"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--OCLC-licensed vendor bibliographic record.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, in…
An examination of youth Internet safety as a technology of governance, seen in panics over online pornography, predators, bullying, and reputation management.OCLC-licensed vendor bibliographic record.
In this book, the author argues that in embarking on an unprecedented effort to build surveillance capabilities deeply into communications infrastructure, the U.S. government is opting for short-term security and creating dangerous long-term risks. Landau describes what makes communications security hard, warrantless wiretapping and the role of electronic surveillance in the war on terror, the …
We live in a society that is increasingly preoccupied with allocating blame: when something goes wrong someone must be to blame. Bringing together philosophical, psychological, and sociological accounts of blame, this is the first detailed criminological account of the role of blame in which the authors present a novel study of the legal process of blame attribution, set in the context of crimi…
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an…
This open access book brings together insights into Pacific policing, conceptualising policing broadly as order maintenance involving the actions of multiple local, regional and international actors with sometimes competing and conflicting agendas. A complex and multifaceted endeavour, scholarship on this topic is relatively scarce and widely dispersed across diverse sources. It examines how Pa…
Challenging popular misconceptions of female users, this book is the first to examine how female drug user's identities, and hence their experiences, are shaped by drug policies.
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This book is volume two of the writings of David Sissons, who first established his academic career as a political scientist specialising in Japanese politics, and later shifted his focus to the history of Australia–Japan relations. In this volume, we reproduce his writings on Japanese politics, the Pacific War and Australian war crimes trials after the war. He was a pioneer in these fields, …