New Threats and Countermeasures in Digital Crime and Cyber Terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Maurice Dawson (Illinois Institute of Technology, USA) and Marwan Omar (Nawroz University, Iraq)
Indexed In: SCOPUS View 1 More Indices
Release Date: April, 2015|Copyright: © 2015 |Pages: 368
DOI: 10.4018/978-1-4666-8345-7
ISBN13: 9781466683457|ISBN10: 1466683457|EISBN13: 9781466683464
Hardcover:
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$200.00
TOTAL SAVINGS: $200.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$240.00
TOTAL SAVINGS: $240.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users.

New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Health Information Security
  • Learning Management Systems
  • Legal Implications
  • Mobile Device Privacy
  • Mobile Phishing
  • Security Issues
  • Smartphone Malware Analysis
  • Wireless Networks
Reviews and Testimonials

Exploring various aspects of cyber terrorism, and cyber crime in today's society, scholars of computer science and information technology specializing in computer security provide insights into the negative uses of technology and review associated vulnerabilities and mitigation. Among their topics are the case for cyber-security-hardened mobile systems, a comparative survey of methods and techniques to provide security in wireless ad hoc networks, managing trust to enhance quality of service in mobile ad hoc networks, identifying the author's native language for the forensic analysis of weblog authorship, and the innovation and promise of STEM (science, technology, engineering, mathematics)-oriented cybersecurity charter schools in urban minority communities in the US as a tool to create a critical business workforce.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Maurice Dawson serves as an Assistant Professor of Information Systems at University of Missouri-St. Louis, Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering at The University of Tennessee Space Institute, and Fulbright. Dawson is recognized as an Information Assurance System Architect and Engineer by the U.S. Department of Defense. Research focus area is cyber security, systems security engineering, open source software (OSS), mobile security, and engineering management.
Marwan Omar serves as a full time faculty member of computer science and IT at Nawroz University, Duhok, Iraq. Omar is recognized for his information security expertise and knowledge and holds a security + certification from Comptia. Research interests are: cyber security, mobile security, open source software, and cloud computing.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.