Cyber crime expert Hitchcock helps individuals and business users of the Web protect themselves, their children, and their employees against online cheats and predators. Hitchcock details a broad range of abusive practices, shares victims' stories, and offers advice on how to handle junk e-mail, "flaming," privacy invasion, financial scams, cyberstalking, and identity theft.
The Internet is a mixed blessing for libraries and librarians. On the one hand, it provides opportunities to add services and expand collections; on the other, it increases user expectations and contributes to techno-stress. Today, the Net is challenging the librarian's ability to select, threatening the survival of the book, necessitating continuous retraining, presenting unique problems of access and preservation, putting new demands on budgets, and embroiling information professionals in legal controversies. In "Net Effects, Marylaine Block examines the issues and brings together a wealth of insights, war stories, and solutions. Nearly 50 articles by dozens of imaginative librarians--expertly selected and annotated by the editor--suggest practical and creative ways to deal with the range of Internet "side effects," regain control of the library, and avoid being blindsided by technology again.
Provides an overview of issues related to criminal and antisocial activity that occurs online, including history, terminology, biographical information on important individuals, and a complete annotated bibliography.
Violence Goes to the Internet provides the reader with a thorough understanding of the Internet and the potential dangers lying therein. The book identifies all of the different types of interpersonal violence and crime that may be encountered on the Internet, so that it can then be examined and placed in the context of how that violence manifests itself in the physical world. Readers will then be able to recognize and detect interpersonal violence and crime on the Internet and take the necessary steps to insulate and defend oneself from would-be cyber predators. A new approach to assessing violence and crime on the Internet is introduced, combining the technologies of criminal profiling, threat assessment, and risk assessments. This new approach, known as the Behavioral Risk Analysis of Violence Online (B.R.A.V.O.), is a behaviorally driven approach that can assess both known and unknown perpetrators across both physical and virtual landscapes, providing authorities with violence and crime risk levels, disruption levels, recommended target action, and investigative direction. The book also classifies crime and violence on the Internet into types and strains, allowing people to understand the motivation and behaviors of online perpetrators and to help detect and interpret behavior they observe online. This section of the book will also familiarize readers with general violence prevention and intervention principles, as well as safety and survival strategies. The second part of the book will familiarize readers with the different mediums and interfaces involved with the Internet and exemplify how those with violent or criminal intentions can exploit these mediums. In great detail, readers will be exposed to the major types of Internet violence and crime and will be given real-world examples of how violence and crime truly work on the Internet, hopefully expanding their detection and awareness abilities. The final section of the book highlights some of the difficulties faced by organizations, schools, colleges, business, law enforcement, and lawmakers in combating Internet violence and crime. In this section of the book, comprehensive steps are outlined for staying safe on the Internet.
Reveals the personal records available on the Internet; examines Internet privacy; and explores such sources of information as mailing lists, telephone directories, news databases, bank records, and consumer credit records.
"Companies operating in todayÆs roller-coaster economy have increasingly turned to competitive intelligence (CI) as an effective means of building and maintaining a business edge. Revealing their secrets for monitoring competitive forces and keeping on top of the trends, opportunities, and threats within their industries, this book presents 15 leading CI researchers and their hard-earned secrets. These CI researchers are from such Fortune 100 firms as Compaq Computer, Dell Computer, Lockheed Martin, Merck, and United Technologies. The tips, techniques, and models provided can be successfully applied to any business intelligence project, and the range of sources and strategies discussed will help any organization stay several steps ahead of the competition."
Two hundred entries offer profiles of key figures; essays on such topics as cookies, content filtering, and digital libraries; and a chronology beginning with the prehistory of the Internet from 1843-1956 and concluding with the 2004 presidential campaign.