Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
2550070 Ergebnisse
Sortierung:
ISSN: 0950-2238
"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description
In: Report of the Commission on the Social Studies Vol. 7
In: Perspectives in social inquiry
Anthology in Law and the Social Sciences: While this book does not purport or pretend to have all the answers to the many social challenges that we face in life, it certainly does raise some thought-provoking questions for us to think through. I hasten to add, however, that the book is not a work of fiction. Neither is it about motivation like many motivational books that are on the bookshelves today. Rather, it is an example of public intellectualism in Law and the Social Sciences. The book distills complex ideas that are often confined to the academic world into more easily discernible ideas by everyone, including the laity. Such is a cardinal objective of the book \2013 to provoke some critical thinking across a broad spectrum of society on certain topical themes pertaining to Law and the Social Sciences. With an inter- and multi-disciplinary focus, the book cuts across many contemporary themes in the Law and Social Science discourse
In: Southern Rural Sociology, Band 23, Heft 2, S. 4-28
In: Routledge Frontiers of Criminal Justice
In: Routledge Frontiers of Criminal Justice Ser
Cover -- Title Page -- Copyright Page -- Dedications -- Table of Contents -- List of figures, tables and boxes -- List of contributors -- Acknowledgements -- List of abbreviations -- Introduction: International developments in practice for suspects of crime -- Asia -- 1 The interrogation of criminal suspects in China -- 2 Insights on investigative interviewing from practitioners and suspects in Indonesia, the Philippines and Sri Lanka -- 3 Iran -- the interrogation of suspects -- 4 Investigative interviews with alleged suspects in Israel: It's all about age -- 5 Current practice in interviews with suspects in Japan -- Australia -- 6 Interviewing suspects in Australia and New Zealand -- Europe -- 7 Interviewing suspects in Belgium -- 8 Interviewing suspects in England and Wales -- 9 Interviews with suspects in Estonia -- 10 Interviewing suspects in France -- 11 Investigative interviewing of suspects in Germany: Defining what not to do -- 12 Criminal interrogation in Italy: Legal procedures and practices -- 13 The investigative interviewing of suspects in the Netherlands: Current practices and historical developments -- 14 Interviewing suspects of crime in Portugal -- 15 Investigative interviewing of suspects in Scandinavia -- 16 Contemporary developments and practices in investigative interviewing of suspects in Scotland -- 17 Police interrogation of suspects in Slovenia -- 18 Investigative interviewing of suspects in Switzerland -- North America -- 19 Interviewing suspects in Canada -- 20 Creating culprits in Mexico City -- 21 Interrogation and investigative interviewing of suspects in the United States -- Conclusion: Interviews and interrogations of suspects -- obtaining the truth, not just confessions -- Index.
Crime and Modernity represents a significant contribution to the ability of criminology and the sociology of crime to confront the dilemmas and controversies of the twenty first century. In Crime and Modernity, John Lea develops a broad historical and sociological overview relating the rise and fall of effective crime control to different types of social structures
In: Social science quarterly, Band 66, Heft 1, S. 3-21
ISSN: 0038-4941
It is argued that the impacts of computer technology on society are an extraordinarily important area for rigorous social scientific research. However, there is currently only a modest amount of empirical research & a dearth of cumulative findings on this subject, & the conceptual & theoretical approaches informing the research are weak. After specifying the primary sources of the understandings about the social impacts of computing, a taxonomy of impacts & a conceptual framework that might guide social scientific research on this subject are suggested. Finally, eight broad generalizations that can be derived from the existing empirical research on the social impacts of computing are summarized. 1 Table, 1 Figure, 80 References. HA
In: Socio-economic review, Band 2, Heft 3, S. 371-390
ISSN: 1475-1461
Since biology is the study of living organisms, their behavior & social systems, & since humans are living organisms, it is possible to suggest that social sciences (the study of human behavior & social systems) are branches of biology & all social scientific theories should be consistent with known biological principles. To claim otherwise & to establish a separate science only for humans might be analogous to the establishment of hydrogenology, the study of hydrogen separate from & inconsistent with the rest of physics. Evolutionary psychology is the application of evolutionary biology to humans, & provides the most general (panspecific) explanations of human behavior, cognitions, emotions, & human social systems. Evolutionary psychology's recognition that humans are animals can explain some otherwise perplexing empirical puzzles in social sciences, such as why there is a wage penalty for motherhood but a wage reward for fatherhood, & why boys produce a greater wage reward for fathers than do girls. The General Social Survey data illustrate the evolutionary psychological argument that reproductive success is important for both men's & women's happiness, but money is only important for men's. 1 Table, 1 Figure, 74 References. Adapted from the source document.
In: The library of essays in contemporary legal theory Volume II
part Part I Methodology: Collaborations and Disputes -- chapter 1 Martin Krygier (1982), 'The Concept of Law and Social Theory', Oxford Journal of Legal Studies, 2, pp. 155-80. -- chapter 2 Kim Lane Scheppele (1994), 'Legal Theory and Social Theory', Annual Review of Sociology, 20, pp. -383-406. -- chapter 3 Brian Z. Tamanaha (1995), 'An Analytical Map of Social Scientific Approaches to the Concept of Law', Oxford Journal of Legal Studies, 15, pp. 501-35. -- chapter 4 Roger Cotterrell (1998), 'Why Must Legal Ideas be Interpreted Sociologically?', Journal of Law and Society, 25, pp. 171-92. -- chapter 5 Nicola Lacey (2006), 'Analytical Jurisprudence Versus Descriptive Sociology Revisited', Texas Law Review, 89, pp. 945-82. -- chapter 6 Christopher McCrudden (2006), 'Legal Research and the Social Sciences', Law Quarterly Review, 122, pp. 632-50. -- chapter 7 Geoffrey Samuel (2008), 'Is Law Really a Social Science? A View from Comparative Law', Cambridge Law Journal, 67, pp. 288-32l. -- part Part II Common Problems: Modes of Explanation of Behaviour -- chapter 8 Gunther Teubner (1989), 'How the Law Thinks: Toward a Constructivist Epistemology of Law',Law and Society Review, 23, pp. 727-58. -- chapter 9A.I. Ogus (1989), 'Law and Spontaneous Order: Hayek's Contribution to Legal Theory', Journal of Law and Society, 16, pp. 393-409. -- chapter 10 Lewis A. Kornhauser (1999), 'The Normativity of Law', American Law and Economics Review, 1, pp. 3-25. -- chapter 11 David Nelken (2004), 'Using the Concept of Legal Culture', Australian Journal of Legal Philosophy, 29, pp. 1-26. -- chapter 12 Matthew Noah Smith (2006), 'The Law as a Social Practice: Are Shared Activities at the Foundations of Law?', Legal Theory, 12, pp. 265-92. -- part Part III Common Objects: Modes of Explanation of Legal Phenomena -- chapter 13 Martin Krygier (1986), 'Law as Tradition', Law and Philosophy, 5, pp. 237-62. -- chapter 14 Elizabeth Mertz (1992), 'Language, Law, and Social Meanings: Linguistic/Anthropological Contributions to the Study of Law',Law and Society Review, 26, pp.413-45. -- chapter 15 Rodolfo Sacco (1995), 'Mute Law', American Journal of Comparative Law, 43, pp.455-67. -- chapter 16 William Twining (2005), 'Social Science and Diffusion of Law',Journal of Law and Society, 32, pp. 203-40. -- chapter 17 Brian Z. Tamanaha (2008), 'Understanding Legal Pluralism: Past to Present, Local to Global', Sydney Law Review, 30, pp. 375-41l.