Reporting on research in the United States, Europe, and South America, this book discusses such topics as a cost-benefit analysis of additional police hiring, the testing of innovative policy interventions through field experiments, imprisonment and recidivism rates, incentives and disincentives for sports hooliganism and much more.OCLC-licensed vendor bibliographic record.
Economists explore the relationship between expanding international trade and the parallel growth in illicit trade, including illegal drugs, smuggling, and organized crime.OCLC-licensed vendor bibliographic record.
"An examination of the historical and present racial inequities of the prosecutorial system and a blueprint for transforming the system to one of fairness and justice"--OCLC-licensed vendor bibliographic record.
"Tells the stories of those who suffered during the worst social and political failure in the continent's history-the War on Drugs-and what we can do to right the wrongs of the past"--OCLC-licensed vendor bibliographic record.
"This book provides a paradigm changing approach for protecting organizational email users from falling prey to social engineering"--OCLC-licensed vendor bibliographic record.
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
We live in a society that is increasingly preoccupied with allocating blame: when something goes wrong someone must be to blame. Bringing together philosophical, psychological, and sociological accounts of blame, this is the first detailed criminological account of the role of blame in which the authors present a novel study of the legal process of blame attribution, set in the context of crimi…
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an…