Show simple item record

dc.contributor.authorEze, Thaddeus
dc.contributor.authorHull, Matthew
dc.contributor.authorSpeakman, Lee
dc.date.accessioned2019-11-06T09:43:31Z
dc.date.available2019-11-06T09:43:31Z
dc.date.issued2019-07-01
dc.identifier.citationHull, M., Eze, T. & Speakman, L. (2018). "Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond," 2018 European Intelligence and Security Informatics Conference (pp. 15-22). Karlskrona, Sweden: IEEE.en_US
dc.identifier.isbn9781538694015en_US
dc.identifier.doi10.1109/EISIC.2018.00011
dc.identifier.urihttp://hdl.handle.net/10034/622796
dc.description.abstractThe landscape in which UK policing operates today is a dynamic one, and growing threats such as the proliferation of cyber crime are increasing the demand on police resources. The response to cyber crime by national and regional law enforcement agencies has been robust, with significant investment in mitigating against, and tackling cyber threats. However, at a local level, police forces have to deal with an unknown demand, whilst trying to come to terms with new crime types, terminology and criminal techniques which are far from traditional. This paper looks to identify the demand from cyber crime in one police force in the United Kingdom, and whether there is consistency in the recording of crime. As well as this, it looks to understand whether the force can deal with cyber crime from the point of view of the Police Officers and Police Staff in the organisation.en_US
dc.language.isoenen_US
dc.publisherProceedings of the IEEEen_US
dc.relation.urlhttps://ieeexplore.ieee.org/document/8753001en_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.subjectCyberen_US
dc.subjectPoliceen_US
dc.subjectCrimeen_US
dc.subjectCyber crimeen_US
dc.subjectCyber policingen_US
dc.titlePolicing the Cyber Threat: Exploring the threat from Cyber Crime and the ability of local Law Enforcement to responden_US
dc.typeConference Proceedingen_US
dc.contributor.departmentUniversity of Chesteren_US
dc.date.accepted2018-09-01
or.grant.openaccessYesen_US
rioxxterms.funderunfundeden_US
rioxxterms.identifier.projectunfundeden_US
rioxxterms.versionAMen_US
rioxxterms.versionofrecord10.1109/EISIC.2018.00011en_US
rioxxterms.licenseref.startdate2019-07-01
refterms.dateFCD2019-09-11T19:41:39Z
refterms.versionFCDAM
refterms.dateFOA2019-07-01T00:00:00Z
rioxxterms.publicationdate2019-07-01
dc.dateAccepted2018-09-01
dc.date.deposited2019-11-06en_US
dc.indentifier.issn0018-9219en_US


Files in this item

Thumbnail
Name:
EISIC_2018_paper_12 (1).pdf
Size:
342.3Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International