Showing 1 - 10 of 184
review of the empirical literature / Sefa Kwami Awaworyi Churchill -- Money of her own and the politics of women … managers / Megan Alessandrini, Romy Winter -- Is M-PESA a model for financial inclusion and women empowerment in Kenya …? / Violet N. Barasa, Charles Lugo -- Economic empowerment of women in Pakistan / Sofia Idris -- The case for group heterogeneity …
Persistent link: https://www.econbiz.de/10011728280
"This book provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a … -- Evidentiary implications of potential security weaknesses in forensic software / Chris Ridder -- Combating internet-based crime …
Persistent link: https://www.econbiz.de/10011727052
"This book addresses the use of electronic devices and software for crime prevention, investigation, and the …
Persistent link: https://www.econbiz.de/10011727432
"This book discusses leading research on the use of computer simulation of crime patterns to reveal hidden processes of …Preface -- An overview of crime simulation / Lin Liu and John Eck -- Section I. The role of simulation in crime …Section II. Streets, networks, and crime distribution -- Chapter V. Modelling pedestrian movement to measure on …
Persistent link: https://www.econbiz.de/10011725821
addresses its multifaceted nature. The chapters in this book depict the nature of the crime and the motives of the criminals … cyber crimes with a privacy-enabled forensic profiling system -- ASKARI: a crime text mining approach -- Basic steganalysis … relationship between digital forensics, corporate governance, IT governance and IS governance -- Law, cyber crime and digital …
Persistent link: https://www.econbiz.de/10011725991
"This book features a diverse array of GIS applications in crime analysis, from general issues such as GIS as a … cooperation / Mark R. Leipnik, Donald P. Albert -- 3. Garbage in, garbage out : geocoding accuracy and spatial analysis of crime … Wang, Van M. O'Brien -- 6. Geographic profiling for serial crime investigation / D. Kim Rossmo, Ian Laverty, Brad Moore …
Persistent link: https://www.econbiz.de/10011726127
"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in order to further defend their systems and protect the information therein"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011727905
"This book combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere"--Provided by publisher.
Persistent link: https://www.econbiz.de/10011728080
A brief review of new threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson -- Mobile … / Darrell Norman Burrell [and 3 others] -- Communication, technology, and cyber crime in Sub-Saharan Africa / Dustin Bessette …
Persistent link: https://www.econbiz.de/10011728228
role models to encourage other women to join these typically non-traditional female fields of work and study. This book … provides a collection of recent high-quality empirical studies related to the education and careers of women in engineering …, science and technology disciplines, with cases on innovative approaches to attracting and supporting women in training courses …
Persistent link: https://www.econbiz.de/10011726827