Exponential Random Graph Models for Social Networks (Structural Analysis in the Social Sciences)

Rating: 
Amazon Price: N/A (as of October 21, 2017 19:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Exponential random graph models (ERGMs) are increasingly applied to observed network data and are central to understanding social structure and network processes. The chapters in this edited volume provide a self-contained, exhaustive account of the theoretical and methodological underpinnings of ERGMs, including models for univariate, multivariate, bipartite, longitudinal and social-influence type ERGMs. Each method is applied in individual case studies illustrating how social science theories may be examined empirically using ERGMs. The authors supply the reader with sufficient detail to specify ERGMs, fit them to data with any of the available software packages and interpret the results.

Cybercrime: The Investigation, Prosecution and Defense of a Computer-related Crime

Rating: 
Amazon Price: $39.00 $38.98 You save: $0.02 (%). (as of October 21, 2017 05:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cybercrime is a legal workbook for anyone involved in the rapidly developing area of cybercrime. It comprehensively covers: determining what conduct is considered a cybercrime; investigating improper cyber conduct; trying a cybercrime case as a prosecuting or defending attorney; and handling the international aspects of cybercrime. As technology grows increasingly complex, so does computer crime. In this third edition, Clifford leads a team of nationally known experts in cybercrime (gathered from the diverse fields of academia, private, and governmental practice) to unfold the legal mysteries of computer crime. The book explores the variety of crimes that involve computer technology and provides essential details on procedural and tactical issues associated with the prosecution and defense of a cybercrime. The authors' insight will be of great interest to criminal prosecution and defense attorneys, law enforcement officers, and students of computer or modern criminal law.

Technopoly: The Surrender of Culture to Technology

Rating: 
Amazon Price: $15.95 $11.21 You save: $4.74 (30%). (as of October 21, 2017 00:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Neil Postman is one of the most level-headed analysts of education, media, and technology, and in this book he spells out the increasing dependence upon technology, numerical quantification, and misappropriation of "Scientism" to all human affairs. No simple technophobe, Postman argues insightfully and writes with a stylistic flair, profound sense of humor, and love of language increasingly rare in our hastily scribbled e-mail-saturated world.

Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment

Rating: 
Amazon Price: $128.95 $128.95 (as of October 21, 2017 18:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computers and the Internet play an increasingly pivotal role in daily life, making it vitally important to understand the dynamics of cybercrime and those victimized by it. The anthology Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment explores the predictors for participation in various forms of cybercrime and deviance, from common problems like media piracy, to more distinct offenses such as computer hacking. Most criminological theories were developed to account for street crimes, so it is unclear how these theories may apply to virtual offending. This text provides critical insight into the utility of multiple theories to account for cybercrimes.

Cybercrime and Criminological Theory gives direct insight into the rates and prevalence of cybercrime offenses using data sets from populations across the United States. It gives readers a fundamental understanding of, and appreciation for various forms of cybercrime, and outlines prospective predictors of both offending and victimization. The selected readings identify research questions that must be addressed in order to improve the legal, technical, and policy responses to cybercrimes.
Continue reading “Cybercrime and Criminological Theory: Fundamental Readings on Hacking, Piracy, Theft, and Harassment”

Illuminating Dark Networks: The Study of Clandestine Groups and Organizations (Structural Analysis in the Social Sciences)

Rating: 
Amazon Price: N/A (as of October 21, 2017 07:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Some of the most important international security threats stem from terror groups, criminal enterprises, and other violent non-state actors (VNSAs). Because these groups are often structured as complex, dark networks, analysts have begun to use network science to study them. However, standard network tools were originally developed to examine companies, friendship groups, and other transparent networks. The inherently clandestine nature of dark networks dictates that conventional analytical tools do not always apply. Data on dark networks is incomplete, inaccurate, and often just difficult to find. Moreover, dark networks are often organized to undertake fundamentally different tasks than transparent networks, so resources and information may follow different paths through these two types of organizations. Given the distinctive characteristics of dark networks, unique tools and methods are needed to understand these structures. Illuminating Dark Networks explores the state of the art in methods to study and understand dark networks.