Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9781351027366 , 1351027360 , 9781351027380 , 1351027387 , 9781351027373 , 1351027379
    Language: English
    Pages: 1 online resource (xxiii, 210 pages)
    DDC: 302.23/1
    Keywords: Social media / Political aspects / United States ; Polarization (Social sciences) / United States ; Internet and terrorism / United States ; Radicalism / United States ; Extremist Web sites
    Abstract: Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric.?
    URL: Volltext  (URL des Erstveroeffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Boca Raton, FL : CRC Press, Taylor & Francis Group
    ISBN: 1138493678 , 9781138493674
    Language: English
    Pages: xxiii, 210 Seiten
    Parallel Title: Erscheint auch als
    DDC: 302.23/1
    RVK:
    RVK:
    RVK:
    Keywords: Propaganda ; Massenmedien ; Populismus ; Social Media ; Radikalismus ; Innere Sicherheit ; USA
    Note: A framework to analyze the impact of social media propaganda on intolerance, extremism, and radicalization in society -- Social media propaganda and the political electoral process -- Government institutional response to social media propaganda, extremism, and radicalization -- Military response to social media propaganda driven extremism, and radicalization -- The impact of social media extremist propaganda on law enforcement -- The corporate extremist propaganda machine -- Extremist propaganda and recruitment targeting youth -- Electronic aggression or free speech -- Countering extremist anti-science propaganda -- Observations on the distribution of extremist propaganda -- Ten reasons why propaganda works
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Milton : Taylor & Francis Group
    ISBN: 9781000398281
    Language: English
    Pages: 1 online resource (257 pages)
    Parallel Title: Erscheint auch als
    DDC: 364.168
    Keywords: Social engineering ; Computer crimes
    Abstract: Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Author -- 1: Introduction to Social Engineering Use by Bad Guys -- 1.1 Understanding the Breadth of Social Engineering as a Weapon -- 1.2 Social Engineering Fraud Schemes -- 1.3 The Cyber Underground -- 1.4 FBI and Strategic Partnerships -- 1.5 The Basic Steps to Countering Phishing Attacks -- 1.6 A New Level of Social Engineering for the 21st Century -- 1.7 The Organization of this Book -- 1.8 Conclusion -- 1.9 Key Points -- 1.10 Seminar Discussion Topics -- 1.11 Seminar Group Project -- Key Terms -- References -- 2: The Continuum of Social Engineering Approaches -- 2.1 What Social Engineering Attackers Want -- 2.2 Common Types of Fraud -- 2.3 Socially Engineered Larger-Scale Investment Scams -- 2.4 Ways Social Engineering Attackers Work -- 2.5 Conclusion -- 2.6 Key Points -- 2.7 Seminar Discussion Topics -- 2.8 Seminar Group Project -- Key Terms -- References -- 3: Criminal Social Engineering Activities -- 3.1 The Tech Support Scam -- 3.2 Business Email Compromise -- 3.3 Social Engineering of Education Scams -- 3.4 The Avalanche Takedown -- 3.5 Takedown of the Gameover Zeus and Cryptolocker Operations -- 3.6 Social Engineers are Striking on Numerous Fronts -- 3.7 The North Korean Connection -- 3.8 Conclusion -- 3.9 Key Points -- 3.10 Seminar Discussion Topics -- 3.11 Seminar Group Project -- Key Terms -- References -- 4: Securing Organizations Against Social Engineering Attacks -- 4.1 The Basics of Security for Social Engineering Attacks -- 4.2 Applying the Cybersecurity Framework is an Ongoing Process -- 4.3 The Framework Components -- 4.4 Developing Security Policies -- 4.5 Protecting Small Businesses from Social Engineering Attacks -- 4.6 Establishing a Culture of Security -- 4.7 Conclusion -- 4.8 Key Points -- 4.9 Seminar Discussion Topics -- 4.10 Seminar Group Project.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Burlington, MA : Digital Press
    ISBN: 9781555582906 , 1555582907
    Language: English
    Pages: 1 online resource (xviii, 362 pages)
    DDC: 303.4833
    Keywords: Business / Data processing ; Business enterprises / Computer networks ; Information technology ; Social responsibility of business ; Information technology ; Social responsibility of business ; Business enterprises Computer networks ; Business Data processing ; Electronic books ; Electronic books
    Abstract: Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well. Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confidence in business. Regulators, voters, investors, customers, and employees are demanding that businesses be more socially responsible. Rhetoric is not enough, all organizations need to demonstrate that they are living up to social expectations. Erbschloe shows managers how to take charge of key aspects of their IT operations and follow a morally, ethically, and legally correct path to success. Supported by author speaking tour and "Computer Economics" website, www.computereconomics.com Step-by-step instructions on how to accomplish objectives of privacy and security Explains principles of ergonomics, energy efficiency, and recycling that can bring return on investment
    Note: Includes index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...