Syndetics cover image
Image from Syndetics

Investigating Information-Based Crimes a Guide for Investigators on Crimes Against Person Related to the Theft or Manipulation of Information Assets.

By: Mendell, Ronald L.
Material type: TextTextPublisher: Springfield : Charles C Thomas, 2013General Notes: EBSCO PDA Program.Description: 1 online resource (227 p.).Content type: text Media type: computer Carrier type: online resourceISBN: 9780398088729 (electronic bk.); 0398088721 (electronic bk.).Subject(s): Computer crimes -- Investigation | Data protection | Confidential communications | Criminal investigationGenre/Form: Electronic books. DDC classification: 363.2 | 363.25968 Online resources: Access full-text materials at no charge:
Contents:
Chapter 1 -- Identity theft -- Chapter 2. Social engineering -- Chapter 3. Disinformation -- Chapter 4. Digital evidence and digital repositories -- Chapter 5. The theft of personal information repositories -- Chapter 6. Misuse of online information -- Chapter 7. Misuse of electronic surveillance -- Chapter 8. Theft of physical information assets -- Chapter 9. Psychological dimensions -- Chapter 10. The future of information-based crimes -- Appendix A -- Appendix B -- Appendix C -- Glossary-- Bibliography.
Summary: This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

EBSCO PDA Program

Chapter 1 -- Identity theft -- Chapter 2. Social engineering -- Chapter 3. Disinformation -- Chapter 4. Digital evidence and digital repositories -- Chapter 5. The theft of personal information repositories -- Chapter 6. Misuse of online information -- Chapter 7. Misuse of electronic surveillance -- Chapter 8. Theft of physical information assets -- Chapter 9. Psychological dimensions -- Chapter 10. The future of information-based crimes -- Appendix A -- Appendix B -- Appendix C -- Glossary-- Bibliography.

This comprehensive text explores the practical techniques for financial asset investigation. It steers private investigators, collection specialists, judgment professionals, and asset recovery specialists in undertaking information collection in a legal manner. This new edition remains the predominate primer on how to find assets to satisfy judgments and debts, but it now also includes a significant focus on the emerging underground economy. New chapters cover individual and enterprise involvement in the emerging "shadow" financial domain. This includes the new world of "smartphones," prepaid.

Description based on print version record.

There are no comments on this title.

to post a comment.

Powered by Koha