Articles

Cyber Investigator Staircase Model

Prior to applying this module to a previously stated case, the author will explain in detail what the actual Cyber Investigator Staircase Model (CISM) is and how it is used. The investigative process model is best described and depicted as a sequence of ascending stairs, in which it provides a practical and methodical approach to … Continue reading Cyber Investigator Staircase Model

So what are and can be perceived as new threats of Cyber Crime?

During recent research it was identified and established that certain countries are taking this seriously, and have even started to offer and create networks to aid both the public and commercial arenas. Some leaders of Canada's largest industries are creating a new network to help businesses and the public stay abreast of emerging cyber threats from … Continue reading So what are and can be perceived as new threats of Cyber Crime?

Professional Standards and Regulated Training

List of Terms & Abbreviations ASIS | American Society of Industrial Security CCTV | Closed Circuit Television CPD | Continual Professional Development H&S | Health and Safety HSM | Hotel Security Manager HRM | Human Resources Manager IHSM | Institute of Hotel Security Management IOSH | Institute of Occupation Safety and Health PISA | Private … Continue reading Professional Standards and Regulated Training

Cyber Crime

Abstract Cybercrime is a topic in which public and governmental understandings have long been shaped by cultural constructions and the almost theatrical politics of security. In recent years, however, the Cybercrime stakes have risen with more professional and state engineered attacks, more commercial cybercrime and it being used to spread hate. As a consequence, Cybercrime … Continue reading Cyber Crime

What is your understanding of cyber terrorism?

What is your understanding of cyber terrorism? The term cyberterrorism is a term that individuals either fully understand or only partially understand its true meaning and principles. Cyberterrorism in simple terminology is a terrorism act committed on the internet. So basically it is an act of Internet terrorism in terrorist activities, including acts of deliberate, … Continue reading What is your understanding of cyber terrorism?

The Perils of Accurately Measuring Fraud and Corruption: Is it Only Worth Doing When Public Money is at Stake?

Peter Stiernstedt just published a new book chapter in our book series Security and Risk Management: Critical Reflections and International Perspectives - Volume 1. Title: The Perils of Accurately Measuring Fraud and Corruption: Is it Only Worth Doing When Public Money is at Stake? Buy Only Chapter 11 | PDF Format | £4.90 View Book … Continue reading The Perils of Accurately Measuring Fraud and Corruption: Is it Only Worth Doing When Public Money is at Stake?