Search results

1 – 10 of over 1000
Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking…

Abstract

This chapter explores the laws and unique challenges associated with the investigation and prosecution of cybercrime. Crimes that involve the misuse of computers (e.g., hacking, denial of service, and ransomware attacks) and criminal activity that uses computers to commit the act are both covered (e.g., fraud, theft, and money laundering). This chapter also describes the roles of the various federal agencies involved in investigating cybercrime, common cybercrime terms and trends, the statutes frequently used to prosecute cybercrimes, and the challenges and complexity of investigating cybercrime.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Content available
Book part
Publication date: 9 March 2021

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Book part
Publication date: 15 September 2022

Caner Asbaş and Şule Tuzlukaya

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change…

Abstract

A cyberattack is an attempt by cybercriminals as individuals or organizations with unauthorized access using one or more computers and computer systems to steal, expose, change, disable or eliminate information, or to breach computer information systems, computer networks, and computer infrastructures. Cyberattackers gain a benefit from victims, which may be criminal such as stealing data or money, or political or personal such as revenge. In cyberattacks, various targets are possible. Some potential targets for businesses include business and customer financial data, customer lists, trade secrets, and login credentials.

Cyberattackers use a variety of methods to gain access to data, including malware such as viruses, worms, and spyware and phishing methods, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploit, and DNS tunneling.

Related to cyberattack, the term cyberwarfare is gaining popularity nowadays. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm as in warfare against another state's or organization's computer information systems, networks, and infrastructures.

Military, civil, and ideological motivations, or hacktivism can be used to launch a cyberwarfare. For these reasons, cyberwarfare may be used to conduct espionage, sabotage, propaganda, and economic disruption.

Considering highly digitalized business processes such as e-mails, digital banking, online conference, and digital manufacturing methods, damage of cyberwarfare to businesses and countries are unavoidable. As a result, developing strategies for defending against cyberattacks and cyberwarfare is critical for businesses. The concepts of cyberattack and cyberwarfare, as well as business strategies to be protected against them will be discussed in this chapter.

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Keywords

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Book part
Publication date: 23 September 2013

Melissa L. Cast, Grace Ann Rosile, David M. Boje and Rohny Saylors

The chapter summarizes existing conceptualizations of emotional regulation and extends existing organizational behavior literature that focuses on emotional labor by the…

Abstract

The chapter summarizes existing conceptualizations of emotional regulation and extends existing organizational behavior literature that focuses on emotional labor by the introduction of two processes new to the literature: emotional contagion exchange (ECX) and emotional restorying of labor. More specifically, emotional restorying may allow employees to cope with emotional contagion by converting surface-level acting to deep-level acting, in ways which benefit both employees and organizations. In explaining this process, this chapter constructs a model of multiple interplaying processes.

Details

The Role of Emotion and Emotion Regulation in Job Stress and Well Being
Type: Book
ISBN: 978-1-78190-586-9

Keywords

Book part
Publication date: 23 November 2023

Laura Snyder

The United States is unique in how it imposes income taxation on their citizens living overseas, as if they lived in the United States. Neither US residents (regardless of…

Abstract

The United States is unique in how it imposes income taxation on their citizens living overseas, as if they lived in the United States. Neither US residents (regardless of citizenship) nor non-US citizens residing overseas are subjected to such a penalising system. The system is justified by the stigmatisation of overseas Americans as necessarily wealthy and whose purpose in living overseas is to avoid US taxation.

Because of penalising US taxation, overseas Americans struggle with ordinary activities required to sustain modern life. The activities include owning a home, holding a bank account, investing and planning for retirement, operating a business, holding certain jobs, and pursuing community service opportunities. The situation causes many to feel that they have no choice but to renounce US citizenship.

Ultimately, the question must be asked: Are Americans free to live outside the United States?

Details

Migrations and Diasporas
Type: Book
ISBN: 978-1-83797-147-3

Keywords

Content available
Book part
Publication date: 15 September 2022

Abstract

Details

Conflict Management in Digital Business
Type: Book
ISBN: 978-1-80262-773-2

Book part
Publication date: 4 September 2003

Pauline Ratnasingam

The emphasis on inter-organizational systems gave rise to concerns about inter-organizational relationships as trading partners became aware of the socio-political factors and…

Abstract

The emphasis on inter-organizational systems gave rise to concerns about inter-organizational relationships as trading partners became aware of the socio-political factors and trust that affect their relationships. This paper examines the importance of inter-organizational-trust in business-to-business E-commerce organizations. It examines how inter-organizational relationships impact trading partner trust, perceived benefits, perceived risks, and technology trust mechanisms in E-commerce that can in turn influence outcomes of business-to-business E-commerce. This paper develops a conceptual model and tests the model using a case study research methodology. The aim is to solicit qualitative in depth understanding of inter-organizational-trust in business-to-business E-commerce. Eight organizations from a cross section of industries that formed four bi-directional dyads participated in the third stage of this study. The first two stages include exploratory case studies in three organizations in the automotive industry that applied EDI via Value-Added-Networks in 1997, and a nationwide survey of organizations that examined the extent of E-commerce adoption in Australia and New Zealand in 1998. The findings identify the need for trustworthy business relationships in an E-commerce environment.

Details

Evaluating Marketing Actions and Outcomes
Type: Book
ISBN: 978-0-76231-046-3

Book part
Publication date: 16 September 2014

Kullaya Kosuwan, Yuwadee Viriyangkura and Mark E. Swerdlik

The field of special education in Thailand is still in its infancy. This chapter provides a retrospect on special education in Thailand reflecting societal attitudes toward people…

Abstract

The field of special education in Thailand is still in its infancy. This chapter provides a retrospect on special education in Thailand reflecting societal attitudes toward people with disabilities from the past to present. It also provides a list of factors impacting this population and members of the community who are involved with their lives. Special education law, definitions of various disability categories, types of educational settings, as well as issues and challenges in the field are discussed. A critical analysis of special education teacher preparation is also provided. Finally, recommendations and conclusions are offered.

Details

Special Education International Perspectives: Practices Across the Globe
Type: Book
ISBN: 978-1-78441-096-4

Book part
Publication date: 23 April 2021

Natasha Tusikov

Purpose – This chapter examines the role of payment platforms in the United States in sex censorship in which platforms have a pattern of denying financial services to people and…

Abstract

Purpose – This chapter examines the role of payment platforms in the United States in sex censorship in which platforms have a pattern of denying financial services to people and businesses involved in publishing legal sexual content. It answers the following questions: what explains payment platforms’ regulation of lawful sexual content and what are the consequences? Methodology/Approach – Drawing from the platform governance literature, this chapter closely examines the corporate policies for PayPal and the credit card companies that prohibit certain types of sexual content and services. Findings – This chapter argues that payment platforms’ censorship of sexual expression is shaped by the distinctive nature of and market concentration within the online payment industry. Payment actors’ systematic campaign of sexual censorship disproportionately affects small businesses and individual operators in the sex and adult entertainment industries and amounts to “digital redlining,” a form of financial discrimination. Originality/Value – Payment providers’ role in regulating sex online has received considerably less scholarly attention than research on social media platforms. This gap in scholarship is notable as big payment actors have systematically denied services for about a decade relating to sexually oriented goods and services (see Blue, 2015a).

Details

Media and Law: Between Free Speech and Censorship
Type: Book
ISBN: 978-1-80071-729-9

Keywords

1 – 10 of over 1000