Search database
Filter
116
Featured
Topics
26
25
15
13
7
7
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
4
4
4
4
4
4
3
3
3
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
22
9
5
4
3
2
2
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"The subject of this article is the issue of journalist-spies in the Bulgarian media before and after the fall of communism in 1989. The focus is on the perceptions of Bulgarian journalists on the role alleged secret service collaborators played, and continue to play, in the postcommunist society an ... more
"[The publication] documents how Ethiopia’s government uses its control over the telecom system to restrict individuals’ rights. Based on over 100 interviews with victims of government abuses, former government officials, and former staff of telecom companies, the report describes the various me ... more
"This Global Information Society Watch tracks the state of communications surveillance in 57 countries across the world – countries as diverse as Hungary, India, Argentina, The Gambia, Lebanon and the United Kingdom. Each country report approaches the issue from a different perspective. Some analy ... more
"El objetivo de este documento es examinar el marco legal y jurisprudencial colombiano sobre vigilancia de comunicaciones, a la luz de las capacidades tecnológicas de hoy. Dicho a manera de hipótesis, el propósito es mostrar cómo la regulación y la jurisprudencia en materia de inteligencia no s ... more
"The internet has enabled an unprecedented ability to monitor and track people and information flows as highlighted in the 2013 revelations by Edward Snowden about online surveillance carried out by the United States’ National Security Agency. The revelations have kicked off debates across the wor ... more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom ... more
"Internet censorship and surveillance becomes more sophisticated. The first-generation controls like China's "Great Firewall" are being replaced by techniques that include strategically timed distributed denial-of-service (DDoS) attacks, targeted malware, take-down notices and stringent terms-of-usa ... more

Handbook of Internet Crime

London; New York: Routledge (2010), xvii, 654 pp.
"The Handbook of Internet Crime gathers together the leading scholars in the field to explore issues and debates surrounding internet-related crime, deviance, policing, law and regulation in the 21st century. The Handbook reflects the range and depth of cybercrime research and scholarship, combining ... more
"This book takes the mystery out of ICT policy and makes it easier to understand. Key issues are presented and explained clearly and concisely, and a basis is provided for further investigation. Many concrete examples are given of recent events or debates, which the reader can explore further if so ... more