New threats and countermeasures in digital crime and cyber terrorism /

"This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--Provided by publisher.

Saved in:
Bibliographic Details
Corporate Authors: IGI Global
Group Author: Dawson, Maurice, 1982- (Editor); Omar, Marwan, 1982- (Editor)
Published: IGI Global,
Publisher Address: Hershey, Pa. :
Publication Dates: [2015]
Literature type: eBook
Language: English
Subjects:
Online Access: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8345-7
Summary: "This book brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities"--Provided by publisher.
Carrier Form: PDFs (368 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9781466683464
Access: Restricted to subscribers or individual electronic text purchasers.
Index Number: HV6773
CLC: TP309
Contents: A brief review of new threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson -- Mobile devices: the case for cyber security hardened systems / Maurice Dawson, Jorja Wright, Marwan Omar -- Security threats on mobile devices / Luk as Aron -- The human factor in mobile phishing / Rasha Salah El-Din, Paul Cairns, John Clark -- Security issues in mobile wireless ad hoc networks: a comparative survey of methods and techniques to provide security in wireless ad hoc networks / Arif Sari -- Legal issues: security and privacy with mobile devices / Brian Leonard, Maurice Dawson -- Survey in smartphone malware analysis techniques / Moutaz Alazab, Lynn M. Batten -- Trust management in mobile ad hoc networks for QoS enhancing / Ryma Abassi -- Insider threats: detecting and controlling malicious insiders / Marwan Omar -- Authorship analysis: techniques and challenges / Athira U., Sabu M. Thampi -- The need for a dualist application of public and private law in Great Britain following the use of "flame trolling" during the 2011 UK riots: a review and model / Ivan Mugabi, Jonathan Bishop -- Native language identification (NLID) for forensic authorship analysis of weblogs / Ria Perkins -- The critical need for empowering leadership approaches in managing health care information security millennial employees in health care business and community organizations / Darrell Norman Burrell [and 3 others] -- Learning management systems: understand and secure your educational technology / Sharon L. Burton [and 5 others] -- The innovation and promise of STEM-oriented cybersecurity charter schools in urban minority communities in the United States as a tool to create a critical business workforce / Darrell Norman Burrell [and 3 others] -- Communication, technology, and cyber crime in Sub-Saharan Africa / Dustin Bessette [and 3 others].