Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. An issue so new and evolving so quickly, there are few sources from which readers can get the information they need to inform themselves about and protect themselves from cybercrime. Written by experts in the field, this reference work contains original essays, descriptions of technical aspects, and numerous contributions from over 100 sources. Cybercrime uses fascinating case studies to analyze the beginning of cybercrime and the path it has followed to the present day. With biographical sketches of many influential hackers, the reader will better understand the development of the cybercriminal, and how many of these individuals went on to create some of the computer industry's most useful software. From cyberstalking to viruses, scholars and students alike will find the answers they need to understand these issues.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud—acts that can have devastating effects upon our modern information society.
This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. The Internet has become for many people—especially students and young adults—an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks. This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory essay that gives readers the necessary conceptual framework, and then explains specific topics such as cyberbullying, file sharing, online predators, Internet fraud, and obscene and offensive content. The book also answers readers' questions in a "Q & A" section with a subject expert and includes a directory of resources that provides additional information and serves as a gateway to further study.
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom—and censorship—of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In Internet Censorship: A Reference Handbook, experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why. The handbook shares key events associated with the Internet's evolution, starting with its beginnings and culminating in the present. It probes the motivation of newsmakers like Julian Assange, the Anonymous, and WikiLeaks hacker groups, and of risk-takers like Private Bradley Manning. It also looks at ways in which Internet censorship is used as an instrument of governmental control and at the legal and moral grounds cited to defend these policies, addressing, for example, why the governments of China and Iran believe it is their duty to protect citizens by filtering online content believed to be harmful.
In a world where people have 24/7 access to the Internet, social media, and other digital technologies, developing healthy habits around how we interact with our screens can have an enormous impact on our physical, mental, and social well-being. Part of the Q&A Health Guides series, this book offers a broad introduction to healthy technology use – a topic of utmost importance in our “always connected” world. The book's questions cover the potential negative impacts of technology overuse and addiction on mental and emotional health, physical well-being, and our relationships with others. Questions also address concerns such as digital information privacy, identity theft, piracy, and the dangers of misinformation circulated online. Finally, the book includes questions covering how to best address technology overuse and addiction, including mindfulness strategies, “digital detoxes,” and therapy. Augmenting the main text, a collection of 5 case studies illustrate key concepts and issues through relatable stories and insightful recommendations. The Common Misconceptions section at the beginning of the volume dispels 5 long-standing and potentially dangerous myths about healthy technology use, directing readers to additional information in the text. The glossary defines terms that may be unfamiliar to readers, while the directory of resources curates a list of the most useful books, websites, and other materials. Finally, whether they're looking for more information about this subject or any other health-related topic, readers can turn to the Guide to Health Literacy section for practical tools and strategies for finding, evaluating, and using credible sources of health information both on and off the Internet.
This book discusses the dangers of too much technology use, explores the benefits of digital detoxing, and outlines the different programs and approaches available to help you unplug. It's an invaluable resource for readers looking to establish a healthier relationship with the digital world. Health professionals and the general public are becoming increasingly aware that addiction to the internet, social media, online games, and other forms of technology has become a real problem with significant negative impacts on physical, psychological, and social health. To combat this issue, some are now undertaking a "digital detox," and many options have emerged to help individuals unplug, whether for a weekend or for longer-term change. Digital Detox: Why Taking a Break from Technology Can Improve Your Well-Being explores both the dark side of technology's ever-present existence in today's world and what individuals can do to find better balance in their digital lives. Part I explores addiction to the internet and other novel technologies. What effect does overindulgence in social media, gaming, online shopping, or even "doomscrolling" through internet news sites have on our self-esteem, relationships with others, and happiness? This section also explores how researchers study and quantify technology addiction. Part II focuses on the digital detox countermovement, examining how various programs, support groups, retreats, and even technology itself can help individuals conquer their digital addictions.
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe.
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect. Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military. This is your guide to understanding hacker terminology. It's up to date and comprehensive, with: * Clear, concise, and accurate definitions of more than 875 hacker terms * Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools * Entries covering general terms, legal terms, legal cases, and people * Suggested further reading for definitions This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information. Knowledge is power. With this dictionary, you're better equipped to be a white hat and guard against cybercrime.
This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher.
In a world where people have 24/7 access to the Internet, social media, and other digital technologies, developing healthy habits around how we interact with our screens can have an enormous impact on our physical, mental, and social well-being. Part of the Q&A Health Guides series, this book offers a broad introduction to healthy technology use – a topic of utmost importance in our “always connected” world. The book's questions cover the potential negative impacts of technology overuse and addiction on mental and emotional health, physical well-being, and our relationships with others. Questions also address concerns such as digital information privacy, identity theft, piracy, and the dangers of misinformation circulated online. Finally, the book includes questions covering how to best address technology overuse and addiction, including mindfulness strategies, “digital detoxes,” and therapy. Augmenting the main text, a collection of 5 case studies illustrate key concepts and issues through relatable stories and insightful recommendations. The Common Misconceptions section at the beginning of the volume dispels 5 long-standing and potentially dangerous myths about healthy technology use, directing readers to additional information in the text. The glossary defines terms that may be unfamiliar to readers, while the directory of resources curates a list of the most useful books, websites, and other materials. Finally, whether they're looking for more information about this subject or any other health-related topic, readers can turn to the Guide to Health Literacy section for practical tools and strategies for finding, evaluating, and using credible sources of health information both on and off the Internet.
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. An issue so new and evolving so quickly, there are few sources from which readers can get the information they need to inform themselves about and protect themselves from cybercrime. Written by experts in the field, this reference work contains original essays, descriptions of technical aspects, and numerous contributions from over 100 sources. Cybercrime uses fascinating case studies to analyze the beginning of cybercrime and the path it has followed to the present day. With biographical sketches of many influential hackers, the reader will better understand the development of the cybercriminal, and how many of these individuals went on to create some of the computer industry's most useful software. From cyberstalking to viruses, scholars and students alike will find the answers they need to understand these issues.
An examination of the social impact of the Internet, this volume explores political, social, technical, legal, and economic controversies in a manner accessible to the general reader. Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems? The Internet and Society: A Reference Handbook explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics, law, and computer science, it examines problems, varieties of cybercrime, controversies, and solutions related to the Internet's phenomenal growth. It also illuminates the likely directions of the Internet's future and the ongoing challenges it presents to societies around the globe.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.