Investigating Google’s Search Engine


Book Description

What do search engines do? And what should they do? These questions seem relatively simple but are actually urgent social and ethical issues. The influence of Google's search engine is enormous. It does not only shape how Internet users find pages on the World Wide Web, but how we think as individuals, how we collectively remember the past, and how we communicate with one another. This book explores the impact of search engines within contemporary digital culture, focusing on the social, cultural, and philosophical influence of Google. Using case studies like Google's role in the rise of fake news, instances of sexist and misogynistic Autocomplete suggestions, and search queries relating to LGBTQ+ values, it offers original evidence to intervene practically in existing debates. It also addresses other understudied aspects of Google's influence, including the profound implications of its revenue generation for wider society. In doing this, this important book helps to evaluate the real cost of search engines on an individual and global scale.




An Introduction to Internet-Based Financial Investigations


Book Description

Increasingly, employees of regulatory bodies, law enforcement agencies and others who are not trained forensic accountants or experienced investigators find themselves responsible for conducting what amount to financial investigations. An engineer who oversees the cleanup of a toxic waste site might need to track down the former owners of the site to find the polluter. Perhaps the applicable licensing agency receives a complaint that an attorney mishandled a client's money. Maybe it's the attorney who needs help finding the assets with which a client's former spouse has absconded. Training in investigation techniques tends to be very limited for many employees. Training on how to find information without incurring significant expense is virtually nonexistent. This book helps fill the void. An Introduction to Internet-Based Financial Investigations will help anyone who conducts financial investigations as part of their job to reduce their dependence on trial and error by showing them where and how to look. Using clear sections describing how to approach an investigation, including the ethical perspective; what to look for and what you find; what free and low cost internet resources are available to support investigations; and how to assemble and present the results of investigations, Kimberly Goetz guides students and beginning investigators through the complex world of financial investigations.




Competition on the Internet


Book Description

Undeniably widespread and powerful as it is, the Internet is not almighty: it can reach as high as the skies (cloud computing), but it cannot escape competition. Yet, safeguarding competition in “the network of networks” is not without challenges: not only are competitive processes in platform-based industries complex, so is competition law analysis. The latter is often challenged by the difficulties in predicting the outcome of competition, in particular in terms of innovation. Do the specific competition law issues in a digital environment presuppose a reconsideration of competition law concepts and their application? Can current competition law tools be adjusted to the rush pace of dynamic industries? To what extent could competition law be supplemented by regulation – is the latter a foe or rather an ally? This book provides an analysis of recent developments in the most relevant competition law cases in a digital environment on both sides of the Atlantic (the EU and the US) and assesses platform competition issues from a legal as well as an economic point of view.




Investigating Identity Theft


Book Description

What will you do when you encounter identity theft within your business? Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune. Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identity theft. "The training that I received from Judy Collins at MSU has been instrumental to my helping victims of identity theft and locating the person(s) who caused their nightmare. I have even used the training methods she outlines in this book on a homicide investigation and it paid off: the perpetrator is now in jail for the rest of his life. I can't say enough about Dr. Collins and her knowledge of tracking criminals on the Internet; she is a great asset to law enforcement." -Anthony Abdallah, Police Detective, Inkster Police Department (CID), Inkster, Michigan "This valuable book is an essential, pragmatic guide for the full understanding and investigation of identity theft crimes. It also establishes Dr. Judith Collins as a foremost national expert on this growing crime problem that threatens our future." -Dr. Bruce L. Benson, Police Chief Emeritus, Associate Professor, Criminal Justice, Michigan State University "Whether the investigator is working in the private or public sector, Dr. Collins presents valuable information on the methodology required to successfully resolve identity theft cases. The use of real-life investigations, with lessons learned, provides an intriguing and entertaining format while at the same time sharpening the investigator's skills. If you think investigating identity theft is not worthwhile because the crime is committed by individuals on randomly selected victims without specific objectives, goals, or purpose, you need to read this book." -Rod Kinghorn, Director of Investigations, General Motors Global Security "An excellent book. Judith Collins has spent many years investigating identity theft. Her willingness to share her knowledge with law enforcement, businesses, and victims is truly a benefit that cannot be found elsewhere." -Juli Liebler, Captain, East Lansing Police Department, East Lansing, Michigan "Well done. Smart idea. . . . This is an excellent, professionally written book . . . and much needed." -Salman Anwar, Computer Forensic Engineer, Western Michigan University Police Department "As a retired special agent with the Federal Bureau of Investigation, and having worked the past six years in the private sector, I found Dr. Collins's book to be an invaluable tool for both the private sector and the law enforcement community. Dr. Collins provides genuine insight into the complex issues surrounding identity theft. I am confident her book will assist in both the prevention of identity theft and the detection of those who prey on other's identities." -Frank Laudan, Investigator, Securitas Security Services USA, Inc. "Excellent guide! A must-read for anyone involved in investigating identity theft! Dr. Collins has become one of the most respected and knowledgeable authorities in this relatively new field." -Detective Gary A. Guiles (Retired), Fraud Investigator, Lansing Police Department, Lansing, Michigan




Investigations in the Workplace


Book Description

Whether you are a professional licensed investigator or have been tasked by your employer to conduct an internal investigation, Investigations in the Workplace gives you a powerful mechanism for engineering the most successful workplace investigations possible. Corporate investigator Eugene Ferraro, CPP, CFE has drawn upon his twenty-four years of practical experience to craft a book that dispels the myths and troublesome theories promulgated by the uninitiated. He provides the back-story behind the methodology, rationale, and gritty practices that have made his workplace investigations soar. But most importantly, he shares this knowledge with you. The book is designed for easy reading and use. Although every page is filled with useful information, you do not need to read the book cover to cover. The exhaustive table of contents, innumerable references, and expansive index allow you to quickly find the immediate information you need. The Applied Strategies chapter shows you how to conduct a particular type of investigation and the action steps involved. To help capture salient points and simplify the learning process, the text is sprinkled with brief Tips and Traps that provide quick and easy lessons on how to make the best use of the information in a particular section. Few workplace activities invoke so much risk and at the same time, so much opportunity, as workplace investigations. A combination of skill, experience, and luck: successful workplace investigations are complex undertakings. An improperly conducted workplace investigation can be expensive and ruin the careers of everyone who touches it. Exploring modern investigative technique and strategies, this book gives you new solutions you need and provides the keys to master even the most complex workplace investigation.




Investigating Internet Crimes


Book Description

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover. - Provides step-by-step instructions on how to investigate crimes online - Covers how new software tools can assist in online investigations - Discusses how to track down, interpret, and understand online electronic evidence to benefit investigations - Details guidelines for collecting and documenting online evidence that can be presented in court




Internet Searches for Vetting, Investigations, and Open-Source Intelligence


Book Description

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made




Open Source Intelligence Investigation


Book Description

One of the most important aspects for a successful police operation is the ability for the police to obtain timely, reliable and actionable intelligence related to the investigation or incident at hand. Open Source Intelligence (OSINT) provides an invaluable avenue to access and collect such information in addition to traditional investigative techniques and information sources. This book offers an authoritative and accessible guide on how to conduct Open Source Intelligence investigations from data collection to analysis to the design and vetting of OSINT tools. In its pages the reader will find a comprehensive view into the newest methods for OSINT analytics and visualizations in combination with real-life case studies to showcase the application as well as the challenges of OSINT investigations across domains. Examples of OSINT range from information posted on social media as one of the most openly available means of accessing and gathering Open Source Intelligence to location data, OSINT obtained from the darkweb to combinations of OSINT with real-time analytical capabilities and closed sources. In addition it provides guidance on legal and ethical considerations making it relevant reading for practitioners as well as academics and students with a view to obtain thorough, first-hand knowledge from serving experts in the field.




Investigating the Social World with SPSS Student Version 14.0


Book Description

Accompanying CD-ROM contains ... "wide-ranging data sets [SPSS Student Version 14.0], a demo for Hyper RESEARCH qualitative data analysis software, and interactive exercises to help students master concepts and techniques."--Page 4 of cover.




Investigations in the Workplace, Second Edition


Book Description

The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully. Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable results. To achieve this and reduce the exposure to unnecessary business disruptions and litigation, every workplace investigation must by driven by process. Investigations in the Workplace, Second Edition provides both novice and experienced investigators with the most insightful and useful information available on the methods and processes for the proper and safe investigation of workplace crime and misconduct. Gleaned from Eugene Ferraro’s nearly three decades of experience, the book is designed for easy reading and use—dispelling common myths and presenting new approaches, methods, and strategies. Revised and updated with more methods, techniques, and case studies, this powerful book also includes new diagrams, checklists, and visuals to help readers put the material in context and make their investigations soar. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Investigations in the Workplace, Second Edition is a must-read for corporate investigators and security professionals, human resources and law enforcement personnel, attorneys, and anyone else tasked with conducting or supervising workplace investigations. Immediate Benefits: Strengthen your interviewing skills and gain valuable insight into the process of modern fact-finding Learn the latest techniques, methods and processes Discover how to build air-tight cases that can withstand the rigors of legal challenges Learn to conduct fast, efficient investigations and obtain the highest possible return on investment from every investigation. Get access to forms, checklists and other valuable tools to help you conduct efficient and professional investigations