Narrow your search

Library

ULiège (13)

KU Leuven (12)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

ULB (11)

VIVES (11)

UGent (10)

KBC (5)

More...

Resource type

book (14)


Language

English (14)


Year
From To Submit

2023 (14)

Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Book
The sharing economy for tackling cybercrime
Authors: ---
ISBN: 3031202740 3031202732 Year: 2023 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explains Europol’s online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate. Since the global financial crisis, online sharing economy platforms have made a significant impact on use of under-utilized resources. People who have a car (Uber) or a spare room (Airbnb) began to share their under-used assets with others for extra income. The success achieved by these online platforms that enable efficient use of limited resources raised a new discussion on whether a similar governance model can be implemented by public administrations where public resources are insufficient. Cybercrime is one of these fields where most law enforcement agencies have not got enough resources to tackle these crimes. They need the human and technical resources of the private sector for a safer society. This book, for the first time, seeks the answers to this question. It examines the feasibility of online sharing economy platforms to enhance public-private partnerships to tackle cybercrime. The European Union Policing Agency, Europol, is the first police organization to adopt a similar model to interact with policing agencies and private industry. Drawing on extensive research, the book offers crucial insights for policymakers, researchers, and the public interested in new trends in sharing economy, innovative governance models, public-private partnerships, and cybercrime investigations.


Book
Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Author:
ISBN: 3031211014 3031211006 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. CCSET 2022 was devoted to advances in cybersecurity, cybercime, and smart emerging technologies. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 89 paper submissions from 25 countries. Each submission was reviewed by at least three chairs or PC members and 26 regular papers (30%) were accepted. Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements.


Book
Collaborative Approaches for Cyber Security in Cyber-Physical Systems
Authors: --- ---
ISBN: 3031160886 3031160878 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. .


Book
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry : A Comparative Study within the G-20
Author:
ISBN: 9783031234842 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Palgrave Macmillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry. Worldwide, there are between $800 billion and $2 trillion laundered annually with the United States making up at least $300 billion of that figure. Although it is not possible to measure money laundering in the same way as legitimate economic activity, the scale of the problem is considered enormous. The cybersecurity landscape is always shifting, with threats becoming more sophisticated all the time. Managing risks in the banking and financial sectors requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Cybercrime is a global problem, which requires a coordinated international response. This book outlines the regulatory requirements that come out of cyber laws and showcases the comparison in dealing with AML/CFT and cybersecurity among the G-20, which will be of interest to scholars, students and policymakers within these fields. Felix I. Lessambo is Adjunct Associate Professor at Fordham University, USA, where he teaches Corporate Tax and Audit & Assurance Services. He was an Associate Professor at Central Connecticut State University School of Business where he taught Financial Statements Analysis, Global Financial Reporting, and Law & Finance. He has practiced international tax, transfer pricing, and alternative investment management where he structured and advised on hedge funds and private equity cross-border transactions.


Book
Counterintelligence in a Cyber World
Author:
ISBN: 3031352874 3031352866 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.


Book
Cybersecurity in the Age of Smart Societies : Proceedings of the 14th International Conference on Global Security, Safety and Sustainability, London, September 2022
Author:
ISBN: 3031201604 3031201590 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger infrastructure with complicated architecture, and unintentional misuse such as those associated with algorithmic bias. All these have increased the number of attack vectors that can be used to attack such networks. Drawing on 13 years of successful events on information security, digital forensics and cyber-crime, the 14th ICGS3-22 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. This volume presents new materials and contribute to knowledge through the technological advances that are being made across artificial intelligence (AI), machine learning, blockchain and quantum computing. These technologies driven by a digital revolution are expected to be disruptive and provide major digital transformation in the way societies operate today. As result, although these advances provide social and economic benefits, but, also, provide new challenges that security industry need to raise their game to combat them.


Book
Countering Cyberterrorism : The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity
Author:
ISBN: 9783031219207 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book. .


Book
Digital grooming : discourses of manipulation and cyber-crime
Author:
ISBN: 9780190845186 9780190845193 9780190845216 0190845228 019084521X Year: 2023 Publisher: New York Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Illicit digital activity is a substantial and growing problem. Extremists' use of social media over the past decade or so has raised increasing concern among governments and media corporations alike. In Digital Grooming Nuria Lorenzo-Dus analyzes manipulation practices in digital spaces that are situated at, or beyond, the boundaries of law. Lorenzo-Dus identifies and examines in detail the online discourse of adults luring children for sexual abuse and exploitation (digital sexual grooming); extreme ideology groups aligning others to their views (digital ideological grooming); and drug dealers soliciting business in crypto markets (digital commercial grooming). With sophisticated style and stance analyses of large and varied datasets, the book reveals that digital sexual, ideological, and commercial grooming practices have much in common. Three stances--expertise, openness, and avidity--scaffold this manipulative work, which constructs groomers and their targets as sharing a homogenous identity.By shedding new light on grooming practices, this book provides a key resource for discourse analysis, forensic linguistics, communication, and media studies, as well as for practitioners aiming to counter online grooming through policy changes, detection software, and prevention-focused training to promote digital civility and safety.


Book
Digital Sovereignty in Cyber Security: New Challenges in Future Vision : First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17–21, 2022, Revised Selected Papers
Authors: --- --- ---
ISBN: 3031360966 3031360958 Year: 2023 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes papers presented during the workshop session titled “CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy” during the Privacy Symposium hosted by Università Ca’ Foscari in Venice, Italy, in April 2022. The 11 peer-reviewed selected papers present findings, conclusions, research, and recommendations in various security-related areas, from highly technical ones (e.g., software and network security) to law and human-centric ones (e.g., governance and cybersecurity awareness).


Book
Firewalls Don't Stop Dragons : A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Author:
ISBN: 1484290364 1484290356 Year: 2023 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!

Listing 1 - 10 of 14 << page
of 2
>>
Sort by