Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
The Investigative Process and Behavioral Profiling of Computer Crimes: Persona ex-Machina takes readers through a digital investigation. It answers the following questions: What is digital evidence? What are the applicable laws that apply to computer systems and the Internet? How do we identify subjects? What criminological theories apply? How do we apply behavioral profiles? Since the author also teaches these courses, the text includes labs to teach technical skills, such as data recovery, evidence identification, forensic timelines, etc. This book is ideal for readers with little exposure to the world of digital forensics and the investigative process, as well as criminal behavior.
Just as forensic science logically led to the science of offender behavioral profiling, the burgeoning field of digital profiling serves to prove that the principle can be applied to activities on computer systems and the Internet. In short, human technology interaction leaves a trace, and that trace can be examined to infer behavior. Existing research supports this in many different areas – For example, stylometry, where phraseology, frequency distribution, flight time, and other aspects have been shown to be up to 95% effective at identifying a subject following the disambiguation of copious data.
- Provides an overview of the techniques experts in the field of computer crime need in the investigative process of criminal behavior
- Includes coverage of the investigative process, the legal aspects of evidence, applicable laws, behavioral profiling (ideographic and nomothetic)
- Allows readers to develop and apply criminological theories to the digital world, with a sociological slant
Students and Instructors of digital profiling and behavioral analysis. Law Enforcement, Crime Scene First Responders and Social Scientists
- Introduction to Digital Evidence and Computer Crime
2. History of Computer Crimes and Investigations
3. Terminology and Tools of Digital Investigations
4. The Investigation Process
5. Introduction to Evidentiary Procedure
6. Qualities of Evidence
7. Introduction to Behavioral Profiling
8. Ideographic Digital Profiles
9. Computer Criminal Archetypes
10. Criminological Theories and Computer Crime
- No. of pages:
- © Academic Press 2020
- 1st June 2020
- Academic Press
- Paperback ISBN:
Mr. Johnson holds a BS in Political Science (Law and Legal Systems), a BS in Social Science and an MS in Criminology (Cybercrime and Cyber Ethics). He’s currently the Information Security Officer at the University of Wisconsin in Stevens Point. He is also an Associate Lecturer in the Sociology and Computing & New Media Departments, as well as a Professor of Digital Forensics. Mr. Johnson has 15+ years’ experience in Information Assurance and Information Security, is a former private investigator, specializing in cyber-intelligence and digital profiling.
Information Security Officer and Professor, University of Wisconsin – Stevens Point, Stevens Point, WI, USA