Corporate hacking and technology driven crime
Other editions. Enlarge cover. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem.
Return to Book Page. Holt Editor ,. Bernadette H. Schell Editor. This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions--Provided by publisher. Get A Copy. Hardcover , pages. More Details Other Editions 3. Friend Reviews. To see what your friends thought of this book, please sign up.
Lists with This Book. This book is not yet featured on Listopia. This could be the end of my presentation if I did not feel uneasy not considering one of the problems I believe to be pivotal in the relationship between crime and technology.
I shall also consider that the same relationship exists between terror and globalization, while globalization is stemming from technology and terror from crime. Transnational terrorism is today made possible by the vast array of communication tools. But the paradox is that if globalization facilitates terrorist violence, the fight against this war without borders is potentially disastrous for both economic development and globalization. Antiterrorist measures restrict mobility and financial flows, while new terrorist attacks could lead the way for an antiglobalist reaction.
Search this Book: Reset. Editor Biographies. The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics COPE. IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes.
0コメント