Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
0
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,877
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Combatting Cybercrime and Cyberterrorism
Data Protection Law Compliance for Cybercrime and Cyberterrorism Research
other
Author(s):
Arnold Roosendaal
,
Mari Kert
,
Alison Lyle
,
Ulrich Gasper
Publication date
(Online):
May 28 2016
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Privacy and Data Protection
Author and book information
Book Chapter
Publication date (Print):
2016
Publication date (Online):
May 28 2016
Pages
: 81-96
DOI:
10.1007/978-3-319-38930-1_5
SO-VID:
2471e6b7-c06d-4ca4-b53e-b53d7abd3774
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Megatrends and Grand Challenges of Cybercrime and Cyberterrorism Policy and Research
pp. 17
Towards a Systematic View on Cybersecurity Ecology
pp. 39
Challenges Priorities and Policies: Mapping the Research Requirements of Cybercrime and Cyberterrorism Stakeholders
pp. 53
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps
pp. 81
Data Protection Law Compliance for Cybercrime and Cyberterrorism Research
pp. 97
Non-discrimination and Protection of Fundamental Rights in Cybercrime and Cyberterrorism Research
pp. 117
Risks Related to Illegal Content in Cybercrime and Cyberterrorism Research
pp. 135
Cybercrime Economic Costs: No Measure No Solution
pp. 157
Towards the Development of a Research Agenda for Cybercrime and Cyberterrorism – Identifying the Technical Challenges and Missing Solutions
pp. 175
The Never-Ending Game of Cyberattack Attribution
pp. 193
Emerging Cyber Security: Bio-inspired Techniques and MITM Detection in IoT
pp. 209
Cyber Situational Awareness Testing
pp. 237
How the Evolution of Workforces Influences Cybercrime Strategies: The Example of Healthcare
pp. 259
European Public-Private Partnerships on Cybersecurity - An Instrument to Support the Fight Against Cybercrime and Cyberterrorism
pp. 279
Are We Doing All the Right Things to Counter Cybercrime?
pp. 295
Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism
Similar content
3,877
Internet Data Analysis Methodology for Cyberterrorism Vocabulary Detection, Combining Techniques of Big Data Analytics, NLP and Semantic Web
Authors:
Iván Castillo-Zúñiga
,
Francisco Javier Luna-Rosas
,
Laura C. Rodríguez-Martínez
…
Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics
Authors:
Hai-Cheng Chu
,
Der-Jiunn Deng
,
Han-Chieh Chao
'The Myth of Cyberterrorism'
Authors:
J Green
,
JA Green
See all similar