult to understand why the systems make the decisions that they do. We propose a multi-view SVM approach that achieves near state-of-the-art performance, while being simpler and producing more easily interpretable decisions than neural methods. We also discuss both technical and practical challenges that remain for this task.
Journal Article