We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 1,343 results
  1. Criminal justice officials’ attitudes towards addressing computer crimes in Thailand: Difficulties and recommendations

    For the past 10 years, Thailand has been one of the top 10 countries targeted by cyber criminals. In order to address this pressing issue of computer...

    Sutham Cheurprakobkit, Kidtanathat Lerwongrat in Trends in Organized Crime
    Article 18 March 2023
  2. “Just Right” Policing: a Job for Science

    Research Question

    Can police develop the concept of “signal failures” to build a science of “just right” policing, learning from the mistakes of both...

    Article Open access 22 August 2022
  3. Public Criminology in the Australian Higher Education Classroom: Bringing Criminology and History Together Through Citizen Social Science

    Between 2020 and 2022, University of Tasmania criminology students and University of Newcastle history students completed an exercise in primary...
    Victoria Nagy, Nancy Cushing, Alana Piper in Public Criminology
    Chapter 2023
  4. Digital Transformations in Forensic Science and Their Impact on Policing

    Forensic technologies are now more easily transportable, fast and useable in the field by non-specialists. They help detect, collect and analyse a...
    Olivier Ribaux, Olivier Delémont, ... Frank Crispino in Policing in an Age of Reform
    Chapter 2021
  5. Don’t shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure

    In the computer science field coordinated vulnerability disclosure is a well-known practice for finding flaws in IT-systems and patching them. In...

    Marleen Weulen Kranenbarg, Thomas J. Holt, Jeroen van der Ham in Crime Science
    Article Open access 19 November 2018
  6. Is Machine Learning Really Unsafe and Irresponsible in Social Sciences? Paradoxes and Reconsideration from Recidivism Prediction Tasks

    The paper addresses some fundamental and hotly debated issues for high-stakes event predictions underpinning the computational approach to social...

    Jianhong Liu, Dianshi Moses Li in Asian Journal of Criminology
    Article 26 June 2024
  7. Putting the Cyber into Cybercrime Teaching

    Criminology as a discipline has evolved over the past two decades to incorporate crimes that take place in the online world, with increasing amounts...
    Ruth McAlister, Fabian Campbell-West in Teaching Criminology and Criminal Justice
    Chapter 2022
  8. Develo** and Conducting an SSO Study: A How-to-Guide for Social Science Research

    This chapter outlines the different steps of the systematic social observation (SSO) procedure. We discuss these steps chronologically: determining...
    John McCluskey, Craig D. Uchida, ... Shellie E. Solomon in Systematic Social Observation of the Police in the 21st Century
    Chapter 2023
  9. Introduction and Contextual Background of Cybercrime as an Emerging Phenomenon in Africa

    In many ways, information, and communication technologies (ICTs) have shrunk the world, but they have also exposed the world to influences that have...
    Stanley Osezua Ehiane, Mosud Y. Olumoye in Cybercrime and Challenges in South Africa
    Chapter 2023
  10. Communicative Shifters—Responsibility as Ultimate Normative Addressability

    The semantics of responsibility has made its career in science and social practice. While, for instance, the idea of Corporate Social Responsibility...
    Chapter 2023
  11. Historical Evolutions of Cybercrime: From Computer Crime to Cybercrime

    This chapter aims to examine cybercrime viz-à-viz technological developments by identifying key research studies in the field and crime resulting...
    Kyung-Shick Choi, Claire S. Lee, Eric R. Louderback in The Palgrave Handbook of International Cybercrime and Cyberdeviance
    Reference work entry 2020
  12. Neutralizing Cyber Attacks: Techniques of Neutralization and Willingness to Commit Cyber Attacks

    Cyber attacks on critical infrastructure by ideology-based hackers may have both significant financial costs and public safety consequences. Scholars...

    Article 17 November 2021
  13. Conclusion

    As argued in this book, white-collar offendersoffenders who are familiar with computer terminology can conveniently acquire malwaremalware and...
    Petter Gottschalk, Christopher Hamerton in White-Collar Crime Online
    Chapter 2022
  14. Lines of Emergence

    This chapter is devoted to a genealogical critique of EM as a preeminent technology of contemporary government. Taking into account the pertinent...
    Ricardo Urquizas Campello in Short Circuit
    Chapter 2023
  15. Forensic Intelligence and Traceology in Digitalised Environments: The Detection and Analysis of Crime Patterns to Inform Practice

    Different data processing methods can support the detection and analysis of various forms of crime patterns. The authors document the influence and...
    Olivier Ribaux, Simon Baechler, Quentin Rossy in The Handbook of Security
    Chapter Open access 2022
  16. Overlapped Bayesian spatio-temporal models to detect crime spots and their possible risk factors based on the Opole Province, Poland, in the years 2015–2019

    Geostatistical methods currently used in modern epidemiology were adopted in crime science using the example of the Opole province, Poland, in the...

    Rafał Drozdowski, Rafał Wielki, Andrzej Tukiendorf in Crime Science
    Article Open access 22 May 2023
  17. Methodology

    This chapter describes the methodology that we have used in our citation analysis research. We go into detail regarding the main sources of citation...
    Ellen G. Cohn, David P. Farrington, Guy C. M. Skinner in Most Influential Scholars in Criminology and Criminal Justice, 1986-2020
    Chapter 2023
  18. Honeypots for Cybercrime Research

    Honeypots are a type of cybersecurity tool designed with the general purpose of being attacked and compromised by cyberthreats. They became widely...
    Robert C. Perkins, C. Jordan Howell in Researching Cybercrimes
    Chapter 2021
  19. Hacking the Human

    Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of...
    Kristan Stoddart in Cyberwarfare
    Chapter 2022
  20. The Police Power of Finance, Technology, Housing, and Education

    Policing is not primarily what law enforcement does, or what occurs through the operations of the criminal justice system. More fundamentally, it is...
    Chapter 2022
Did you find what you were looking for? Share feedback.