Advances in Digital Crime, Forensics, and Cyber Terrorism: New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Editors: Dawson, Maurice and Omar, Marwan
Publication Year: 2015
Publisher: IGI Global

Single-User Purchase Price: $200.00
Unlimited-User Purchase Price: $300.00
ISBN: 978-1-4666-8345-7
Category: Social Sciences - Criminology & Law
Image Count: 56
Book Status: Available
Table of Contents

New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities.

Share this

Table of Contents

  • Foreword
  • Preface
  • ORGANIZATION OF THIS BOOK
  • Chapter 1: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
  • ABSTRACT
  • INTRODUCTION
  • MOBILE NETWORKS
  • DIGITAL CURRENCY
  • CYBER ESPIONAGE AND SECRECY
  • OPEN SOURCE INTELLIGENCE (OSINT) AND OPEN SOURCE SOFTWARE (OSS)
  • LAWS AND POLICIES TO COMBAT TERRORISM
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 2: Mobile Devices
  • ABSTRACT
  • INTRODUCTION
  • METHODOLOGY
  • RESEARCH RESULTS
  • ANALYSIS AND DISCUSSION
  • LIMITATIONS
  • CONCLUSION AND SUGGESTIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 3: Security Threats on Mobile Devices
  • ABSTRACT
  • INTRODUCTION
  • APPLICATION-BASED MOBILE THREATS
  • DEFENSIVE STRATEGIES
  • BROWSER SECURITY
  • SECURING ANDROID FOR THE ENTERPRISE ENVIRONMENT
  • RECOMMENDED SECURITY PRACTICES FOR MOBILE DEVICES
  • CONCLUSION
  • REFERENCES
  • KEY-TERMS AND DEFINITIONS
  • Chapter 4: The Human Factor in Mobile Phishing
  • ABSTRACT
  • INTRODUCING PHISHING
  • INTRODUCING MOBILE PHISHING
  • THE NEED TO STUDY MOBILE PHISHING
  • THE NEED TO STUDY SMISHING IN PARTICULAR
  • INTRODUCING NON-HUMAN FACTORS AFFECTING PHISHING
  • INTRODUCING HUMAN FACTORS AFFECTING PHISHING
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 5: Security Issues in Mobile Wireless Ad Hoc Networks
  • ABSTRACT
  • INTRODUCTION
  • 5.1 SECURITY THREAT ASPECTS AND DESIGN CHALLENGES OF MOBILE AD HOC NETWORKS
  • 5.2 DETAILED COMPARATIVE ANALYSIS OF EXISTING METHODS AND TECHNIQUES OF IMPLEMENTING SECURITY IN MANETs
  • 5.3 PREVIOUS STUDIES ON SECURING MANETs AGAINST DoS AND DDoS ATTACKS
  • 5.4 SECURITY STRATEGIES AGAINST DoS AND DDoS ATTACKS ON MOBILE AD HOC NETWORKS
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 6: Legal Issues
  • ABSTRACT
  • LEGAL BACKGROUND
  • INDUSTRY-SPECIFIC LAWS
  • CURRENT CYBER-SECURITY EFFORTS ANDTHREATS
  • FEDERAL EFFORTS
  • STATE EFFORTS
  • PROPOSED REGULATIONS
  • MODEL NATIONAL POLICY
  • GOVERNMENT TECHNICAL GUIDANCE
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 7: Survey in Smartphone Malware Analysis Techniques
  • ABSTRACT
  • INTRODUCTION
  • TAXONOMY OF SMARTPHONE MALWARE DETECTION
  • TAXONOMY OF FEATURES EXTRACTION
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 8: Trust Management in Mobile Ad Hoc Networks for QoS Enhancing
  • ABSTRACT
  • INTRODUCTION
  • TRUST MANAGEMENT MODEL
  • DEALING WITH COLLUSION ATTACK
  • SIMULATION AND DISCUSSION
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 9: Insider Threats
  • ABSTRACT
  • INTRODUCTION AND BACKGROUND
  • EXAMPLES OF MALICIOUS INSIDER THREAT INCIDENTS AND THEIR IMPACT
  • MOTIVES AND TECHNIQUES USED FOR CARRYING OUT INSIDER ATTACKS: HUMAN AND BEHAVIORAL ISSUES
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 10: Authorship Analysis
  • ABSTRACT
  • INTRODUCTION
  • PROCEDURES OF AUTHORSHIP ANALYSIS
  • CHALLENGES IN AUTHORSHIP ANALYSIS
  • FUTURE RESEARCH DIRECTIONS
  • CONCLUSION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 11: The Need for a Dualist Application of Public and Private Law in Great Britain Following the Use of “Flame Trolling” During the 2011 UK Riots
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • LIMITATIONS IN THE BRITISH LEGAL SYSTEM FOR DEALING WITH COMPUTER-RELATED CRIME
  • THE NEED FOR A DUALIST REFORM OF THE BRITISH LEGAL SYSTEMS
  • THE ROLE OF LAW OF TORTS IN SUPPLEMENTING PUBLIC LAW FOR A DECRIMINALISED SOCIETY
  • THE ROLE OF GAMIFICATION TO UNDERSTAND PRE-LEGAL INTERVENTIONS
  • IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS
  • DISCUSSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 12: Native Language Identification (NLID) for Forensic Authorship Analysis of Weblogs
  • ABSTRACT
  • 1. BACKGROUND
  • 2. NLID STUDY
  • 3. NLID FOR CASEWORK / APPLICATION AND FUTURE
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 13: The Critical Need for Empowering Leadership Approaches in Managing Health Care Information Security Millennial Employees in Health Care Business and Community Organizations
  • ABSTRACT
  • INTRODUCTION
  • REFERENCES
  • Chapter 14: Learning Management Systems
  • ABSTRACT
  • INTRODUCTION
  • WHAT IS THE LEARNING MANAGEMENT SYSTEM ABOUT?
  • BENEFITS AND VALUE OF THE LEARNING MANAGEMENT SYSTEM TO A TECHNOLOGY STRATEGY
  • BROWSER NEUTRALITY, THE LMS, AND SECURITY
  • COMPONENTS OF THE LMS AND THEIR VULNERABILITIES
  • SOFTWARE AS A SERVICE A PHENOMENON
  • OPERATIONAL SUSTAINABILITY AND THE LEARNING MANAGEMENT SYSTEM
  • DISCUSSION AND CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 15: The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business Workforce
  • ABSTRACT
  • INTRODUCTION
  • GROWTH OF CHARTER SCHOOLS IN THE US
  • CURRICULUM FRAMEWORKS
  • EDUCATIONAL AND LEADERSHIP DEVELOPMENT RAMIFICATIONS
  • THE ORIENTATION OF THE FOUNDERS AND LEADERS
  • THE PUBLIC SCHOOL STRATEGY
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 16: Communication, Technology, and Cyber Crime in Sub-Saharan Africa
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • SOLUTIONS AND RECOMMENDATIONS
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • APPENDIX 1
  • APPENDIX 2
  • APPENDIX 3
  • APPENDIX 4
  • Related References
  • Compilation of References
  • About the Contributors